WorldWideScience

Sample records for greatest contemporary threats

  1. INTERNATIONAL LEGAL ASPECTS OF DEALING WITH THE CONTEMPORARY TERRORISM THREATS

    Directory of Open Access Journals (Sweden)

    Vesna Poposka

    2017-05-01

    Full Text Available Recent challenges in international security posed by two terrorist organizations, Al Qaeda and ISIS, have highlighted an urgent domestic and foreign policy challenge. Terrorism has been, for more than a decade, top headline in the world media, and the cost of terrorist activities is expressed in numerous human lives and enormous material damage. Yet to date, international organizations and governments have not been successful in the attempt to find a common definition or uniform approach. Up to now, the approaches towards terrorist activities differ from case to case. There is no single legal regime to deal with terrorist activities, and the legal regime is what gives the answer and the framework for the counter-terrorist activities of the security forces, in order to be able to deal with the threat. This paper will attempt to answer at least some of the dilemmas.

  2. Freedom's Greatest Threat, The Metaterrorist

    National Research Council Canada - National Science Library

    Jones, Gary

    1997-01-01

    The end of the Cold War ushered on to the world scene a new hybrid of terrorist. This new breed of criminal is called the metaterrorist, because his art of instilling terror goes beyond anything we have ever seen in the past...

  3. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  4. The Greatest Mathematical Discovery?

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, David H.; Borwein, Jonathan M.

    2010-05-12

    What mathematical discovery more than 1500 years ago: (1) Is one of the greatest, if not the greatest, single discovery in the field of mathematics? (2) Involved three subtle ideas that eluded the greatest minds of antiquity, even geniuses such as Archimedes? (3) Was fiercely resisted in Europe for hundreds of years after its discovery? (4) Even today, in historical treatments of mathematics, is often dismissed with scant mention, or else is ascribed to the wrong source? Answer: Our modern system of positional decimal notation with zero, together with the basic arithmetic computational schemes, which were discovered in India about 500 CE.

  5. Learning from history, predicting the future: the UK Dutch elm disease outbreak in relation to contemporary tree disease threats

    Science.gov (United States)

    Potter, Clive; Harwood, Tom; Knight, Jon; Tomlinson, Isobel

    2011-01-01

    Expanding international trade and increased transportation are heavily implicated in the growing threat posed by invasive pathogens to biodiversity and landscapes. With trees and woodland in the UK now facing threats from a number of disease systems, this paper looks to historical experience with the Dutch elm disease (DED) epidemic of the 1970s to see what can be learned about an outbreak and attempts to prevent, manage and control it. The paper draws on an interdisciplinary investigation into the history, biology and policy of the epidemic. It presents a reconstruction based on a spatial modelling exercise underpinned by archival research and interviews with individuals involved in the attempted management of the epidemic at the time. The paper explores what, if anything, might have been done to contain the outbreak and discusses the wider lessons for plant protection. Reading across to present-day biosecurity concerns, the paper looks at the current outbreak of ramorum blight in the UK and presents an analysis of the unfolding epidemiology and policy of this more recent, and potentially very serious, disease outbreak. The paper concludes by reflecting on the continuing contemporary relevance of the DED experience at an important juncture in the evolution of plant protection policy. PMID:21624917

  6. Teaching Architecture - Contemporary Challenges and Threats in the Complexity of Built Environment

    Science.gov (United States)

    Borucka, Justyna; Macikowski, Bartosz

    2017-10-01

    The complexity of the modern built environment is a problem not only of architectural and urban issues. This issue extends to many other disciplines as well as covering a wide range of social engagements. The idea of writing this paper is generally initiated by the debate which took place in Gdańsk on 22.01.2016, and was prepared in order to meet representatives of the four circles of interest within the architectural sphere: universities, professional architectural organisations and associations, architectural practice (professionals running their own studios, managing projects and leading construction) and local social organisations active in city of Gdańsk. This paper is a comparison of the results of this discussion in relation to the policy and methodology of architecture teaching on the University level. Teaching architecture and urban planning according to the present discussion needs to be improved and advanced to meet the increasing complexity of both disciplines. Contemporary dynamic development of cities creates the necessity of engaging multiple stakeholders, participants and users of architecture and urban space. This is crucial to make them conscious of sharing responsibility for increasing the quality of living in the built environment. This discussion about architectural education is open and has the nature of an ongoing process adapting to a changing environment and is in fact a constant challenge which brings questions rather than simple answers. Transformation of architecture and urban planning, and consequently its education are increasingly entering into the related fields, especially into the professional practice and social environment. The question of how to teach architecture and urban planning and educate users of urban space should take place in the context of a wide discussion. This interdisciplinary debate seems to be a crucial and challenging step towards improving the future education of architecture and urban planning leading to a

  7. Nature's Greatest Puzzles

    International Nuclear Information System (INIS)

    Quigg, Chris

    2005-01-01

    It is a pleasure to be part of the SLAC Summer Institute again, not simply because it is one of the great traditions in our field, but because this is a moment of great promise for particle physics. I look forward to exploring many opportunities with you over the course of our two weeks together. My first task in talking about Nature's Greatest Puzzles, the title of this year's Summer Institute, is to deconstruct the premise a little bit

  8. Computational Physics' Greatest Hits

    Science.gov (United States)

    Bug, Amy

    2011-03-01

    The digital computer, has worked its way so effectively into our profession that now, roughly 65 years after its invention, it is virtually impossible to find a field of experimental or theoretical physics unaided by computational innovation. It is tough to think of another device about which one can make that claim. In the session ``What is computational physics?'' speakers will distinguish computation within the field of computational physics from this ubiquitous importance across all subfields of physics. This talk will recap the invited session ``Great Advances...Past, Present and Future'' in which five dramatic areas of discovery (five of our ``greatest hits'') are chronicled: The physics of many-boson systems via Path Integral Monte Carlo, the thermodynamic behavior of a huge number of diverse systems via Monte Carlo Methods, the discovery of new pharmaceutical agents via molecular dynamics, predictive simulations of global climate change via detailed, cross-disciplinary earth system models, and an understanding of the formation of the first structures in our universe via galaxy formation simulations. The talk will also identify ``greatest hits'' in our field from the teaching and research perspectives of other members of DCOMP, including its Executive Committee.

  9. Which US States Pose the Greatest Threats to Military Readiness and Public Health? Public Health Policy Implications for a Cross-sectional Investigation of Cardiorespiratory Fitness, Body Mass Index, and Injuries Among US Army Recruits.

    Science.gov (United States)

    Bornstein, Daniel B; Grieve, George L; Clennin, Morgan N; McLain, Alexander C; Whitsel, Laurie P; Beets, Michael W; Hauret, Keith G; Jones, Bruce H; Sarzynski, Mark A

    2018-01-09

    Many states in the southern region of the United States are recognized for higher rates of obesity, physical inactivity, and chronic disease. These states are therefore recognized for their disproportionate public health burden. The purpose of this study was to investigate state-level distributions of cardiorespiratory fitness, body mass index (BMI), and injuries among US Army recruits in order to determine whether or not certain states may also pose disproportionate threats to military readiness and national security. Sex-specific state-level values for injuries and fitness among 165 584 Army recruits were determined. Next, the relationship between median cardiorespiratory fitness and injury incidence at the state level was examined using Spearman correlations. Finally, multivariable Poisson regression models stratified by sex examined state-level associations between fitness and injury incidence, while controlling for BMI, and other covariates. Cardiorespiratory fitness and training-related injury incidence. A cluster of 10 states from the south and southeastern regions (Alabama, Arkansas, Florida, Georgia, Louisiana, Mississippi, North Carolina, South Carolina, Tennessee, and Texas) produced male or female recruits who were significantly less fit and/or more likely to become injured than recruits from other US states. Compared with the "most fit states," the incidence of injuries increased by 22% (95% CI, 17-28; P < .001) and 28% (95% CI, 19-36; P < .001) in male and female recruits from the "least fit states," respectively. The impact of policies, systems, and environments on physical activity behavior, and subsequently fitness and health, has been clearly established. Advocacy efforts aimed at active living policies, systems, and environmental changes to improve population health often fail. However, advocating for active living policies to improve national security may prove more promising, particularly with legislators. Results from this study demonstrate

  10. Nature's Greatest Puzzles

    Energy Technology Data Exchange (ETDEWEB)

    Quigg, Chris; /Fermilab

    2005-02-01

    It is a pleasure to be part of the SLAC Summer Institute again, not simply because it is one of the great traditions in our field, but because this is a moment of great promise for particle physics. I look forward to exploring many opportunities with you over the course of our two weeks together. My first task in talking about Nature's Greatest Puzzles, the title of this year's Summer Institute, is to deconstruct the premise a little bit.

  11. Spain's greatest and most recent mine disaster.

    Science.gov (United States)

    Guerrero, Flor Ma; Lozano, Macarena; Rueda-Cantuche, José M

    2008-03-01

    On 25 April 1998, the mineral waste retaining wall at the Swedish-owned pyrite mine at Aznalcóllar (Seville, Spain) burst, causing the most harmful environmental and socio-economic disaster in the history of the River Guadiamar basin. The damage was so great that the regional government decided in May 1998 to finance a comprehensive, multidisciplinary research initiative with the objective of eradicating or at least minimising all of the negative social, economic and environmental impacts. This paper utilises a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis to identify eight strategic measures aimed at providing policymakers with key guidelines on implementing a sustainable development model, in a broad sense. Empirical evidence, though, reveals that, to date, major efforts to tackle the negative impacts have centred on environmental concerns and that the socio-economic consequences have not been completely mitigated.

  12. [Contemporary threat of influenza virus infection].

    Science.gov (United States)

    Płusa, Tadeusz

    2010-01-01

    Swine-origine H1N1 influenza virus (S-OIV) caused a great mobilization of health medical service over the world. Now it is well known that a vaccine against novel virus is expected as a key point in that battle. In the situation when recommended treatment with neuraminidase inhibitors is not sufficient to control influenza A/H1N1 viral infection the quick and precisely diagnostic procedures should be applied to save and protect our patients.

  13. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  14. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  15. Contemporary cryptography

    CERN Document Server

    Oppliger, Rolf

    2011-01-01

    Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you an in-depth understanding of essential tools and applications to help you with your daily work. The second edition has been reorganized and expanded, providing mathematical fundamentals and important cryptography principles in the appropriate appendixes, rather than summarize

  16. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  17. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  18. Was ocean acidification responsible for history's greatest extinction?

    Science.gov (United States)

    Schultz, Colin

    2011-11-01

    Two hundred fifty million years ago, the world suffered the greatest recorded extinction of all time. More than 90% of marine animals and a majority of terrestrial species disappeared, yet the cause of the Permian-Triassic boundary (PTB) dieoff remains unknown. Various theories abound, with most focusing on rampant Siberian volcanism and its potential consequences: global warming, carbon dioxide poisoning, ocean acidification, or the severe drawdown of oceanic dissolved oxygen levels, also known as anoxia. To narrow the range of possible causes, Montenegro et al. ran climate simulations for PTB using the University of Victoria Earth System Climate Model, a carbon cycle-climate coupled general circulation model.

  19. Massive the Higgs boson and the greatest hunt in science

    CERN Document Server

    Sample, Ian

    2013-01-01

    Now fully updated -- this is the dramatic and gripping account of the greatest scientific discovery of our time. In the early 1960s, three groups of physicists, working independently in different countries, stumbled upon an idea that would change physics and fuel the imagination of scientists for decades. That idea was the Higgs boson -- to find it would be to finally understand the origins of mass -- the last building block of life itself. Now, almost 50 years later, that particle has finally been discovered.

  20. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  1. Penicillin: the medicine with the greatest impact on therapeutic outcomes.

    Science.gov (United States)

    Kardos, Nelson; Demain, Arnold L

    2011-11-01

    The principal point of this paper is that the discovery of penicillin and the development of the supporting technologies in microbiology and chemical engineering leading to its commercial scale production represent it as the medicine with the greatest impact on therapeutic outcomes. Our nomination of penicillin for the top therapeutic molecule rests on two lines of evidence concerning the impact of this event: (1) the magnitude of the therapeutic outcomes resulting from the clinical application of penicillin and the subsequent widespread use of antibiotics and (2) the technologies developed for production of penicillin, including both microbial strain selection and improvement plus chemical engineering methods responsible for successful submerged fermentation production. These became the basis for production of all subsequent antibiotics in use today. These same technologies became the model for the development and production of new types of bioproducts (i.e., anticancer agents, monoclonal antibodies, and industrial enzymes). The clinical impact of penicillin was large and immediate. By ushering in the widespread clinical use of antibiotics, penicillin was responsible for enabling the control of many infectious diseases that had previously burdened mankind, with subsequent impact on global population demographics. Moreover, the large cumulative public effect of the many new antibiotics and new bioproducts that were developed and commercialized on the basis of the science and technology after penicillin demonstrates that penicillin had the greatest therapeutic impact event of all times. © Springer-Verlag 2011

  2. Greatest Happiness Principle in a Complex System Approach

    Directory of Open Access Journals (Sweden)

    Katalin Martinás

    2012-06-01

    Full Text Available The principle of greatest happiness was the basis of ethics in Plato’s and Aristotle’s work, it served as the basis of utility principle in economics, and the happiness research has become a hot topic in social sciences in Western countries in particular in economics recently. Nevertheless there is a considerable scientific pessimism over whether it is even possible to affect sustainable increases in happiness.In this paper we outline an economic theory of decision based on the greatest happiness principle (GHP. Modern equilibrium economics is a simple system simplification of the GHP, the complex approach outlines a non-equilibrium economic theory. The comparison of the approaches reveals the fact that the part of the results – laws of modern economics – follow from the simplifications and they are against the economic nature. The most important consequence is that within the free market economy one cannot be sure that the path found by it leads to a beneficial economic system.

  3. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  4. Masses of galaxies and the greatest redshifts of quasars

    Energy Technology Data Exchange (ETDEWEB)

    Hills, J G [Illinois Univ., Urbana (USA)

    1977-04-01

    The outer parts of a typical galaxy follows an R/sup -2/ density distribution which results in the collapse time of its protogalaxy being proportional to its mass. Since quasars probably occur in the nuclei of galaxies which can only form after the collapse of their parent galaxies, their greatest observed redshift, Zsub(max), is largely determined by the mass, Msub(t), of a typical protogalaxy. The observed Zsub(max) of quasars indicates that Msub(t) = 1 x 10/sup 12/ solar masses. This mass is consistent with the masses of galaxies found in recent dynamical studies. It indicates that most of the mass in a typical galaxy is in the halo lying beyond the familiar optically-bright core, but the mass of a standard galaxy is still only 0.3 of that required for galaxies alone to close the universe.

  5. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    Energy Technology Data Exchange (ETDEWEB)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  6. About Security in Contemporary World

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2015-06-01

    Full Text Available The task to ensure security in contemporary world is a complicated political, scientific-technological and socio-economic problem. As the security itself is complicated, multifactor and hierarchized phenomen also its investigation has to be of an interdisciplinary character. The character of security environment, the character of security risks and threats and also the character of tools for their elimination are essentially changing. The basis to security of social subject consisted in arrangement of the conditions for their existence, to surviving in the present time and advancement into the future. Assurance of this condition means it provided ability to the social subjects to eliminated threats that are defined. In situations of asymmetrical security, the threats are not always clearly defined. They often consist of their own structure systems, in relationships and status the subjects of internationals relations. Asymmetrical of security, by our opinion, presents a discrepancy, unbalance, non-parity between subjects of the international security environment. The unbalance, discrepancy, non-parity has political, military, economic, law, social and societal dimensions.

  7. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  8. Contemporary jewelry definitions

    Directory of Open Access Journals (Sweden)

    Marlon Aparecido Mercaldi

    2016-12-01

    Full Text Available Contemporary jewelry terminology is open to many criticism and weaknesses as it is confronted with the classic definition of jewelry and also often attached to the historical widespread idea of adornment and jewelry to modernity. Therefore one of the this article issues is to approach about what it is contemporary jewelry and how it can be defined. Thus, we present the topics related to the jewel discussion in contemporary times that are organized into a set of assumptions and approaches that help us provide an overview about the contemporary jewelry.

  9. Contemporary Art from Denmark

    DEFF Research Database (Denmark)

    Bonde, Lisbeth

    2014-01-01

    Danish contemporary art is currently expanding bot quantitatively and qualitatively to such a degree that we can speak of a new Danish Golden Age. The article introduces some of the most interesting, Danish contemporary artists which are being exposed at the exhibition in the European Central Bank...

  10. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  11. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  12. Impact of Human Security Threats on Leadership and Political ...

    African Journals Online (AJOL)

    Human security threats in contemporary Africa have become a major political challenge. Whether it involves sectional conflicts, kidnapping, human trafficking, armed robbery they have continued to exert a far reaching impact on the leadership and political stability in the region. This paper is therefore an attempt to examine ...

  13. Celebrity and contemporary context

    Directory of Open Access Journals (Sweden)

    Paula Guimarães Simões

    2014-12-01

    Full Text Available This paper discusses the hermeneutic power of a celebrity (seen from the concept of event, seeking to understand what it reveals about the contemporary context. Based on this premise, we attempt to recognize some aspects of contemporary social life that emerge from the trajectory of a specific celebrity: the former soccer player Ronaldo Fenômeno. This analysis brings to light the hermeneutic power of Ronaldo, i.e., how his life story reveals characteristics of contemporary social life. Individualism, machismo, emphasis on a heteronormative ideal, shifts in the construction of romantic relationships, and the overlapping spheres of public and private life, are some important aspects of contemporary society revealed by this analysis.

  14. Contemporary Obstetric Triage.

    Science.gov (United States)

    Sandy, Edward Allen; Kaminski, Robert; Simhan, Hygriv; Beigi, Richard

    2016-03-01

    The role of obstetric triage in the care of pregnant women has expanded significantly. Factors driving this change include the Emergency Medical Treatment and Active Labor Act, improved methods of testing for fetal well-being, increasing litigation risk, and changes in resident duty hour guidelines. The contemporary obstetric triage facility must have processes in place to provide a medical screening examination that complies with regulatory statues while considering both the facility's maternal level of care and available resources. This review examines the history of the development of obstetric triage, current considerations in a contemporary obstetric triage paradigm, and future areas for consideration. An example of a contemporary obstetric triage program at an academic medical center is presented. A successful contemporary obstetric triage paradigm is one that addresses the questions of "sick or not sick" and "labor or no labor," for every obstetric patient that presents for care. Failure to do so risks poor patient outcome, poor patient satisfaction, adverse litigation outcome, regulatory scrutiny, and exclusion from federal payment programs. Understanding the role of contemporary obstetric triage in the current health care environment is important for both providers and health care leadership. This study is for obstetricians and gynecologists as well as family physicians. After completing this activity, the learner should be better able to understand the scope of a medical screening examination within the context of contemporary obstetric triage; understand how a facility's level of maternal care influences clinical decision making in a contemporary obstetric triage setting; and understand the considerations necessary for the systematic evaluation of the 2 basic contemporary obstetric questions, "sick or not sick?" and "labor or no labor?"

  15. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  16. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  17. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  18. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  19. Contemporary engineering economics

    CERN Document Server

    Park, Chan S

    2011-01-01

    Contemporary Engineering Economics, 5/e, is intended for undergraduate engineering students taking introductory engineering economics while appealing to the full range of engineering disciplines for which this course is often required: industrial, civil, mechanical, electrical, computer, aerospace, chemical, and manufacturing engineering, as well as engineering technology. This edition has been thoroughly revised and updated while continuing to adopt a contemporary approach to the subject, and teaching, of engineering economics. This text aims not only to build a sound and comprehensive coverage of engineering economics, but also to address key educational challenges, such as student difficulty in developing the analytical skills required to make informed financial decisions.

  20. Contemporary plasma physics

    International Nuclear Information System (INIS)

    Sodha, M.S.; Tewari, D.P.; Subbarao, D.

    1983-01-01

    The book consists of review articles on some selected contemporary aspects of plasma physics. The selected topics present a panoramic view of contemporary plasma physics and applications to fusion, space and MHD power generation. Basic non-linear plasma theory is also covered. The book is supposed to be useful for M.S./M.Sc. students specialising in plasma physics and for those beginning research work in plasma physics. It will also serve as a valuable reference book for more advanced research workers. (M.G.B.)

  1. Perspectives on contemporary mysticism.

    Science.gov (United States)

    Thayer, N S

    1979-07-01

    Contemporary mysticism is in continuity with religious mysticism of all ages. Mysticism, like all religion, has an ideological and an experiential dimension. Traditional Freudian theory is inadequate for understanding either the ideological or the cognitive aspect, because it does not adequately account for either the cognitive process or the self-conscious "I." Categories of both ego psychology and the social scientific approach to religion illuminate contemporary mysticism in ways unavailable to the traditional Freudian psychoanalytic approach. The epistemological implications of the mystical attitude are considered, in both the religious and the scientific enterprises.

  2. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  3. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  4. Contemporary theories of democracy

    Directory of Open Access Journals (Sweden)

    Mladenović Ivan

    2008-01-01

    Full Text Available The aim of this paper is two-fold: first, to analyze several contemporary theories of democracy, and secondly, to propose a theoretical framework for further investigations based on analyzed theories. The following four theories will be analyzed: pluralism, social choice theory, deliberative democracy and participatory democracy.

  5. Contemporary Famine Analysis

    DEFF Research Database (Denmark)

    Rubin, Olivier

    to the newer economic approaches based on Amartya Sen. While all approaches contribute with important insights on famine dynamics, they also struggle to capture the political dimension of contemporary famines. The Brief develops a political approach capable of addressing this important but messy political...

  6. Heutiges Russisch (Contemporary Russian)

    Science.gov (United States)

    Russisch, 1976

    1976-01-01

    For the purpose of supplying information on actual contemporary Russian usage, this article excerpts sections on noun usage and variations of the genitive ending in the masculine singular from "Stilistik der russischen Sprache" (Russian Language Style) by D. Rosental and M. Telenkowa. (Text is in German.) (FB)

  7. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction

  8. TREND MECHANISMS IN CONTEMPORARY FASHION

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    2013-01-01

    Explores a spatial approach to trend mechanisms that is argued to be more contemporary than the traditional temporal appraoch.......Explores a spatial approach to trend mechanisms that is argued to be more contemporary than the traditional temporal appraoch....

  9. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  10. The greatest hydroelectric power plant in the world. Itaipu Hydroelectric Power Plant

    International Nuclear Information System (INIS)

    Andonov - Chento, Ilija

    2004-01-01

    Details to demonstrate the size and engineering achievements of one of the world's greatest hydroelectric power plant are given. Principal technical features of construction and operation of the Itaipu Dam are tabulated and discussed

  11. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  12. Applying contemporary statistical techniques

    CERN Document Server

    Wilcox, Rand R

    2003-01-01

    Applying Contemporary Statistical Techniques explains why traditional statistical methods are often inadequate or outdated when applied to modern problems. Wilcox demonstrates how new and more powerful techniques address these problems far more effectively, making these modern robust methods understandable, practical, and easily accessible.* Assumes no previous training in statistics * Explains how and why modern statistical methods provide more accurate results than conventional methods* Covers the latest developments on multiple comparisons * Includes recent advanc

  13. UNLEARNED LESSONS OF CONTEMPORARY HISTORY

    Directory of Open Access Journals (Sweden)

    А Н Данилов

    2017-12-01

    Full Text Available The article considers the complex geopolitical situation in the global world at the end of the second decade of the 21st century as determined by the consequences of the collapse of the Soviet Union and by the new world order. The author seeks to answer the questions who will define the current geopolitical situation, whose aims it will reflect, what will become the basis of new geopolitical realities, the basis of moral solidarity of humankind, and the spiritual basis of future civilizations. The new challenges give rise to a desperate struggle for different scenarios for building a happy life. Moreover, it is not clear which ideal of the future world will be widely supported as a development guideline. The recognition as such of the standard of living and development of the strongest ones becomes a real threat to the new civilization for it leads to the loss of national interests of sovereign states, and to the loss of an independent future. Today, there is an active search for new theories and concepts that will adequately explain con-temporary global processes. In this thematic context, the author identifies main lessons not learned by the world political elites. The first lesson: new states are not born in an empty place, their common history is a great advantage ensuring prospects for the further development of interstate cooperation. The second lesson: the widespread falsification of history has a negative impact on national, cultural and social-group identity in transforming societies. The third lesson: after the collapse of the Soviet Union, the post-war balance of power was destroyed together with the system of checks and balances in world politics (a bipolar model of the world. The fourth lesson: under radical social transformations, the moral system of the population devaluates with numerous crisis consequences.

  14. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  15. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  16. Contemporary evolution strategies

    CERN Document Server

    Bäck, Thomas; Krause, Peter

    2013-01-01

    Evolution strategies have more than 50 years of history in the field of evolutionary computation. Since the early 1990s, many algorithmic variations of evolution strategies have been developed, characterized by the fact that they use the so-called derandomization concept for strategy parameter adaptation. Most importantly, the covariance matrix adaptation strategy (CMA-ES) and its successors are the key representatives of this group of contemporary evolution strategies. This book provides an overview of the key algorithm developments between 1990 and 2012, including brief descriptions of the a

  17. Globalizing Contemporary War

    OpenAIRE

    Melissa Zisler

    2009-01-01

    There are a plethora of social problems present throughout theworld in which America has deemed a type of ‘war.’ Some of theseunconventional wars include: The War on Poverty presented in 1964; The War on Drugs announced in 1971; The War on Cancer commencing in1971; The War Against Illiteracy beginning in the 1970s; and afterSeptember 11, 2001 The War on Terror was announced (Raz, 2008).These contemporary ‘wars’ have transformed the meaning of the word‘war.’ Labeling these missions ‘wars,’ pre...

  18. Will Climate Change, Genetic and Demographic Variation or Rat Predation Pose the Greatest Risk for Persistence of an Altitudinally Distributed Island Endemic?

    Directory of Open Access Journals (Sweden)

    Alison Shapcott

    2012-11-01

    Full Text Available Species endemic to mountains on oceanic islands are subject to a number of existing threats (in particular, invasive species along with the impacts of a rapidly changing climate. The Lord Howe Island endemic palm Hedyscepe canterburyana is restricted to two mountains above 300 m altitude. Predation by the introduced Black Rat (Rattus rattus is known to significantly reduce seedling recruitment. We examined the variation in Hedyscepe in terms of genetic variation, morphology, reproductive output and demographic structure, across an altitudinal gradient. We used demographic data to model population persistence under climate change predictions of upward range contraction incorporating long-term climatic records for Lord Howe Island. We also accounted for alternative levels of rat predation into the model to reflect management options for control. We found that Lord Howe Island is getting warmer and drier and quantified the degree of temperature change with altitude (0.9 °C per 100 m. For H. canterburyana, differences in development rates, population structure, reproductive output and population growth rate were identified between altitudes. In contrast, genetic variation was high and did not vary with altitude. There is no evidence of an upward range contraction as was predicted and recruitment was greatest at lower altitudes. Our models predicted slow population decline in the species and that the highest altitude populations are under greatest threat of extinction. Removal of rat predation would significantly enhance future persistence of this species.

  19. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  20. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  1. The Contemporary Consultant

    DEFF Research Database (Denmark)

    Olson, Thomas; Poulfelt, Flemming; Greiner, Larry

    This book complements The handbook of Management Consulting: The Contemporary Consultant: Insights from Leading Experts, 1e but can also be studied separately. The book consists of 20 cases including Harvard and Stanford cases. The cases present the broad range of topics that are pertinent to cur...... current management issues facing consulting firms. These cases, together with the handbook, will prepare consultants and other business managers for a successful future in a highly competitive consulting environment.......This book complements The handbook of Management Consulting: The Contemporary Consultant: Insights from Leading Experts, 1e but can also be studied separately. The book consists of 20 cases including Harvard and Stanford cases. The cases present the broad range of topics that are pertinent...... to current management consulting. Each of the four parts of the text presents a cogent introduction by the editors, delineating topics that are critical for today's consultants to understand. The cases represent major practice areas of consulting and afford new insights into change processes and other...

  2. School Issues Under [Section] 504 and the ADA: The Latest and Greatest.

    Science.gov (United States)

    Aleman, Steven R.

    This paper highlights recent guidance and rulings from the Office of Civil Rights (OCR) of interest to administrators, advocates, and attorneys. It is a companion piece to Student Issues on SectionNB504/ADA: The Latest and Greatest. Compliance with SectionNB504 and the Americans with Disabilities Act (ADA) continues to involve debate and dialog on…

  3. Stigma and Discrimination in HIV/AIDS; The greatest Challenge to ...

    African Journals Online (AJOL)

    The greatest challenge to the efforts of the various agencies and governments in the care, support and treatment of people living with HIV/AIDS, appears to be stigma and discrimination. Stigma and discrimination has to be addressed through public education, legislation to protect people living with HIV/AIDS and also by ...

  4. FedWeb Greatest Hits: Presenting the New Test Collection for Federated Web Search

    NARCIS (Netherlands)

    Demeester, Thomas; Trieschnigg, Rudolf Berend; Zhou, Ke; Nguyen, Dong-Phuong; Hiemstra, Djoerd

    This paper presents 'FedWeb Greatest Hits', a large new test collection for research in web information retrieval. As a combination and extension of the datasets used in the TREC Federated Web Search Track, this collection opens up new research possibilities on federated web search challenges, as

  5. Fish species of greatest conservation need in wadeable Iowa streams: current status and effectiveness of Aquatic Gap Program distribution models

    Science.gov (United States)

    Sindt, Anthony R.; Pierce, Clay; Quist, Michael C.

    2012-01-01

    Effective conservation of fish species of greatest conservation need (SGCN) requires an understanding of species–habitat relationships and distributional trends. Thus, modeling the distribution of fish species across large spatial scales may be a valuable tool for conservation planning. Our goals were to evaluate the status of 10 fish SGCN in wadeable Iowa streams and to test the effectiveness of Iowa Aquatic Gap Analysis Project (IAGAP) species distribution models. We sampled fish assemblages from 86 wadeable stream segments in the Mississippi River drainage of Iowa during 2009 and 2010 to provide contemporary, independent fish species presence–absence data. The frequencies of occurrence in stream segments where species were historically documented varied from 0.0% for redfin shiner Lythrurus umbratilis to 100.0% for American brook lampreyLampetra appendix, with a mean of 53.0%, suggesting that the status of Iowa fish SGCN is highly variable. Cohen's kappa values and other model performance measures were calculated by comparing field-collected presence–absence data with IAGAP model–predicted presences and absences for 12 fish SGCN. Kappa values varied from 0.00 to 0.50, with a mean of 0.15. The models only predicted the occurrences of banded darterEtheostoma zonale, southern redbelly dace Phoxinus erythrogaster, and longnose daceRhinichthys cataractae more accurately than would be expected by chance. Overall, the accuracy of the twelve models was low, with a mean correct classification rate of 58.3%. Poor model performance probably reflects the difficulties associated with modeling the distribution of rare species and the inability of the large-scale habitat variables used in IAGAP models to explain the variation in fish species occurrences. Our results highlight the importance of quantifying the confidence in species distribution model predictions with an independent data set and the need for long-term monitoring to better understand the

  6. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  7. Trends in contemporary mathematics

    CERN Document Server

    Strickland, Elisabetta

    2014-01-01

    This book covers a wide spectrum of hot topics and current trends in mathematics, including noncommutative algebra via deformation theory,  optimal transportation, nonlinear potential theory, kinetic theory and gas dynamics, geometric numerical integration, finite simple groups of small essential dimension, optimal control problems, extended Dynkin diagrams, spin glasses, aspherical closed manifolds, Boltzmann systems, birational geometry of projective varieties and directed graphs, nonlinear diffusion, geometric constructions of extremal metrics on complex manifolds, and Pell’s equation in polynomials. The book comprises a selection of contributions by leading international mathematicians who were speakers at the "INdAM Day", an initiative dating back to 2004 at which the most recent developments in contemporary mathematics are presented.

  8. Contemporary Transitional Justice

    DEFF Research Database (Denmark)

    Gissel, Line Engbo

    2017-01-01

    This article studies the contemporary expression of transitional justice, a field of practice through which global governance is exercised. It argues that transitional justice is being normalised, given the normative and empirical de-legitimisation of its premise of exceptionalism. The article...... theorises exceptionalism and normalcy in transitional justice and identifies three macro-level causes of normalisation: the legalisation, internationalisation, and professionalization of the field. This argument is illustrated by a study of Uganda’s trajectory of transitional justice since 1986. Across five...... phases of transitional justice, processes of legalisation, internationalisation, and professionalization have contributed to the gradual dismantling of the country’s exceptional justice. The case demonstrates, further, that normalization is a contested and incomplete process....

  9. The Contemporary Goffman

    DEFF Research Database (Denmark)

    Despite aversion to famedom, idolatry and cults of intellectual celebrity, Erving Goffman was one of the leading and most original sociologists of the 20th century. This book takes him into the 21st century. The Contemporary Goffman offers a wide range of readings, interpretations and applications...... of the work of Erving Goffman by a host of international scholars. Some chapters grapple with the personal background and academic ascendency of Goffman, while others wrestle with his continued relevance to a variety of disciplines and sub-disciplines. Some of the chapters included deal with developments...... unforeseeable in Goffman's own lifetime such as the invention of the internet and mobile telephones, the rise of global tourism and everyday mobility as well as the emergence of a new cult of individualism, while other chapters locate his perspective within recent developments in social theory...

  10. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  11. How Do Environmental Issues Contribute to Regional Instability? and Which Regions Will Pose the Greatest Threat to U.S. Security as a Result of Environmental Degredation?

    National Research Council Canada - National Science Library

    Schantz, Blair

    1998-01-01

    .... The primary objective of this research is to determine and define how environmental issues contribute to regional political, economic or physical instability and then apply this definition to the regions of the world...

  12. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  13. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  14. Life and styles of contemporary African artists: a biography of Jaji M ...

    African Journals Online (AJOL)

    It is a consensus among scholars that the greatest contributions of Africans to civilization are in the arts. Great European artists like Pablo Picasso, Georges Braque and others had to copy African art styles to change the face of European art in the early 20th century. Today, contemporary African artists have the zeal and ...

  15. Greatest Happiness Principle in a Complex System: Maximisation versus Driving Force

    Directory of Open Access Journals (Sweden)

    Katalin Martinás

    2012-06-01

    Full Text Available From philosophical point of view, micro-founded economic theories depart from the principle of the pursuit of the greatest happiness. From mathematical point of view, micro-founded economic theories depart from the utility maximisation program. Though economists are aware of the serious limitations of the equilibrium analysis, they remain in that framework. We show that the maximisation principle, which implies the equilibrium hypothesis, is responsible for this impasse. We formalise the pursuit of the greatest happiness principle by the help of the driving force postulate: the volumes of activities depend on the expected wealth increase. In that case we can get rid of the equilibrium hypothesis and have new insights into economic theory. For example, in what extent standard economic results depend on the equilibrium hypothesis?

  16. Social Media - DoD’s Greatest Information Sharing Tool or Weakest Security Link?

    Science.gov (United States)

    2010-04-15

    or position of the Department of the Army, Department of Defense, or the U.S. Government. SOCIAL MEDIA – DOD’S GREATEST INFORMATION SHARING TOOL...appropriateness and effectiveness of these policies in securing the information network. 15. SUBJECT TERMS Social media , information...TYPE Civilian Research Paper 3. DATES COVERED (From - To) August 2009-April 2010 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Social Media

  17. The conditions for attaining the greatest degree of system stability with strict generator excitation control

    Energy Technology Data Exchange (ETDEWEB)

    Gruzdev, I.A.; Ekimova, M.M.; Truspekova, G.A.

    1982-01-01

    Expressions are derived for an idealized model of a complex electric power system; these expressions define the greatest level of stability of an electric power system and the optimum combination of stabilization factors with automatic excitation control in a single power system. The possibility of increasing the level of stability of an electric power system with simultaneous strict automatic excitation control of the synychronous generators in several power systems is analyzed.

  18. Asymptotics for the greatest zeros of solutions of a particular O.D.E.

    Directory of Open Access Journals (Sweden)

    Silvia Noschese

    1994-05-01

    Full Text Available This paper deals with the Liouville-Stekeloff method for approximating solutions of homogeneous linear ODE and a general result due to Tricomi which provides estimates for the zeros of functions by means of the knowledge of an asymptotic representation. From the classical tools we deduce information about the asymptotics of the greatest zeros of a class of solutions of a particular ODE, including the classical Hermite polynomials.

  19. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  20. Contemporary sensorimotor theory

    CERN Document Server

    Martin, Andrew

    2014-01-01

    This book analyzes the philosophical foundations of sensorimotor theory and discusses the most recent applications of sensorimotor theory to human computer interaction, child’s play, virtual reality, robotics, and linguistics. Why does a circle look curved and not angular? Why does red not sound like a bell? Why, as I interact with the world, is there something it is like to be me? An analytic philosopher might suggest: ``if we ponder the concept of circle we find that it is the essence of a circle to be round’’. However, where does this definition come from? Was it set in stone by the Gods, in other words by divine arbiters of circleness, redness and consciousness? Particularly, with regard to visual consciousness, a first attempt to explain why our conscious experience of the world appears as it does has been attributed to Kevin O’Regan and Alva Noe, who published their sensorimotor account of vision and visual consciousness in 2001. Starting with a chapter by Kevin O’Regan, Contemporary Sensorimo...

  1. Sadum: Traditional and Contemporary

    Directory of Open Access Journals (Sweden)

    Ratna Panggabean

    2009-07-01

    Full Text Available Sadum is one of the traditional cloths of the Batak people in North Sumatra. It is woven on a back strap loom with supplementary weft technique. Sadum is a warp faced weaving made of cotton and beads woven into the cloth. Ritually it is used as a shoulder cloth, gifts exchanges, and in dances. It also bears the symbol of good tidings and blessings for the receiver. The cloth has change during times in technique, color, patterns, as well as in functions. But the use as a ritual cloth stays the same. The basic weaving techniques and equipments used to create it hasn’t change, but its material and added techniques has made this cloth become more rich in color, pattern, and texture. Most changes began when the Europeans came to Indonesia and introduced new material such as synthetic fibers and colors. In the 70s traditional cloth of Indonesia got its boost when the government declared batik as Indonesian national attire. This encourages other traditional weavings to develop into contemporary clothing. Later, new techniques and material were introduced to the Sadum weavings including embroidery, silk and golden threads which were never used before.

  2. Ribosomal Antibiotics: Contemporary Challenges

    Directory of Open Access Journals (Sweden)

    Tamar Auerbach-Nevo

    2016-06-01

    Full Text Available Most ribosomal antibiotics obstruct distinct ribosomal functions. In selected cases, in addition to paralyzing vital ribosomal tasks, some ribosomal antibiotics are involved in cellular regulation. Owing to the global rapid increase in the appearance of multi-drug resistance in pathogenic bacterial strains, and to the extremely slow progress in developing new antibiotics worldwide, it seems that, in addition to the traditional attempts at improving current antibiotics and the intensive screening for additional natural compounds, this field should undergo substantial conceptual revision. Here, we highlight several contemporary issues, including challenging the common preference of broad-range antibiotics; the marginal attention to alterations in the microbiome population resulting from antibiotics usage, and the insufficient awareness of ecological and environmental aspects of antibiotics usage. We also highlight recent advances in the identification of species-specific structural motifs that may be exploited for the design and the creation of novel, environmental friendly, degradable, antibiotic types, with a better distinction between pathogens and useful bacterial species in the microbiome. Thus, these studies are leading towards the design of “pathogen-specific antibiotics,” in contrast to the current preference of broad range antibiotics, partially because it requires significant efforts in speeding up the discovery of the unique species motifs as well as the clinical pathogen identification.

  3. Contemporary sea level rise.

    Science.gov (United States)

    Cazenave, Anny; Llovel, William

    2010-01-01

    Measuring sea level change and understanding its causes has considerably improved in the recent years, essentially because new in situ and remote sensing observations have become available. Here we report on most recent results on contemporary sea level rise. We first present sea level observations from tide gauges over the twentieth century and from satellite altimetry since the early 1990s. We next discuss the most recent progress made in quantifying the processes causing sea level change on timescales ranging from years to decades, i.e., thermal expansion of the oceans, land ice mass loss, and land water-storage change. We show that for the 1993-2007 time span, the sum of climate-related contributions (2.85 +/- 0.35 mm year(-1)) is only slightly less than altimetry-based sea level rise (3.3 +/- 0.4 mm year(-1)): approximately 30% of the observed rate of rise is due to ocean thermal expansion and approximately 55% results from land ice melt. Recent acceleration in glacier melting and ice mass loss from the ice sheets increases the latter contribution up to 80% for the past five years. We also review the main causes of regional variability in sea level trends: The dominant contribution results from nonuniform changes in ocean thermal expansion.

  4. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  5. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  6. Motivation for Aggressive Religious Radicalization: Goal Regulation Theory and a Personality × Threat × Affordance Hypothesis

    OpenAIRE

    Ian eMcGregor; Joseph eHayes; Mike ePrentice; Mike ePrentice

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization. It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward aggressive religious radicalization. Conducive personality traits are oppositional, anxi...

  7. The Contemporary Gorky Studies

    Directory of Open Access Journals (Sweden)

    Lidya A. Spiridonova

    2016-12-01

    Full Text Available The A. M. Gorky Institute of World Literature is acknowledged center of the international Gorky Studies. The paper discusses all the stages of the development of the Gorky research from 1937 to the present. The Institute published: Gorky’s collected works in 30 volumes (1949–1955, complete academic edition of his fictional works in 25 volumes, and 10 volumes of their editions (1968–1980. It is publishing a second series of Letters in 24 volumes (18 volumes have come out in the period from 1997 through 2016. Among other publications, there are 12 volumes of the Gorky archives, 3 volumes of his Literary Heritage, and proceedings of the annual “Gorky Readings.” A new phase of Gorky Studies began after the abandonment of a Marxist-Leninist approach to literary studies. This phase is characterized by the objectivity of scholarly analysis, focus on the obscure spots of Gorky’s biography and work, and use of the hitherto unknown archival materials. In parallel to the publication of Letters (a third part of letters in each volume is published for the first time, IWL resumed a series entitled M. Gorky. Materials and Research: in 1998–2016 there were published 13 collections, now two more are getting ready for publication. These editions include Gorky’s correspondence with V. Lenin, I. Stalin, L. Kamenev, G. Zinoviev, G. Berya and others, documentary testimony of the writer’s ailment and death, and hitherto unknown memories of his contemporaries. The serial publication of Gorky Readings reflects the work of the annual academic conferences held in Moscow, Nizhny Novgorod, and Kazan. These proceedings have rendered Gorky Studies to a new methodological level in that they attempt to reveal the face of the “real” Gorky, deprived of both a classical gloss and unjustified denigration.

  8. Northeast and Midwest regional species and habitats at greatest risk and most vulnerable to climate impacts

    Science.gov (United States)

    Staudinger, Michelle D.; Hilberg, Laura; Janowiak, Maria; Swanton, C.O.

    2016-01-01

    The objectives of this Chapter are to describe climate change vulnerability, it’s components, the range of assessment methods being implemented regionally, and examples of training resources and tools. Climate Change Vulnerability Assessments (CCVAs) have already been conducted for numerous Regional Species of Greatest Conservation Need and their dependent 5 habitats across the Northeast and Midwest. This chapter provides a synthesis of different assessment frameworks, information on the locations (e.g., States) where vulnerability assessments were conducted, lists of individual species and habitats with their respective vulnerability rankings, and a comparison of how vulnerability rankings were determined among studies.

  9. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  10. Literacy in the contemporary scene

    Directory of Open Access Journals (Sweden)

    Angela B. Kleiman

    2014-11-01

    Full Text Available In this paper I examine the relationship between literacy and contemporaneity. I take as a point of departure for my discussion school literacy and its links with literacies in other institutions of the contemporary scene, in order to determine the relation between contemporary ends of reading and writing (in other words, the meaning of being literate in contemporary society and the practices and activities effectively realized at school in order to reach those objectives. Using various examples from teaching and learning situations, I discuss digital literacy practices and multimodal texts and multiliteracies from both printed and digital cultures. Throughout, I keep as a background for the discussion the functions and objectives of school literacy and the professional training of teachers who would like to be effective literacy agents in the contemporary world.

  11. Contemporary Journal of African Studies

    African Journals Online (AJOL)

    Contemporary Journal of African Studies. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 3, No 1 (2015) >. Log in or Register to get access to full text downloads.

  12. Randomness in Contemporary Graphic Art

    OpenAIRE

    Zavřelová, Veronika

    2016-01-01

    Veronika Zavřelová Bachelor thesis Charles University in Prague, Faculty of Education, Department of Art Education Randomness in contemporary graphic art imaginative picture card game ANNOTATION This (bachelor) thesis concerns itself with a connection between verbal and visual character system within the topic of Randomness in contemporary graphic art - imaginative picture card game. The thesis is mainly based on the practical part - exclusively created card game Piktim. The card game uses as...

  13. Coping and acceptance: the greatest challenge for veterans with intestinal stomas.

    Science.gov (United States)

    Krouse, Robert S; Grant, Marcia; Rawl, Susan M; Mohler, M Jane; Baldwin, Carol M; Coons, Stephen Joel; McCorkle, Ruth; Schmidt, C Max; Ko, Clifford Y

    2009-03-01

    Intestinal stomas (ostomies) create challenges for veterans. The goal of this qualitative analysis was to understand better patients' perspectives regarding their greatest challenge. Ostomates at three Veterans Affairs locations were surveyed using the modified City of Hope Quality of Life-Ostomy questionnaire that contained an open-ended request for respondents to describe their greatest challenge. The response rate was 51% (239 of 467); 68% (163 of 239) completed the open-ended item. Content analysis was performed by an experienced qualitative research team. Coping and acceptance were the most commonly addressed themes. The most frequently expressed issues and advice were related to a need for positive thinking and insight regarding adjustment over time. Coping strategies included the use of humor, recognition of positive changes resulting from the stoma, and normalization of life with an ostomy. Coping and acceptance are common themes described by veterans with an intestinal stoma. Health-care providers can assist veterans by utilizing ostomate self-management strategies, experience, and advice.

  14. The greatest challenges reported by long-term colorectal cancer survivors with stomas.

    Science.gov (United States)

    McMullen, Carmit K; Hornbrook, Mark C; Grant, Marcia; Baldwin, Carol M; Wendel, Christopher S; Mohler, M Jane; Altschuler, Andrea; Ramirez, Michelle; Krouse, Robert S

    2008-04-01

    This paper presents a qualitative analysis of the greatest challenges reported by long-term colorectal cancer survivors with ostomies. Surveys that included an open-ended question about challenges of living with an ostomy were administered at three Kaiser Permanente regions: Northern California, Northwest, and Hawaii. The study was coordinated at the Southern Arizona Veterans Affairs Health Care System in Tucson. The City of Hope Quality of Life Model for Ostomy Patients provided a framework for the study's design, measures, data collection, and data analysis. The study's findings may be generalized broadly to community settings across the United States. Results replicate those of previous research among veterans, California members of the United Ostomy Association, Koreans with ostomies, and colorectal cancer survivors with ostomies residing in the United Kingdom. The greatest challenges reported by 178 colorectal cancer survivors with ostomies confirmed the Institute of Medicine's findings that survivorship is a distinct, chronic phase of cancer care and that cancer's effects are broad and pervasive. The challenges reported by study participants should inform the design, testing and integration of targeted education, early interventions, and ongoing support services for colorectal cancer patients with ostomies.

  15. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  16. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  17. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  18. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  19. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  20. Contemporary Arctic Sea Level

    Science.gov (United States)

    Cazenave, A. A.

    2017-12-01

    During recent decades, the Arctic region has warmed at a rate about twice the rest of the globe. Sea ice melting is increasing and the Greenland ice sheet is losing mass at an accelerated rate. Arctic warming, decrease in the sea ice cover and fresh water input to the Arctic ocean may eventually impact the Arctic sea level. In this presentation, we review our current knowledge of contemporary Arctic sea level changes. Until the beginning of the 1990s, Arctic sea level variations were essentially deduced from tide gauges located along the Russian and Norwegian coastlines. Since then, high inclination satellite altimetry missions have allowed measuring sea level over a large portion of the Arctic Ocean (up to 80 degree north). Measuring sea level in the Arctic by satellite altimetry is challenging because the presence of sea ice cover limits the full capacity of this technique. However adapted processing of raw altimetric measurements significantly increases the number of valid data, hence the data coverage, from which regional sea level variations can be extracted. Over the altimetry era, positive trend patterns are observed over the Beaufort Gyre and along the east coast of Greenland, while negative trends are reported along the Siberian shelf. On average over the Arctic region covered by satellite altimetry, the rate of sea level rise since 1992 is slightly less than the global mea sea level rate (of about 3 mm per year). On the other hand, the interannual variability is quite significant. Space gravimetry data from the GRACE mission and ocean reanalyses provide information on the mass and steric contributions to sea level, hence on the sea level budget. Budget studies show that regional sea level trends over the Beaufort Gyre and along the eastern coast of Greenland, are essentially due to salinity changes. However, in terms of regional average, the net steric component contributes little to the observed sea level trend. The sea level budget in the Arctic

  1. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  2. "Pinheads": the exhibition of neurologic disorders at "The Greatest Show on Earth".

    Science.gov (United States)

    Mateen, Farrah J; Boes, Christopher J

    2010-11-30

    The circus sideshow was a smorgasbord of human performers, shrewdly designed to entertain the middle-class public and exploit the attitudes of the time. Under the vernacular of "pinheads," people with microcephaly and mental retardation were displayed as "freaks." This article presents original materials from the Ringling Brothers Circus Museum Archives and Harvard Theater Collection, including sideshow banners, circus programs, song lyrics, and performance photographs, in addition to contemporary newspaper articles, major medical journal publications, and other secondary sources regarding microcephaly in the 19th and early 20th century circuses. More than 20 performers were exhibited as "pinheads," popularly portrayed as "missing links" or children from lost civilizations. People with neurologic disorders were displayed as wild and juvenile and thus, joined a series of hoaxes of the American sideshow. Although incomplete data exist on their true lives, the exhibition of people with microcephaly eventually declined due to protective laws passed in part due to the American circus "freak shows."

  3. Governability in Contemporary Mexico

    Directory of Open Access Journals (Sweden)

    Leonardo Curzio Gutiérrez

    1998-04-01

    Full Text Available Given the difficulties to establish a concept of governability and the frequent ideological usage of the term, it is much more operative to turn to the principle of governability, in the broad sense, which supports itself on five pillars: the political legitimacy of the government, the governmental efficiency to attend to the demands of society, the existence of shared social project, the agreement with the principle special interest groups, and international viability. The analysis of the structure and relevance of these five points during the long period of political transition that Mexico underwent between 1988 and 1997 shows how it was possible for this country to play off certain factors against each other in order to secure governability and safeguard against the consequences of any resultant imbalances. Between 1998-1993, the government of Salinas de Gotari based itself on the viability of a neoliberal project within an international context, and on this projectís attention to domestic demands as well as on the governmentís pact with elites. Institutional integration and legitimacy made up, then, for a process of discreet liberalization and the lack of democratic electoral commitment, which culminated in the PRI’s 1994 elections victory.The assassination of Colosia, though, and the appearance of the EZLN and the subsequent crisis surrounding the peso’s devaluation that accompanied Ernesto Zedilloís rise to power soon led to the collapse of those pillars of support. Crowning the process of the silenttransition were the elections of 1997, which makes it possible to say that in Mexico today there are now smooth elections, but that reform of the State is still unresolved —a subject that includes the reduction of the president’s competence. Seen in the short term, the most direct threats to Mexico’s governability will come as a result of the lack of attention to those demands of society’s underprivileged and the ill

  4. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  5. Reducing mortality from childhood pneumonia: The leading priority is also the greatest opportunity

    Directory of Open Access Journals (Sweden)

    Igor Rudan

    2013-06-01

    Full Text Available Pneumonia and diarrhoea have been the leading causes of global child mortality for many decades. The work of Child Health Epidemiology Reference Group (CHERG has been pivotal in raising awareness that the UN's Millennium Development Goal 4 cannot be achieved without increased focus on preventing and treating the two diseases in low– and middle–income countries. Global Action Plan for Pneumonia (GAPP and Diarrhoea Global Action Plan (DGAP groups recently concluded that addressing childhood pneumonia and diarrhoea is not only the leading priority but also the greatest opportunity in global health today: scaling up of existing highly cost–effective interventions could prevent 95% of diarrhoea deaths and 67% of pneumonia deaths in children younger than 5 years by the year 2025. The cost of such effort was estimated at about US$ 6.7 billion.

  6. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  7. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  8. Contemporary management of subtrochanteric fractures.

    Science.gov (United States)

    Joglekar, Siddharth B; Lindvall, Eric M; Martirosian, Armen

    2015-01-01

    Cephalomedullary interlocking nails that allow for trochanteric entry and minimally invasive fixation have revolutionized the contemporary management of subtrochanteric fractures with improved union rates and decreased incidence of fixation failure. The most successful alternative to intramedullary fixation remains the angled blade plate. Despite biomechanical superiority of contemporary intramedullary implants to previous intramedullary devices, the importance of achieving and maintaining satisfactory fracture reduction prior to and during hardware insertion cannot be overemphasized. In comminuted and more challenging fractures, additional techniques, such as limited open reduction with clamps and/or cables, can allow for canal restoration and more anatomic reductions prior to and/or during nail insertion. Published by Elsevier Inc.

  9. The Greatest Challenge Ever for Mankind, Requiring Policies of Accelerating Hardship and Implementation Difficulty

    Science.gov (United States)

    Wilson, John

    2015-04-01

    Providing energy for the contemporary world has resulted in a multi-variable problem in which a confluence of historical anomalies and economic, psychological, political, and demographic factors thwart efforts to prevent significant harm from increasing atmospheric CO2. This unlikely combination has created the perfect storm in which the warnings by scientists are ineffective. Global warming is occurring simultaneously with increased population, some dysfunctional political institutions, ascendency of oversimplified economic theory, campaigns to discredit scientists, misinterpretation of the meaning of noise in the Milankovitch climate cycles, and substantially improved hydrocarbon extraction methods. These factors are compounded by traits of human nature, such as greed and resistance to changing the familiar and discontinuing profitable endeavors. The idea that future people are equal with us may not be widely supported, yet this value is the foundation of climate change action. History shows that most people and nations will not take appropriate measures until forced, yet the cost increases as action is delayed. This makes appropriate policies even more extreme and difficult to accomplish as more wealth is consumed in treating global warming symptoms.

  10. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  11. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  12. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  13. Current Global Pricing For Human Papillomavirus Vaccines Brings The Greatest Economic Benefits To Rich Countries.

    Science.gov (United States)

    Herlihy, Niamh; Hutubessy, Raymond; Jit, Mark

    2016-02-01

    Vaccinating females against human papillomavirus (HPV) prior to the debut of sexual activity is an effective way to prevent cervical cancer, yet vaccine uptake in low- and middle-income countries has been hindered by high vaccine prices. We created an economic model to estimate the distribution of the economic surplus-the sum of all health and economic benefits of a vaccine, minus the costs of development, production, and distribution-among different country income groups and manufacturers for a cohort of twelve-year-old females in 2012. We found that manufacturers may have received economic returns worth five times their original investment in HPV vaccine development. High-income countries gained the greatest economic surplus of any income category, realizing over five times more economic value per vaccinated female than low-income countries did. Subsidizing vaccine prices in low- and middle-income countries could both reduce financial barriers to vaccine adoption and still allow high-income countries to retain their economic surpluses and manufacturers to retain their profits. Project HOPE—The People-to-People Health Foundation, Inc.

  14. MreB filaments align along greatest principal membrane curvature to orient cell wall synthesis

    Science.gov (United States)

    Szwedziak, Piotr; Wong, Felix; Schaefer, Kaitlin; Izoré, Thierry; Renner, Lars D; Holmes, Matthew J; Sun, Yingjie; Bisson-Filho, Alexandre W; Walker, Suzanne; Amir, Ariel; Löwe, Jan

    2018-01-01

    MreB is essential for rod shape in many bacteria. Membrane-associated MreB filaments move around the rod circumference, helping to insert cell wall in the radial direction to reinforce rod shape. To understand how oriented MreB motion arises, we altered the shape of Bacillus subtilis. MreB motion is isotropic in round cells, and orientation is restored when rod shape is externally imposed. Stationary filaments orient within protoplasts, and purified MreB tubulates liposomes in vitro, orienting within tubes. Together, this demonstrates MreB orients along the greatest principal membrane curvature, a conclusion supported with biophysical modeling. We observed that spherical cells regenerate into rods in a local, self-reinforcing manner: rapidly propagating rods emerge from small bulges, exhibiting oriented MreB motion. We propose that the coupling of MreB filament alignment to shape-reinforcing peptidoglycan synthesis creates a locally-acting, self-organizing mechanism allowing the rapid establishment and stable maintenance of emergent rod shape. PMID:29469806

  15. Covering women's greatest health fear: breast cancer information in consumer magazines.

    Science.gov (United States)

    Walsh-Childers, Kim; Edwards, Heather; Grobmyer, Stephen

    2011-04-01

    Women identify consumer magazines as a key source of information on many health topics, including breast cancer, which continues to rank as women's greatest personal health fear. This study examined the comprehensiveness and accuracy of breast cancer information provided in 555 articles published in 17 consumer magazines from 2002 through 2007. Accuracy of information was determined for 33 key breast cancer facts identified by an expert panel as important information for women to know. The results show that only 7 of 33 key facts were mentioned in at least 5% of the articles. These facts all dealt with breast cancer risk factors, screening, and detection; none of the key facts related to treatment or outcomes appeared in at least 5% of the articles. Other topics (not key facts) mentioned centered around controllable risk factors, support for breast cancer patients, and chemotherapy treatment. The majority of mentions of key facts were coded as fully accurate, although as much as 44% of mentions of some topics (the link between hormone replacement therapy and breast cancer) were coded as inaccurate or only partially accurate. The magazines were most likely to emphasize family history of breast cancer or genetic characteristics as risk factors for breast cancers; family history was twice as likely to be discussed as increasing age, which is in fact the most important risk factor for breast cancer other than being female. Magazine coverage may contribute to women's inaccurate perceptions of their breast cancer risk.

  16. Contemporary Theories and International Lawmaking

    NARCIS (Netherlands)

    Venzke, I.; Brölmann, C.; Radi, Y.

    2016-01-01

    Many contemporary theories approach international law-making with a shift in emphasis from the sources of law towards the communicative practices in which a plethora of actors use, claim and speak international law. The contribution proceeds by sketching the move from sources to communicative

  17. Woman's Quest in Contemporary Fiction.

    Science.gov (United States)

    Semeiks, Jonna Gormely

    Depending primarily on Joseph Campbell's treatment of the quest or hero myth, this paper provides analyses of recent women's fiction in terms of contemporary women's quests for personal identity and freedom. Following discussions of a proposed definition of myth, its connotations, and its use as a literary device and as a tool for critical…

  18. Contemporary Argentine Cinema during Neoliberalism

    Science.gov (United States)

    Rocha, Carolina

    2009-01-01

    In this article I analyze contemporary Argentine cinematic production assessing the impact of Law 24,377 that was implemented in 1995 and that provided much-needed funds for national productions. By looking at film production and consumption, the emergence of young filmmakers and the performance of both commercial films and those belonging to the…

  19. Contemporary Cambodian: The Social Institutions.

    Science.gov (United States)

    Kheang, Lim Hack; And Others

    "Contemporary Cambodian" consists of seven parts: the "Grammatical Sketch," the "Introduction," four intermediate modules, and a Cambodian-English glossary containing all the words in the series. After completing the "Introduction," a student can study the intermediate modules in any order, since each serves as a partial review of the others. This…

  20. Contemporary Language Issues in Ukraine: Bilingualism or Russification

    Directory of Open Access Journals (Sweden)

    Iryna Zbyr

    2015-02-01

    Full Text Available The article aims to focus on the analysis of the contemporary language issues in Ukraine. A characteristic feature of contemporary language situation in Ukraine is a co-existence on its territory of two languages, Ukrainian and Russian, along with various forms of Ukrainian-Russian bilingualism. Narrowing down the spheres of use of the Ukrainian language and the strong interferential influence of Russian have led to the emergence of the hybrid of Ukrainian-Russian forms of the everyday language known as Surzhyk. The article discusses how language forms are connected with conceptualizations of national identity in contemporary Ukrainian language ideology. It especially focuses on Surzhyk a pejorative collective label for non-standard language varieties that dissolve the language boundary between Ukrainian and Russian standard languages. Although most attention in Ukrainian debates on language is directed towards the complex relations between two standard languages, Surzhyk is considered an important problem, not the least among those for whom it is a major threat to the survival of the Ukrainian language.

  1. Reef fishes in biodiversity hotspots are at greatest risk from loss of coral species.

    Directory of Open Access Journals (Sweden)

    Sally J Holbrook

    Full Text Available Coral reef ecosystems are under a variety of threats from global change and anthropogenic disturbances that are reducing the number and type of coral species on reefs. Coral reefs support upwards of one third of all marine species of fish, so the loss of coral habitat may have substantial consequences to local fish diversity. We posit that the effects of habitat degradation will be most severe in coral regions with highest biodiversity of fishes due to greater specialization by fishes for particular coral habitats. Our novel approach to this important but untested hypothesis was to conduct the same field experiment at three geographic locations across the Indo-Pacific biodiversity gradient (Papua New Guinea; Great Barrier Reef, Australia; French Polynesia. Specifically, we experimentally explored whether the response of local fish communities to identical changes in diversity of habitat-providing corals was independent of the size of the regional species pool of fishes. We found that the proportional reduction (sensitivity in fish biodiversity to loss of coral diversity was greater for regions with larger background species pools, reflecting variation in the degree of habitat specialization of fishes across the Indo-Pacific diversity gradient. This result implies that habitat-associated fish in diversity hotspots are at greater risk of local extinction to a given loss of habitat diversity compared to regions with lower species richness. This mechanism, related to the positive relationship between habitat specialization and regional biodiversity, and the elevated extinction risk this poses for biodiversity hotspots, may apply to species in other types of ecosystems.

  2. Reef fishes in biodiversity hotspots are at greatest risk from loss of coral species.

    Science.gov (United States)

    Holbrook, Sally J; Schmitt, Russell J; Messmer, Vanessa; Brooks, Andrew J; Srinivasan, Maya; Munday, Philip L; Jones, Geoffrey P

    2015-01-01

    Coral reef ecosystems are under a variety of threats from global change and anthropogenic disturbances that are reducing the number and type of coral species on reefs. Coral reefs support upwards of one third of all marine species of fish, so the loss of coral habitat may have substantial consequences to local fish diversity. We posit that the effects of habitat degradation will be most severe in coral regions with highest biodiversity of fishes due to greater specialization by fishes for particular coral habitats. Our novel approach to this important but untested hypothesis was to conduct the same field experiment at three geographic locations across the Indo-Pacific biodiversity gradient (Papua New Guinea; Great Barrier Reef, Australia; French Polynesia). Specifically, we experimentally explored whether the response of local fish communities to identical changes in diversity of habitat-providing corals was independent of the size of the regional species pool of fishes. We found that the proportional reduction (sensitivity) in fish biodiversity to loss of coral diversity was greater for regions with larger background species pools, reflecting variation in the degree of habitat specialization of fishes across the Indo-Pacific diversity gradient. This result implies that habitat-associated fish in diversity hotspots are at greater risk of local extinction to a given loss of habitat diversity compared to regions with lower species richness. This mechanism, related to the positive relationship between habitat specialization and regional biodiversity, and the elevated extinction risk this poses for biodiversity hotspots, may apply to species in other types of ecosystems.

  3. Strengths, Weaknesses, Opportunities and Threats

    NARCIS (Netherlands)

    Bull, J.W.; Jobstvogt, N.; Böhnke-Henrichs, A.; Mascarenhas, A.; Sitas, N.; Baulcomb, C.; Lambini, C.K.; Rawlins, M.; Baral, H.; Zähringer, J.; Carter-Silk, E.; Balzan, M.V.; Kenter, J.O.; Häyhä, T.; Petz, K.; Koss, R.

    2016-01-01

    The ecosystem services concept (ES) is becoming a cornerstone of contemporary sustainability thought. Challenges with this concept and its applications are well documented, but have not yet been systematically assessed alongside strengths and external factors that influence uptake. Such an

  4. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, Joseph William; Jobstvogt, N.; Böhnke-Henrichs, A.

    2016-01-01

    The ecosystem services concept (ES) is becoming a cornerstone of contemporary sustainability thought. Challenges with this concept and its applications are well documented, but have not yet been systematically assessed alongside strengths and external factors that influence uptake. Such an assess...

  5. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  6. Polar marine ecosystems: major threats and future change

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, A. [British Antarctic Survey, Cambridge (United Kingdom); Harris, C.M. [Environmental Research and Assessment, Grantchester (United Kingdom)

    2003-07-01

    This review of polar marine ecosystems covers both the Arctic and Antarctic, identifying the major threats and, where possible, predicting their possible state(s) in 2025. Although the two polar regions are similar in their extreme photoperiod, low temperatures, and in being heavily influenced by snow and ice, in almost all other respects they are very different. The Arctic Ocean is a basin surrounded by continental landmasses close to, and influenced by, large populations and industrial activities. In contrast, the Southern Ocean is contiguous with all the other great oceans and surrounds a single land mass; Antarctica is remote from major centres of population and sources of pollution. Marine environments in both Polar Regions have been highly disturbed by fishing activity, but, in terms of pollution, some areas remain among the most pristine in the world. There are, however, both local and global pressures. Over the 2025 time horizon, the greatest concern for the Arctic is probably the ecological implications of climate change, particularly insofar as sea ice extent and duration are likely to be affected. Such changes are not expected to be as pronounced in the Southern Ocean over this time period, and concerns are related more to direct threats from harvesting of marine living resources, and the ability to manage these fisheries sustainably. In both Polar Regions, the capacity of marine ecosystems to withstand the cumulative impact of a number of pressures, including climate change, pollution and overexploitation, acting synergistically is of greatest concern. (author)

  7. Contemporary Nigerian Popular music: A Menace to National Development

    Directory of Open Access Journals (Sweden)

    Ogunrinade D O A

    2016-01-01

    Full Text Available There is no gainsaying that most of the recent forms of contemporary popular music produced, packaged, made available for public consumption constitute grave danger and serious threat to moral uprightness in Nigerian society. This has exposed the Nigerian society to a wide variety of insecurity and violence. This is evident as seen from series of moral decadence and dissipation that infiltrated the lives of the citizenry - especially the youths (the leaders of tomorrow ranging from, sexual abuse, money mongering, indiscipline, examination malpractice and indecent dressing to mention but a few. Music is a powerful tool and a force for mobilization which brings about either reformation or deformation of character due to the type of rhythm, melody, harmony and principally the lyrics of the songs. This paper examines the new trend of contemporary popular music in Nigeria with a view to assess its negative and pessimistic impacts on the character molding of the citizenry in Nigerian society. Live performances of contemporary popular music were observed and audio and video tape materials relating to the said music were also analyzed based on their educational  and moral values of such songs. It was  discovered that contemporary popular music as we have it today in Nigeria communicates vulgarity and coarseness to the listeners and this poses a lot of negative effects on the attitude of the youths. Musicians employ indecent words to attract the youth thus creating negative influence on the character of the leaders of tomorrow (the youth to engage in various   debauchery.  The paper therefore, suggested that relevant agencies should be put in place to ensure that apart from entertainment, music should convey positive character building messages rather than music that egg on and motivate illicit acts. Likewise, musicians should compose songs in the spirit of societal reformation so as to impact moral virtues on the younger generation  thus

  8. The dream in contemporary psychiatry.

    Science.gov (United States)

    Reiser, M F

    2001-03-01

    This article offers selective reviews of cogent sectors of research regarding the dream in contemporary psychiatry. First, the author discusses relatively recent research (1953-1999) on the neurobiology and clinical psychophysiology of dreaming sleep; second, he reviews experimental cognitive neuroscientific studies of perception, emotion, and memory and the putative interrelationships among them in generating dream imagery; and third, he interprets psychoanalytic studies (1900-1999) on related aspects of dreams and the dream process. Exploration for interrelationships among information from these three areas entails discussion of the mind/brain problem. These considerations illuminate some of the logical and interpretive dilemmas that enter into debates about Freud's theory of the dream. The author proposes a preliminary psychobiologic concept of the dream process and discusses, in light of the foregoing considerations, the importance of collaborative research for developing a realistic perspective concerning the proper place of the dream in contemporary psychiatry.

  9. [Ethical dilemmas of contemporary psychiatry].

    Science.gov (United States)

    Filaković, Pavo; Pozgain, Ivan

    2008-01-01

    Ethics in the contemporary psychiatry, as well as in medicine in general, is based on the two core ethical traditions: deontological and theological. Good ethical decision takes into the consideration both traditions, and is preceded with ethical dilemmas to provide the best possible care to the patients in that moment. In the article are presented most recent research results of the literature about ethical dilemmas in psychiatry. Ethical dilemmas in everyday practice as well as compliance with the patients, psychiatric consultations, informed consent, treatment of personality disorders, pharmacological investigations, forensic psychiatry, forced hospitalisation, promotion of mental health, and dealing with the stigma of the mental diseases are showed in the article. The authors emphasize the necessity of constant questioning of ethical dilemmas in the contemporary psychiatry, because of the special status of psychiatry as a potentially risky field in practice, and because of intensive pharmacological investigations in psychiatric patients.

  10. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... self’. I scrutinise the staging techniques and the codes of appearance that bodies have to comply with in order to be deemed ‘authentic’ on the shows. To define them and place them in the history of the idea of ‘bodily authenticity’, I complement my study with an outline of how ‘authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  11. POLTERGEIST PHENOMENA IN CONTEMPORARY FOLKLORE

    Directory of Open Access Journals (Sweden)

    Oana VOICHICI

    2017-05-01

    Full Text Available The article deals with instances of the supernatural in Romanian urban legends, namely what we call the strigoi , or poltergeist. Usually, folklorists tend to exclude the supernatural f rom the category of urban legends, however we have decided to take these accounts into consideration based on the fact that the transmitter, the narrators do not distinguish between these elements and the rest of contemporary legends and today’s popular cu lture abounds in such accounts.

  12. POLTERGEIST PHENOMENA IN CONTEMPORARY FOLKLORE

    OpenAIRE

    Oana VOICHICI

    2017-01-01

    The article deals with instances of the supernatural in Romanian urban legends, namely what we call the strigoi , or poltergeist. Usually, folklorists tend to exclude the supernatural f rom the category of urban legends, however we have decided to take these accounts into consideration based on the fact that the transmitter, the narrators do not distinguish between these elements and the rest of contemporary legends and today’s popular cu lture abounds in such accounts.

  13. The Sacred in Contemporary Advertising

    Directory of Open Access Journals (Sweden)

    Cătălin Soreanu

    2016-05-01

    Full Text Available As part of the contemporary media culture, advertising constantly mediates the relationship between the institutional dimension of religion (namely the church and the community, given the specific position of the Catholic religion: transparent, based on dialogue and the continuous questioning of the relationship between man and divinity. To manage their presence in public life, the church constantly approaches new media and specific forms of communication (posters, street banners and meshes, websites or interactive mobile structures.

  14. Islamic factor in contemporary Russia

    OpenAIRE

    N. M. Shalenna

    2014-01-01

    Russian Federation, a Eurasian multinational state, has a significant number of indigenous Muslim population (about 10%) that continues to increase not only due to natural growth and conversion of non-Muslims to Islam, but also as a result of intensive immigration from the Central Asian countries and Azerbaijan. Islamic factor significantly predetermined policy of Russia during its historical development. The importance of Islam in contemporary political life has been underlined by many gover...

  15. HOOLIGANISM – CONTEMPORARY SOCIAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    MARIA LULESCU

    2012-05-01

    Full Text Available The proposed scientific theme is going to approach and study the hooliganism phenomenon as a contemporary social matter, in terms of conceptual and etiological. The present work has four main purposes: (1- that of explaining the meaning of hooliganism social phenomenon; (2- that of discovering the origins of hooliganism; (3- that of knowing which are the causes that encourages the occurence of the hooliganism; (4- that of knowing how to control and minimize this phenomenon.

  16. Contemporary Management of Bladder Cancer

    Science.gov (United States)

    Bell, David; Fradet, Yves

    1991-01-01

    Bladder cancer is currently the fifth most common cancer in Western society, and its incidence appears to be increasing. Important advances have recently occurred in both diagnostic and therapeutic approaches to bladder neoplasms. Presentation is not unique, and physician awareness is important to identify patients who are at risk for bladder neoplasia and consequently require further investigation. A diagnostic approach and contemporary management are discussed. ImagesFigure 1Figure 4 PMID:21229043

  17. Contemporary management of pyloric stenosis.

    Science.gov (United States)

    Jobson, Matthew; Hall, Nigel J

    2016-08-01

    Hypertrophic pyloric stenosis is a common surgical cause of vomiting in infants. Following appropriate fluid resuscitation, the mainstay of treatment is pyloromyotomy. This article reviews the aetiology and pathophysiology of hypertrophic pyloric stenosis, its clinical presentation, the role of imaging, the preoperative and postoperative management, current surgical approaches and non-surgical treatment options. Contemporary postoperative feeding regimens, outcomes and complications are also discussed. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. Contemporary management of pericardial diseases.

    Science.gov (United States)

    Imazio, Massimo

    2012-05-01

    Pericardial diseases are relatively common in clinical practice, either as isolated disease or as manifestation of a systemic disorder. The aim of the present study is to review more recent updates on their contemporary management. The cause of pericardial diseases is varied according to the epidemiologic background, patient population, and clinical setting. Most cases remain idiopathic, and empiric anti-inflammatory therapy should be considered as first-line therapy in most cases with the possible adjunct of colchicine in the setting of inflammatory pericardial diseases, especially relapsing or not responding to first-line drugs. A triage has been proposed to select high-risk cases requiring admission and specific cause search. The prognosis of pericardial diseases is essentially determined by the cause. The most feared complication is constriction, the risk of which is higher in bacterial forms, intermediate for postpericardiotomy syndromes and systemic inflammatory diseases, low for viral and idiopathic cases. Chronic constriction has a definite surgical therapy, whereas transient cases should be recognized and may be reversible with empirical anti-inflammatory therapy. Contemporary management of pericardial diseases is largely empirical, although first clinical trials and new studies on diagnostic modalities and prognosis of pericardial diseases are bringing the contemporary management of pericardial diseases along a more evidence-based road. Integrated cardiovascular imaging is required for optimal management of the patient with suspected pericardial disease.

  19. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  20. Symmetry and the Monster: One of the Greatest Quests of Mathematics

    Energy Technology Data Exchange (ETDEWEB)

    Szabo, R J [Colin Maclaurin Building, Heriot-Watt University, Edinburgh EH14 4AS (United Kingdom)

    2007-04-13

    The book Symmetry and the Monster: One of the Greatest Quests of Mathematics describes historical events leading up to the discovery of the Monster sporadic group, the largest simple sporadic group. It also expounds the significance and deep relationships between this group and other areas of mathematics and theoretical physics. It begins, in the prologue, with a nice overview of some of the mathematical drama surrounding the discovery of the Monster and its subsequent relationship to number theory (the so-called Moonshine conjectures). From a historical perspective, the book traces back to the roots of group theory, Galois theory, and steadily runs through time through the many famous mathematicians who contributed to group theory, including Lie, Killing and Cartan. Throughout, the author has provided a very nice and deep insight into the sociological and scientific problems at the time, and gives the reader a very prominent inside view of the real people behind the mathematics. The book should be an enjoyable read to anyone with an interest in the history of mathematics. For the non-mathematician the book makes a good, and mostly successful, attempt at being non-technical. Technical mathematical jargon is replaced with more heuristic, intuitive terminology, making the mathematical descriptions in the book fairly easy going. A glossary/hspace{l_brace}0.25pc{r_brace} of/hspace{l_brace}0.25pc{r_brace} terminology for noindent the more scientifically inclined is included in various footnotes throughout the book and in a comprehensive listing at the end of the book. Some more technical material is also included in the form of appendices at the end of the book. Some aspects of physics are also explained in a simple, intuitive way. The author further attempts at various places to give the non-specialist a glimpse into what mathematical proof is all about, and explains the difficulties and technicalities involved in this very nicely (for instance, he mentions the various

  1. Symmetry and the Monster: One of the Greatest Quests of Mathematics

    International Nuclear Information System (INIS)

    Szabo, R J

    2007-01-01

    The book Symmetry and the Monster: One of the Greatest Quests of Mathematics describes historical events leading up to the discovery of the Monster sporadic group, the largest simple sporadic group. It also expounds the significance and deep relationships between this group and other areas of mathematics and theoretical physics. It begins, in the prologue, with a nice overview of some of the mathematical drama surrounding the discovery of the Monster and its subsequent relationship to number theory (the so-called Moonshine conjectures). From a historical perspective, the book traces back to the roots of group theory, Galois theory, and steadily runs through time through the many famous mathematicians who contributed to group theory, including Lie, Killing and Cartan. Throughout, the author has provided a very nice and deep insight into the sociological and scientific problems at the time, and gives the reader a very prominent inside view of the real people behind the mathematics. The book should be an enjoyable read to anyone with an interest in the history of mathematics. For the non-mathematician the book makes a good, and mostly successful, attempt at being non-technical. Technical mathematical jargon is replaced with more heuristic, intuitive terminology, making the mathematical descriptions in the book fairly easy going. A glossary/hspace{0.25pc} of/hspace{0.25pc} terminology for noindent the more scientifically inclined is included in various footnotes throughout the book and in a comprehensive listing at the end of the book. Some more technical material is also included in the form of appendices at the end of the book. Some aspects of physics are also explained in a simple, intuitive way. The author further attempts at various places to give the non-specialist a glimpse into what mathematical proof is all about, and explains the difficulties and technicalities involved in this very nicely (for instance, he mentions the various 100+ page articles that

  2. BOOK REVIEW: Symmetry and the Monster: One of the Greatest Quests of Mathematics

    Science.gov (United States)

    Szabo, R. J.

    2007-04-01

    The book Symmetry and the Monster: One of the Greatest Quests of Mathematics describes historical events leading up to the discovery of the Monster sporadic group, the largest simple sporadic group. It also expounds the significance and deep relationships between this group and other areas of mathematics and theoretical physics. It begins, in the prologue, with a nice overview of some of the mathematical drama surrounding the discovery of the Monster and its subsequent relationship to number theory (the so-called Moonshine conjectures). From a historical perspective, the book traces back to the roots of group theory, Galois theory, and steadily runs through time through the many famous mathematicians who contributed to group theory, including Lie, Killing and Cartan. Throughout, the author has provided a very nice and deep insight into the sociological and scientific problems at the time, and gives the reader a very prominent inside view of the real people behind the mathematics. The book should be an enjoyable read to anyone with an interest in the history of mathematics. For the non-mathematician the book makes a good, and mostly successful, attempt at being non-technical. Technical mathematical jargon is replaced with more heuristic, intuitive terminology, making the mathematical descriptions in the book fairly easy going. A glossary\\hspace{0.25pc} of\\hspace{0.25pc} terminology for noindent the more scientifically inclined is included in various footnotes throughout the book and in a comprehensive listing at the end of the book. Some more technical material is also included in the form of appendices at the end of the book. Some aspects of physics are also explained in a simple, intuitive way. The author further attempts at various places to give the non-specialist a glimpse into what mathematical proof is all about, and explains the difficulties and technicalities involved in this very nicely (for instance, he mentions the various 100+ page articles that

  3. Application of Contemporary Intelligence Models in Terms of Transformation and Security Sector Reform

    OpenAIRE

    Dojcinovski, Metodija; Ackoski, Jugoslav

    2011-01-01

    This paper presents a new approach to the contemporary methods of organizing, establishing and functioning of intelligence systems in a way of offering solutions against security threats and challenges of the 21st century. The effectiveness of implementing the measures and activities depends on the intelligence models, identified as functioning in relation to the structured elements of the represented and realistically created segments, standard operative procedures, security procedures and m...

  4. How Threat Assessment Could Become Self-Fulfilling Prophecy: Case of U.S.-China Relations

    Directory of Open Access Journals (Sweden)

    Muhamad Arif

    2016-12-01

    Full Text Available This article tries to explain how misperception can trigger conflict between countries. The article would employ spiral model of conflict proposed by Robert Jervis as a theoretical framework to scrutinize contemporary US and Chinese contemporary competition. As a result, this paper shows how threat assessment could trigger a spiral of conflict through state’s tendency to overestimate threat level and its failure to perceive that defensive behavior can be interpreted as offensive by the belligerent. Based on this analysis, the probability of conflicts can be reduced as each country tries to comprehend motivations that drive other behavior, perceptions and reactions that might arise as a result of the strategic empathy.

  5. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  6. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  7. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  8. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  9. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  10. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  11. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  12. Potential future land use threats to California's protected areas

    Science.gov (United States)

    Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson

    2015-01-01

    Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.

  13. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  14. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  15. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis

    OpenAIRE

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-we...

  16. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    Science.gov (United States)

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  17. The FARC and Hugo Chavez: Is Contemporary Venezuela a Threat to Colombia?

    Science.gov (United States)

    2010-12-01

    Smith, The Emergence of Liberation Theology: Radical Religion and the Social Movement Theory (Chicago: Chicago University Press, 1991), 59. 16...Socialismo del Siglo XXI (Bogota: Fundacion para la Investigacion y la Cultura, 2007), 50. 146 Cristóbal Valencia Ramírez, “Venezuela’s Bolivarian... Siglo XXI. Bogota: Fundacion para la Investigacion y la Cultura, 2007. Discovery en Español. “Fuga de las FARC.” http://www.tudiscovery.com/web

  18. Challenges in contemporary academic neurosurgery.

    Science.gov (United States)

    Black, Peter M

    2006-03-01

    Traditionally, the ideal academic neurosurgeon has been a "quadruple threat," with excellence in clinical work, teaching, research, and administration. This tradition was best exemplified in Harvey Cushing, who developed the field of neurosurgery 90 years ago. This paradigm will probably have to change as academic neurosurgeons face major challenges. In patient care, these include increasing regulatory control, increasing malpractice costs, consolidation of expensive care in academic centers, and decreasing reimbursement; in resident teaching, work hour limitations and a changing resident culture; in research, the increasing dominance of basic scientists in governmental funding decisions and decreased involvement of neurosurgeons in scientific review committees; and in administration, problems of relationships in the workplace, patient safety, and employment compliance in an increasingly bureaucratic system. To meet these challenges, the new academic neurosurgeon will probably not be a quadruple threat personally but will be part of a quadruple threat in a department and institution. Neurosurgeons in such a setting will have to work with hospital, medical school, and national and international groups to address malpractice, reimbursement, subspecialization, and training problems; find supplemental sources of income through grants, development funds, and hospital support; lead in the development of multidisciplinary centers for neuroscience, brain tumor, spine, and other initiatives; and focus on training leaders for hospital, regional, and national groups to reconfigure neurosurgery. Collaboration, flexibility, and leadership will be characteristic of the academic neurosurgeon in this new era.

  19. Modern trends in contemporary chemistry

    International Nuclear Information System (INIS)

    Javed, H.; Pervez, H.; Qadeer, R.

    1993-01-01

    This publication contains a collection of papers presented at symposium on M odern Trends in Contemporary Chemistry , that was held in Islamabad, Pakistan, March 6-8, 1990. The symposium was divided into five sections for presentation of about 55 scientific and technical papers and 6 review papers. The contents of these papers were of good quality in the widespread concern in new trends of chemistry. The six reviews papers covered fields of ortho metallation reactions, evaluation of heterogeneous electron transfer rate contents, macro reticular ion-exchange resins, spectrochemical analytical techniques, liquid crystal-high technology materials for practical applications and trends in advanced ceramics. (A.B.)

  20. Contemporary management of Bell palsy.

    Science.gov (United States)

    Jowett, Nate; Hadlock, Tessa A

    2015-04-01

    Bell palsy (BP) is the most common diagnosis in acute and chronic facial palsy. Although most patients fully recover, more than one-quarter will have residual dysfunction. Of these, nearly half will demonstrate severe limitations in facial expression. Though significant attention has been paid to acute management and prognosis, a paucity of literature exists addressing management of the long-term sequelae of BP. This article describes contemporary use of physical therapy, injectables, and static and dynamic surgical procedures in facial reanimation of acute and chronic BP. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  1. Contemporary Culture and Aesthetic Education

    DEFF Research Database (Denmark)

    Friberg, Carsten

    2011-01-01

    relation to a specific cultural context, and our acquisition of it comes from being acquainted with cultural products. Aesthetics is thus closely related to hermeneutics, to how we interpret specific situations we find ourselves in. Key words: education, sensorial, judgement, hermeneutics, Kant...... century, a focus we on aesthetic education and communication. Important were arts and letters which still are important but very much on the defensive in our contemporary culture also because aesthetics often is a debate about criticism rather than about the sensorial and bodily aspect of cultural...

  2. Contemporary challenges for intrafamilial relations

    Directory of Open Access Journals (Sweden)

    M. GOTEA

    2016-11-01

    Full Text Available Nowadays we live in a time of rapid changes, from a social, industrial and technological standpoint. Profound mutations in family institution can be observed, regarding the family structure, lifestyle and the cycle of family life. Today’s tendencies reflect a clear distinction between marriage and the activity of raising children, as we can notice the increased number of marriages without children or the number of single-parent families. That is why, the present paper focus on these two types of intrafamily relationships: couple’s relationship and parent-child relation, pointing out some changes and challenges of contemporary period.

  3. On Detailing in Contemporary Architecture

    DEFF Research Database (Denmark)

    Kristensen, Claus; Kirkegaard, Poul Henning

    2010-01-01

    Details in architecture have a significant influence on how architecture is experienced. One can touch the materials and analyse the detailing - thus details give valuable information about the architectural scheme as a whole. The absence of perceptual stimulation like details and materiality...... / tactility can blur the meaning of the architecture and turn it into an empty statement. The present paper will outline detailing in contemporary architecture and discuss the issue with respect to architectural quality. Architectural cases considered as sublime piece of architecture will be presented...

  4. Contemporary Management of Vesicoureteral Reflux.

    Science.gov (United States)

    Hajiyev, Perviz; Burgu, Berk

    2017-04-01

    Vesicoureteral reflux (VUR) remains the most interesting topic of pediatric urology due to the dynamic nature of recent controversial publications. Starting from the need for a diagnosis to the necessity and effectiveness of treatment in preventing scars, VUR remains in the mist. Although recent strong evidence helped as fog lights in this blurriness, more data are required for achieving crystal clearance. This article aims to summarize and discuss the current state of the evidence regarding VUR management. To provide a comprehensive synthesis of the main evidence in the literature on the current and contemporary management of VUR in children; to discuss conservative management with continuous antibiotic prophylaxis (CAP), especially its effectiveness and safety; and to review the current evidence regarding contemporary surgical techniques. We conducted a nonsystematic review of the literature using the recent guidelines and PubMed database regarding surveillance, CAP, endoscopic, open, laparoscopic, and robot-assisted ureteral surgical treatment. Despite the striking results of previous studies revealing the ineffectiveness of CAP, more recent studies and their two fresh meta-analyses revealed a positive role for CAP in the contemporary management of VUR. One of the most interesting findings is the redundant rising of endoscopic correction and its final settlement to real indicated cases. Patient individualization in the contemporary management of VUR seems to be the keyword. The evidence in the literature showed a safe and effective use of laparoscopic and robot-assisted laparoscopic reimplantations. The goal of VUR treatment is to prevent the occurrence of febrile urinary tract infections and formation of scars in the renal parenchyma. The approach should be risk adapted and individualized according to current knowledge. Individual risk is influenced by the presentation age, sex, history of pyelonephritis and renal damage, grade of reflux, bladder bowel

  5. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  6. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  7. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  8. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  9. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Islamic factor in contemporary Russia

    Directory of Open Access Journals (Sweden)

    N. M. Shalenna

    2014-12-01

    Full Text Available Russian Federation, a Eurasian multinational state, has a significant number of indigenous Muslim population (about 10% that continues to increase not only due to natural growth and conversion of non-Muslims to Islam, but also as a result of intensive immigration from the Central Asian countries and Azerbaijan. Islamic factor significantly predetermined policy of Russia during its historical development. The importance of Islam in contemporary political life has been underlined by many government representatives and by the leaders of social and religious organizations and movements. Russian Muslim Ummah nowadays is far from being homogeneous and integrated, that predisposes some groups to radicalization of sentiments, ideas and activities and inevitably causes significant destabilization in the religious, social and political spheres within certain subjects of the Russian Federation and at the national level. The article focuses on the complex investigation of the influence of Islam on the social and political processes in contemporary Russia. It reveals the main principles of the Russian administration policy in the field of religion in general and towards Muslims in particular. Specific features of Muslim communities’ formation and factors of their institutionalization are determined. This research covers the reasons of major contradictions existing within the Russian Ummah. The article stresses on the importance of this study in the context of Ukrainian-Russian conflict in Crimea and in eastern regions of Ukraine. Current policy of Russia towards the Crimean Tatar population is analyzed.

  11. CONTEMPORARY TRENDS IN GEOGRAPHICAL EDUCATION

    Directory of Open Access Journals (Sweden)

    M. Wasileva

    2017-01-01

    Full Text Available The geography includes rich, diverse and comprehensive themes that give us an understanding of our changing environment and interconnected world. It includes the study of the physical environment and resources; cultures, economies and societies; people and places; and global development and civic participation. As a subject, geography is particularly valuable because it provides information for exploring contemporary issues from a different perspective. This geographical information affects us all at work and in our daily lives and helps us make informed decisions that shape our future. All these facts result in a wide discussion on many topical issues in contemporary geography didactics. Subjects of research are the new geography and economics curriculum as well as construction of modern learning process. The paper presents briefly some of the current trends and key issues of geodidactics. As central notions we consider and analyze the training/educational goals, geography curriculum, target groups and environment of geography training, training methods as well as the information sources used in geography education. We adhere that all the above-mentioned finds its reflection in planning, analysis and assessment of education and thus in its quality and effectiveness.

  12. Contemporary views on selective mutism

    Directory of Open Access Journals (Sweden)

    Dimoski Sanja

    2016-01-01

    Full Text Available The aim of this paper is to review contemporary literature on selective mutism (SM, available in our language. The paper includes a contemporary definition of the disorder, previous studies of selective mutism, theories about its origin, and treatment. SM is a disorder that occurs in childhood, when a child's speech is selectively lacking in certain social situations. School is the context in which the disorder is typically manifested, which is why SM is often diagnosed only after children start school. The paper gives a historical account of changes in views on this disorder. Modern conceptions emphasize selective inability of children to spontaneously and successfully express themselves verbally. In researching SM, case studies on children who have selective mutism are most commonly published. Etiological factors are not precisely defined, and different conceptions give their interpretations depending on various theoretical frameworks. Some studies consistently indicate a relation between SM and social anxiety, and some with opposing behavior and delays in language development. Based on theoretical explanations of SM, psychological interventions (behavioral and cognitive-behavioral, psychodynamic and projective techniques, counseling and family therapy are created. Modern treatment of selective mutism includes an eclectic approach and emphasizes the role of teachers and school in general. Future studies should deepen the knowledge about selective mutism, specify the methodological procedure and stimulate the individualized treatment of children with SM.

  13. ESOTERIC IN CONTEMPORARY LITHUANIAN PROSE

    Directory of Open Access Journals (Sweden)

    Ieva Naikienė

    2018-04-01

    Full Text Available This article focuses on esotericism in contemporary Lithuanian prose. For the revelation of this topic, Donaldas Kajokas’ novel Ežeras ir kiti jį lydintys asmenys (The Lake and Other Escort Members, 2003 and Jurga Ivanauskaitė’s novel Placebas (Placebo, 2012 have been chosen. The analysed writings reveal the point of view of contemporary Lithuanian writers about esoteric beliefs. In this article, esotericism is related with persons’ feelings but is excluded from occult and parapsychology fields such as alchemy, cabbala, Tarot, etc. This work focuses on the idea that an individual, who has only a few senses, cannot reach actuality. On the other hand, the possibility of acquiring those senses is not rejected. In addition, obtaining those senses would help to reach higher, over-sensational worlds and in that way to discover personal correlation with forms of multiple personal identities. This article establishes an idea that awareness of higher worlds/spheres unlocks the possibilities of revealing the main core of human (as micro-cosmos and the Universe (as macro-cosmos. The possibility to perceive oneself as a micro-cosmos discloses not only personal identity, but also the value of Other’s entity and inevitable entities stratifying.

  14. Contemporary Education for Public Administration

    Directory of Open Access Journals (Sweden)

    Ivan Koprić

    2007-01-01

    Full Text Available The paper examines the development of contemporary administrative education, as a crucial criterion without which it is not possible to achieve professionalism in public administration. While the term professionalism has a variety of meanings, today it is largely deemed that specific educational preparation is a foundation without which other elements of professionalism in public administration cannot be achieved. The level of professionalism, competence, education and knowledge thus become critical variables of administration reforms in transitional countries. Afterwards, the author examines the trends in the development of contemporary administrative education, pointing particularly to the importance of establishing a coherent, vertically passable system, i.e. a system which encompasses all levels of education – from secondary school education to doctoral studies. In this matter, one of the most important features in the development of administrative studies is their diversification, with simultaneous strengthening of the general administrative profile. Thus, the general administrative profile becomes modified, updated and extended by new teaching disciplines. In the final section of the paper, the author addresses the performance of administrative education in Croatia, pointing to its underdevelopment. Indeed, the author suggests that there are no sustainable results of reforms without the training of staff for administration.

  15. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  16. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  17. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a

  18. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  19. A note on contemporary psychometrics.

    Science.gov (United States)

    Vitoratou, Silia; Pickles, Andrew

    2017-12-01

    Psychometrics provide the mathematical underpinnings for psychological assessment. From the late 19th century, a plethora of methodological research achievements equipped researchers and clinicians with efficient tools whose practical value becomes more evident in the era of the internet and big data. Nowadays, powerful probabilistic models exist for most types of data and research questions. As the usability of the psychometric scales is better comprehended, there is an increased interest in applied research outcomes. Paradoxically, while the interest in applications for psychometric scales increases, publishing research on the development and/or evaluation of those scales per se, is not welcomed by many relevant journals. This special issue in psychometrics is therefore a great opportunity to briefly review the main ideas and methods used in psychometrics, and to discuss the challenges in contemporary applied psychometrics.

  20. ORGANIZATION IN CONTEMPORARY PUBLIC SPHERE

    Directory of Open Access Journals (Sweden)

    Rosemarie HAINES

    2013-12-01

    Full Text Available The critical analysis of Habermas’ Public Sphere Theory and the comparative undertaking to the current day enables us to assert that in contemporary society, public sphere is no longer a political public sphere, this dimension being completed by a societal dimension, the public sphere has extended and now we can talk about partial public spheres in an ever more commercial environment. The new rebuilding and communication technologies create a new type of public character: the visible sphere – non-located, non-dialogical and open. Information and communication are more and more involved in the restructuring of capitalism on an international scale and the reorganization of leadership and management systems. The reevaluation of the public sphere, public opinion, communication allows us to define public sphere according to the profound mutations from today’s democratic societies.

  1. Are contemporary tourists consuming distance?

    DEFF Research Database (Denmark)

    Larsen, Gunvor Riber

    2012. Background The background for this research, which explores how tourists represent distance and whether or not distance can be said to be consumed by contemporary tourists, is the increasing leisure mobility of people. Travelling for the purpose of visiting friends and relatives is increasing...... of understanding mobility at a conceptual level, and distance matters to people's manifest mobility: how they travel and how far they travel are central elements of their movements. Therefore leisure mobility (indeed all mobility) is the activity of relating across distance, either through actual corporeal...... metric representation. These representations are the focus for this research. Research Aim and Questions The aim of this research is thus to explore how distance is being represented within the context of leisure mobility. Further the aim is to explore how or whether distance is being consumed...

  2. Prototypical versus contemporary Mediterranean Diet.

    Science.gov (United States)

    Rizza, W; De Gara, L; Antonelli Incalzi, R; Pedone, C

    2016-10-01

    To investigate the evolution of the Mediterranean Diet (MD) in a delimited area of Southern Italy, by comparing the diet adopted 60-70 years ago (Prototypical Mediterranean Diet, PMD) with the contemporary one (Contemporary Mediterranean Diet, CMD), and to verify to what extent they fitted the recommendations of the Italian and the USDA dietary guidelines. We recruited a total of 106 participants, divided in two groups. PMD group included 52 women aged >80 years, with a good cognitive function and full independence in basic and instrumental activities of daily living. CMD group included 20 men and 34 women aged 50-60 years. Food intake was assessed by administering the EPIC food frequency questionnaire to each participant, and an additional survey to the PMD subjects only. Both PMD and CMD showed adequate intakes of macronutrients, although some deficiencies related to micronutrient requirements were evident. CMD showed a slightly greater use of animal products, processed and sugary foods, and higher intakes of simple sugars, animal proteins (49.6 vs 28.3 g/day), animal lipids (37.8 vs 20.1 g/day), saturated fats (25.0 vs 15.8 g/day) and cholesterol (305.0 vs 258.5 g/day). PMD showed many similarities to the original version of the MD in terms of macronutrients distribution and food choices. The documented evolution of the dietary habits over a 70 years timespan suggests that nowadays Mediterranean regions adhere less strictly to the original MD, although nutrients intakes are adequate to LARN and USDA recommendations. Copyright © 2016 European Society for Clinical Nutrition and Metabolism. Published by Elsevier Ltd. All rights reserved.

  3. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  4. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  5. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  6. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  7. School Counselors: A Review of Contemporary Issues

    Science.gov (United States)

    Bain, Steve F.

    2012-01-01

    This article seeks to review the topic of school counselors and the contemporary issues surrounding this profession. An introduction to the profession and overview of its history provides a comprehensive basis on which to understand today's school counseling profession. An examination of contemporary themes of school counseling will include job…

  8. Discussing Global Issues through Contemporary Art

    Science.gov (United States)

    Mead, Sarah M.; Ellerbrock, Cheryl R.; Cruz, Bárbara C.

    2017-01-01

    Contemporary global issues can be examined through the lens of modern photographic art. In an effort to prepare global-ready graduates, this article explores the pressing problems of environmental degradation, urbanization, and homelessness through the work of three contemporary artists. Illustrative works, suggested approaches, and curriculum…

  9. Tradition and Renewal in Contemporary Orthodox Theology

    Directory of Open Access Journals (Sweden)

    Marios Begzos

    2014-11-01

    Full Text Available This text presents the challenges that the modern world poses for the Orthodox Church. In every historical period, the Church has struggled with internal and external problems. While preserving its traditions and historical foundations, the theology of the Orthodox Church struggles with contemporary problems by showing the current, contemporary teaching about God, man and the world.

  10. Contemporary African philosophy: emergent issues and challenges ...

    African Journals Online (AJOL)

    ... all philosophies remain context-dependent and cultureoriented. A contrary view ignores the proper nature of philosophy. A new phenomenon confronts currently confronts all comers to contemporary African philosophy: an expansive vision of African philosophical discourse. Contemporary African philosophers attempt to ...

  11. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  12. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  13. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  14. Smoking in contemporary American cinema.

    Science.gov (United States)

    Omidvari, Karan; Lessnau, Klaus; Kim, Jeannie; Mercante, Donald; Weinacker, Ann; Mason, Carol

    2005-08-01

    The true prevalence of smoking among characters portrayed in the movies is unknown. This study examines this prevalence objectively. The top 10 movies on the weekly box office charts were reviewed. Whether or not the top five characters in these movies smoked, was documented. It was determined prior to the start of the study that 300 male characters and 300 female characters were needed to detect any significant difference. A total of 447 movies, composed of 193 movies rated restricted (R) [children < 17 years of age must be accompanied by an adult], 131 movies rated PG13 for parental guidance suggested for children < 13 years of age (PG) and 123 movies rated PG for parental guidance suggested, were examined until the sample size was reached. Smoking prevalence is the same in contemporary American movies and in the general US population (23.3% vs 24.8%, respectively). However, there was more smoking in these movies among men than among women (25.5% vs 20.5%, respectively; p < 0.006), among antagonists than among protagonists (35.7% vs 20.6%, respectively; p < 0.001), lower vs middle vs upper socioeconomic class (SEC) [48.2%, 22.9%, and 10.5%, respectively; p < 0.001], among independent vs studio movies (46.2% vs 18.2%, respectively; p < 0.001); and among R-rated vs PG13-rated vs PG-rated movies (37.3%, 16.2%, and 8.1%, respectively; p < 0.001). In R-rated movies, and in both subcategories of R-rated studio movies and R-rated independent movies, smoking prevalence is higher than in the US population (37.3%, 30.5%, and 50.6% vs 24.8%, respectively; p < 0.001 for all). Additionally, compared to the US population, men, women and lower SEC members smoke more in R-rated movies, R-rated studio movies, and R-rated independent movies. In R-rated movies, antagonists smoke more than protagonists (43.9% vs 35.8%, respectively; p < 0.001), and whites smoke more than nonwhites (38.3% vs 26.4%, respectively; p < 0.001). In R-rated studio movies, antagonists smoke more than

  15. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    Science.gov (United States)

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and

  16. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  17. A Risk Management Approach to the "Insider Threat"

    Science.gov (United States)

    Bishop, Matt; Engle, Sophie; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

    Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, manydefine it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policyin a form that can be implemented on a computer system or network, createsgaps in enforcement. This paper defines "insider" precisely, in termsof thesegaps, andexploresan access-based modelfor analyzing threats that include those usually termed "insider threats." This model enables an organization to order its resources based on thebusinessvalue for that resource andof the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which usersareatthe greatestriskofacting inappropriately. We concludebyexamining how to merge this model with one of forensic logging and auditing.

  18. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  19. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  20. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  1. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  2. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  3. Sculpting light for contemporary biophotonics

    DEFF Research Database (Denmark)

    Glückstad, Jesper

    DTUs IPR portfolio on so-­‐called Generalized Phase Contrast (GPC) covers a family of powerful “light-­‐engine” approaches for generating speckle-­‐free contiguous optical distributions using advanced spatial phase modulation. GPC has been used in applications such as optical trapping and manipul......DTUs IPR portfolio on so-­‐called Generalized Phase Contrast (GPC) covers a family of powerful “light-­‐engine” approaches for generating speckle-­‐free contiguous optical distributions using advanced spatial phase modulation. GPC has been used in applications such as optical trapping...... and manipulation, active microscopy, structured illumination, optical security, parallel laser marking trials and recently in contemporary biophotonics applications such as for real-­‐time parallel two-­‐photon optogenetics and neurophotonics. Our most recent GPC light sculpting developments geared towards...... these applications will be presented. This includes both a static and a dynamic GPC Light Shaper implementation based on our latest theoretical derivations to demonstrate the benefits for typical applications where lasers have to be actively shaped into particular light patterns. We then show the potential of GPC...

  4. CONTEMPORARY PRINCIPLES OF SUICIDE PREVENTION.

    Science.gov (United States)

    Ljusic, Dragana; Ravanic, Dragan; Filipovic Danic, Snezana; Soldatovic, Ivan; Cvetkovic, Jovana; Stojanovic Tasic, Mirjana

    2016-11-01

    Suicide remains a significant public health problem worldwide. This study is aimed at analyzing and presenting contemporary methods in suicide prevention in the world as well as at identifying specific risk groups and risk factors in order to explain their importance. in suicide prevention. The literature search covered electronic databases PubMed, Web of Science and Scopus. In order to select the relevant articles, the authors searched for the combination of key-words which included the following medical subject heading terms (suicide or suicide ideation or attempted) and (prevention or risk factors) and (man or elders or mental disorders). Data analysis covered meta-analyses, systematic reviews and original scientific papers with different characteristics of suicide preventions, risk factors and risk groups. Worldwide evidence-based interventions for suicide prevention are divided in universal, selective and indicated interventions. Restricted approach to various methods of committing suicide as well as pharmacotherapy contributes to a lower suicide rate. Suicide risk factors can be categorized as proximal and distal. The following groups are at highest risk of committing suicide: males. older persons and persons with registered psychiatric disorders. There is a lot of evidence that suicide is preventable. It is known that only 28 coun tries in the world have national suicide prevention strategies and Serbia is not one of them.

  5. Contemporary vascular smartphone medical applications.

    Science.gov (United States)

    Carter, Thomas; O'Neill, Stephen; Johns, Neil; Brady, Richard R W

    2013-08-01

    Use of smartphones and medical mHealth applications (apps) within the clinical environment provides a potential means for delivering elements of vascular care. This article reviews the contemporary availability of apps specifically themed to major vascular diseases and the opportunities and concerns regarding their integration into practice. Smartphone apps relating to major vascular diseases were identified from the app stores for the 6 most popular smartphone platforms, including iPhone, Android, Blackberry, Nokia, Windows, and Samsung. Search terms included peripheral artery (arterial) disease, varicose veins, aortic aneurysm, carotid artery disease, amputation, ulcers, hyperhydrosis, thoracic outlet syndrome, vascular malformation, and lymphatic disorders. Forty-nine vascular-themed apps were identified. Sixteen (33%) were free of charge. Fifteen apps (31%) had customer satisfaction ratings, but only 3 (6%) had greater than 100. Only 13 apps (27%) had documented medical professional involvement in their design or content. The integration of apps into the delivery of care has the potential to benefit vascular health care workers and patients. However, high-quality apps designed by clinicians with vascular expertise are currently lacking and represent an area of concern in the mHealth market. Improvement in the quality and reliability of these apps will require the development of robust regulation. Copyright © 2013 Elsevier Inc. All rights reserved.

  6. Contemporary Management of Sigmoid Volvulus.

    Science.gov (United States)

    Dolejs, Scott C; Guzman, Michael J; Fajardo, Alyssa D; Holcomb, Bryan K; Robb, Bruce W; Waters, Joshua A

    2018-03-22

    Sigmoid volvulus is an uncommon cause of bowel obstruction that is historically associated with high morbidity and mortality. The objective of this study was to evaluate contemporary management of sigmoid volvulus and the safety of primary anastomosis in patients with sigmoid volvulus. The National Surgical Quality Improvement Project from 2012 to 2015 was queried for patients with colonic volvulus who underwent left-sided colonic resection. A propensity score-matched analysis was performed to compare patients with sigmoid volvulus undergoing colectomy with primary anastomosis without proximal diversion to colectomy with end colostomy. Two thousand five hundred thirty-eight patients with sigmoid volvulus were included for analysis. Patients had a median age of 68 years (interquartile range, 55-80) and 79% were fully independent preoperatively. Fifty-one percent of operations were performed emergently. One thousand eight hundred thirteen (71%) patients underwent colectomy with anastomosis, 240 (10%) colectomy with anastomosis and proximal diversion, and 485 (19%) colectomy with end colostomy. Overall, 30-day mortality and morbidity were 5 and 40%, respectively. After propensity score matching, mortality, overall morbidity, and serious morbidity were similar between groups. Sigmoid volvulus occurs in elderly and debilitated patients with significant morbidity, mortality, and lifestyle implications. In selected patients, anastomosis without proximal diversion in patients with sigmoid volvulus results in similar outcomes to colectomy with end colostomy.

  7. Judicial fiats and contemporary enclosures

    Directory of Open Access Journals (Sweden)

    Thayyil Naveen

    2009-01-01

    Full Text Available This article examines the problematic processes in a case that has had few parallels in Indian judicial history. The apex court in T. N. Godavarman took upon the responsibility of deciding how forest resources in the country should be accessed and who is (or is not to have such access. Purportedly done to protect the environment, through the ′clarification and fine-tuning′ of national forest-laws, the case has seriously affected the life, livelihood, and habitat of millions of marginal groups. Recent trends demonstrate the wider trend of constitutional courts assuming the roles of adjudication, administration and legislation, all rolled into one, whereby they become problematic sites for creating a hierarchy of conflicting public interests, which claim constitutional validity from different vantage points. Thus, constitutional values of ′protection of environment′ and ′justice - social, political and economic′ ′are pitted against each other′ where unelected courts take it upon themselves to define the legitimate precincts of the theoretical discourse of sustainable use / development; and importantly also implement it into ′everyday′ ′reality, in the way it feels fit′. The article seeks to make sense of this contemporary process of forest governance.

  8. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  9. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  11. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  12. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  13. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  14. On the contemporary – and contemporary art history. A review of Terry Smith, What Is Contemporary Art

    Directory of Open Access Journals (Sweden)

    Anthony Gardner

    2011-06-01

    Full Text Available This analysis of Terry Smith’s 'What Is Contemporary Art?' evaluates Smith’s ongoing project to theorise contemporary art around the theme of multiple, interconnected temporalities. It questions how this ‘contemporaneity’ differs from the classic teleologism of modernism and postmodern relativism and suggests that Smith’s categories may be valuable for understanding other cultural areas, such as contemporary music. It then raises methodological problems associated with charting the terrain of contemporary art and how they overlap with economic considerations, arguing that the task implies particular forms of privilege that may threaten the autonomy of critical analysis, but that Smith’s work goes some way toward exposing this problem.

  15. Impulsive responding in threat and reward contexts as a function of PTSD symptoms and trait disinhibition.

    Science.gov (United States)

    Sadeh, Naomi; Spielberg, Jeffrey M; Hayes, Jasmeet P

    2018-01-01

    We examined current posttraumatic stress disorder (PTSD) symptoms, trait disinhibition, and affective context as contributors to impulsive and self-destructive behavior in 94 trauma-exposed Veterans. Participants completed an affective Go/No-Go task (GNG) with different emotional contexts (threat, reward, and a multidimensional threat/reward condition) and current PTSD, trait disinhibition, and risky/self-destructive behavior measures. PTSD interacted with trait disinhibition to explain recent engagement in risky/self-destructive behavior, with Veterans scoring high on trait disinhibition and current PTSD symptoms reporting the highest levels of these behaviors. On the GNG task, commission errors were also associated with the interaction of PTSD symptoms and trait disinhibition. Specifically, PTSD symptoms were associated with greater commission errors in threat vs. reward contexts for individuals who were low on trait disinhibition. In contrast, veterans high on PTSD and trait disinhibition exhibited the greatest number of commission errors in the multidimensional affective context that involved both threat and reward processing. Results highlight the interactive effects of PTSD and disinhibited personality traits, as well as threat and reward systems, as risk factors for impulsive and self-destructive behavior in trauma-exposed groups. Findings have clinical implications for understanding heterogeneity in the expression of PTSD and its association with disinhibited behavior. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Contemporary neuroscience in the media.

    Science.gov (United States)

    Racine, Eric; Waldman, Sarah; Rosenberg, Jarett; Illes, Judy

    2010-08-01

    Technological innovations in neuroscience have opened new windows to the understanding of brain function and the neuronal underpinnings of brain activity in neuropsychiatric disorders and social behavior. Public interest and support for neuroscience research through initiatives like the Decade of the Brain project and increasingly diverse brain-related initiatives have created new interfaces between neuroscience and society. Against this backdrop of dynamic innovation, we set out to examine how different features of neuroscience are depicted in print media. We used the 'guided news' function of the LexisNexis Academic database with keyword searches to find news articles published between 1995 and 2004 in major U.S. and U.K. English-language news sources. We performed searches on headlines, lead paragraphs, and body terms to maximize search yields. All articles were coded for overall tone of coverage, details on reported studies, presence of ethical, legal, and social discussion as well as the emerging interpretations of neuroscience - in the form of neuro-essentialism, neuro-realism, and neuro-policy. We found that print media coverage of the use of neurotechnology for diagnosis or therapy in neuropsychiatric disorders was generally optimistic. We also found that, even within articles that were identified as research reports, many did not provide details about research studies. We also gained additional insights into the previously identified phenomena of neuro-essentialism, neuro-realism, and neuro-policy showing some profound impacts of neuroscience on personal identity and policy-making. Our results highlight the implications of transfer of neuroscience knowledge to society given the substantial and authoritative weight ascribed to neuroscience knowledge in defining who we are. We also discuss the impact of these findings on neuroscience and on the respective contributions of the social sciences and the biological sciences in contemporary psychiatry and mental

  17. Contemporary analysis of practicing otolaryngologists.

    Science.gov (United States)

    Harrill, Willard C; Melon, David E; Seshul, Merritt J; Katz, Marc S; Zanation, Adam M

    2018-05-04

    To investigate contemporary issues facing practicing otolaryngologists including workforce dynamics, ancillary service modeling, otolaryngic allergy integration, ambulatory surgery center utilization, and relevant certificate of need legislation. A cross-sectional survey analysis of academic and private practicing otolaryngologists in North and South Carolina in 2016. A cross-sectional survey was e-mailed to 510 practicing otolaryngologists in North and South Carolina. A 21.3% survey response rate was achieved. Otolaryngology workforce was defined by horizontal aggregation of otolaryngologists into larger group models, with fewer solo practitioners being replaced by younger otolaryngologists or employing otolaryngology extenders. Excluding academic practice, few otolaryngologists have chosen direct hospital employment as a career option, although otolaryngologists with fewer years of practice are pursuing that option with greater frequency. Ancillary services showed audiology and hearing aid services being the most common, followed by otolaryngic allergy, point-of-service computed tomography, and ultrasound. Although otolaryngologists tend to avoid vertical integration, ambulatory surgery center (ASC) ownership trends favor a joint venture model with a hospital system partner. Most otolaryngologists favor changes to certificate of need legislation to improve patient access to these lower-cost facilities, regardless of whether they currently utilize or have access to an ASC. Otolaryngology is uniquely positioned to adapt and respond to current paradigm shifts within ambulatory medicine. Further analysis is needed to prepare current and future otolaryngologists for the demands and opportunities these challenges pose as patient-centered care models and consumer dynamics shape future patient expectations and utilization of healthcare. 5. Laryngoscope, 2018. © 2018 The American Laryngological, Rhinological and Otological Society, Inc.

  18. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  19. Investment and Project Economics: Contemporary Lessons for ...

    African Journals Online (AJOL)

    Toshiba

    contemporary challenge to sensitize and synergize instructional, ... project financial outcomes as underscored in this work. ... Balance of payments. .... Problem diagnosis/solutions. **. *** .... Money, Work, Sex, Kids, and Life's Other Challenges.

  20. Contemporary protease inhibitors and cardiovascular risk

    DEFF Research Database (Denmark)

    Lundgren, Jens; Mocroft, Amanda; Ryom, Lene

    2018-01-01

    PURPOSE OF REVIEW: To review the evidence linking use of HIV protease inhibitors with excess risk of cardiovascular disease (CVD) in HIV+ populations. RECENT FINDINGS: For the two contemporary most frequently used protease inhibitors, darunavir and atazanavir [both pharmacologically boosted...

  1. Book Review: Medische Antropologie. | Atobrah | Contemporary ...

    African Journals Online (AJOL)

    Contemporary Journal of African Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 2, No 1 (2014) >. Log in or Register to get access to full text downloads.

  2. Complement Clause Formation In Leteh | Ansah | Contemporary ...

    African Journals Online (AJOL)

    Contemporary Journal of African Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 2, No 1 (2014) >. Log in or Register to get access to full text downloads.

  3. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  4. CONTEMPORARY TEACHING AIDS IN TEACHING MATHEMATICS

    OpenAIRE

    Sead Rešić; Eldina Atić

    2014-01-01

    In this research, the application of contemporary teaching aids in Mathematics teaching in elementary school was analyzed from the aspect of teachers, students and parents. The application of contemporary teaching aids in Mathematics teaching was analyzed through a sample of 100 students, and attitudes about the aids were examined from the points of view of students, teachers and parents. In this research, descriptive method, questionnaire and test were used. Results of the resear...

  5. Sociological analysis of contemporary Turkish political elites

    OpenAIRE

    D. Ali Arslan

    2007-01-01

    This study was designed to find general characteristics of Contemporary Turkish political Elites since 1995 up to date. Social background characteristics were employed to realise the purposes. Documentary and historical research techniques were used during the study. As a result of examining the Contemporary Turkish political elites (since 1995 up to 2005) these major findings were discovered: the large majority of the Turkish parliamentary elites were well educated, male, middle aged, marrie...

  6. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  7. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  8. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  9. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  10. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  11. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  12. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  13. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  14. The development of a concise questionnaire designed to measure perceived outcomes on the issues of greatest importance to patients.

    Science.gov (United States)

    Busby, M; Burke, F J T; Matthews, R; Cyrta, J; Mullins, A

    2012-04-01

    To develop a concise patient feedback audit instrument designed to inform practice development on those issues of greatest importance to patients. A literature review was used to establish the issues which were of greatest importance to patients. Ten core questions were then designed with the help of an experienced survey and polling organisation. A challenging grading of patient responses was utilised in an attempt to differentiate perceived performance within a practice on the different aspects and between practices. A feasibility study was conducted using the interactive voice response mode with seven volunteer practices in 2009. The instrument was then used in the later part of 2010 by 61 practices mostly in paper-based format. Practices received feedback which is primarily based on a bar chart plotting their percentage of top grades received against a national reference sample (NRS) compiled from the results of other participating practices. A statistical analysis was conducted to establish the level at which an individual practice result becomes statistically significant against the NRS. The 61 participating practices each received an average of 121 responses (total 7,381 responses). Seventy-four percent of responses across all ten questions received the top grade, 'ideal'. Statistical analysis indicated that at the level of 121 responses, a score of around 4-9% difference to the National Reference Sample, depending on the specific question, was statistically significant. In keeping with international experience with dental patient feedback surveys this audit suggests high levels of patient satisfaction with their dental service. Nevertheless, by focusing results on the proportion of highest grades received, this instrument is capable of indicating when perceived performance falls significantly below the average. It can therefore inform practice development.

  15. Motivation for Aggressive Religious Radicalization: Goal Regulation Theory and a Personality × Threat × Affordance Hypothesis

    Directory of Open Access Journals (Sweden)

    Ian eMcGregor

    2015-09-01

    Full Text Available A new set of hypotheses is presented regarding the cause of aggressive religious radicalization. It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward aggressive religious radicalization. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered. Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that aggressive religious radicalization is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress.

  16. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis.

    Science.gov (United States)

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress.

  17. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  18. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  19. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  20. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  1. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  2. Contemporary nuclear medicine diagnostics of neuroendocrine tumors

    Directory of Open Access Journals (Sweden)

    Todorović-Tirnanić Mila

    2015-01-01

    Full Text Available The new positron emission tomography (PET/CT methods for neuroendocrine tumors detection are presented and compared with classic, conventional methods. Conventional methods use a gamma scintillation camera for patients with neuroendocrine tumor imaging, after intravenous injection of one of the following radiopharmaceuticals: 1 somatostatin analogues labeled with indium-111 (111In-pentetreotide or technetium-99m (99mTc-EDDA/HYNIC-TOC; 2 noradrenaline analogue labeled with iodine-131 or -123 (131I/123I-MIBG; or 3 99mTc(V-DMSA. Contemporary methods use PET/CT equipment for patients with neuroendocrine tumor imaging, after intravenous injection of pharmaceuticals labeled with positron emitters [fluorine-18 (18F, galium-68 (68Ga, or carbon-11 (11C]: 1 glucose analogue (18FDG; 2 somatostatin analogue (68Ga-DOTATOC/68Ga-DOTATATE/68Ga-DOTANOC; 3 aminoacid precursors of bioamines: [a dopamine precursor 18F-DOPA (6-18F-dihydroxyphenylalanine, b serotonin precursor 11C-5HTP (11C-5-hydroxytryptophan]; or 4 dopamine analogue 18F-DA (6-18F-fluorodopamine. Conventional and contemporary (PET/ CT somatostatin receptor detection showed identical high specificity (92%, but conventional had very low sensitivity (52% compared to PET/CT (97%. It means that almost every second neuroendocrine tumor detected by contemporary method cannot be discovered using conventional (classic method. In metastatic pheochromocytoma detection contemporary (PET/ CT methods (18F-DOPA and 18F-DA have higher sensitivity than conventional (131I/123I-MIBG. In medullary thyroid carcinoma diagnostics contemporary method (18F-DOPA is more sensitive than conventional 99mTc(V-DMSA method, and is similar to 18FDG, computed tomography and magnetic resonance. In carcinoid detection contemporary method (18F-DOPA shows similar results with contemporary somatostatin receptor detection, while for gastroenteropancreatic neuroendocrine tumors it is worse. To conclude, contemporary (PET/CT methods for

  3. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  4. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  5. LINK BETWEEN SUSTAINABLE DEVELOPMENT AND GLOBALIZATION OF CONTEMPORARY ECONOMY

    Directory of Open Access Journals (Sweden)

    Adriana Grigorescu

    2014-11-01

    Full Text Available Sustainable development requires a fundamental change in lifestyle. A fully break detachment by the past requires a major reorientation of public and private behavior and mentality. The challenge lies in linking economic growth with social issues and positioning the environmental degradation. The process of globalization is connected also with environmental degradation, which is now extended as a concept of threat and security, considered individually and in connection. It has already started recognizing new global threats as well as from non -state groups and individuals. The security is being defined to include, among others, the wars between and within states, international organizations of organized crime, nuclear weapons development, poverty, viral diseases, climatic events and environmental degradation. The concerns about the global market and the global environment protection will become more related, through their mutual dependency. The relationship of global economy and environment, from a market perspective, means stimulating economic growth, a process that generates higher revenues, funds and wealth, on one hand and political will to improve environmental conservation and protection, on the other hand. But it could be seen that the developed countries have made the greatest progress in environmental protection, and even so the poor quality of the environment continues to deteriorate. In this context it is important to consider the opinion of experts on the interaction between globalization and sustainable development. The paper aims to present the views of experts from the Regional Agency for Environmental Protection (South Muntenia. The study is an empirical research based on a questionnaire applied to a sample of over 300 subjects. The research aims to set out the existence of the link between sustainable development and globalization, to identify the main advantages and disadvantages of globalization and to prioritize the main

  6. Public and Private Intelligence: Historical and Contemporary Perspectives

    Directory of Open Access Journals (Sweden)

    Ruth Delaforce

    2013-06-01

    Full Text Available Intelligence is often regarded as information that is special or different, which must be safely kept. When sought, collected or used by the private sector, as opposed to public agencies, concerns are raised on the purpose and propriety of such an activity. However, in an historical context, intelligence collection or sharing between public and private interests for the purpose of national security was not unusual, particularly during the Cold War. Case studies from this era indicate that overlapping concerns were economic success combined with political strategy. Glimpses of these shared interests between the state and business can also be identified in the immediate post-Cold War era, and the aftermath of terrorist attacks in 2001. Perhaps the greatest contemporary change is not that “private” and “public” intelligence is shared between business and state, but the extent of such an enterprise. Further issues related to this change are: state dominance in the public-private relationship; potential fragmentation in the intelligence process; gaps in the historical record; and implications for future generations of intelligence professionals.

  7. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  8. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  9. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  10. NATO Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David

    2015-01-01

    The nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before considered. The programme of NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” has been focused on science and technology challenges associated with our need to improve the national and international capacity and capability to prevent, protect against, mitigate the effects of, respond to, and recover from the nuclear and radiological disasters, including nuclear and radiological accident, terrorist attack by Improvised Nuclear Device (IND) or by “Dirty Bomb”-Radiological Dispersal Device (RDD), that pose the greatest risk to the national and international security and safety...

  11. Social challenges of contemporary psychiatry.

    Science.gov (United States)

    Bouras, N

    2017-01-01

    have an important role in crosscultural diagnosis, psychiatric disorders relating to social deprivation, rehabilitation and enabling social inclusion. The degree to which society is willing to accept people with mental health problems has an obvious impact on their quality of life. We live in a period of cataclysmic social changes with disastrous wars, increased poverty and growing income inequality. The consequences on mental health are phenomenal with epidemics of self-harm and suicidality, higher rates of depression, and intensifying diagnosis of mood and conduct disorders in children and young adults. Other adversities include the disproportional number of people with mental health problems in prisons and penal institutions, the massive escalation of dementia sufferers and the shortcomings of the aspirations of community mental health care. In addition, there is an escalating social pathology with significant numbers of refugees and asylum seekers and rising numbers of homeless particularly in urban areas of the developed world. We should not, however, overlook the better rates of treatment for mental health problems, the emphasis on human rights, the empowerment and the service users' participation and the development in global mental health. All these social factors are important to contemporary psychiatry presenting complex challenges and demanding urgent attention and action.6 There is a need to embrace the development of evidence-based mental health services and a pluralistic approach, which balances appropriately the relevance of biological, psychological and social factors associated with mental health problems. The concept Meta-Community mental health builds on the successes of biological, psychological, social and community psychiatry.7 It incorporates neurosciences, sociology, psychology and anthropology and is delivered wherever the evidence shows that it makes a difference, whether in community or hospital, prisons, schools, court-room, place of work

  12. New Uses of Traditional Healing in Contemporary Irish Literature

    Directory of Open Access Journals (Sweden)

    Patricia A. Lynch

    2013-03-01

    Full Text Available This is a comparative study in two ways.  After a summary of the historical and cultural research into traditional healing which is relevant to this article, then some comments about the general usage of such themes in contemporary Irish literature, the article moves on to examine the role and function of traditional healing as a motif in four specific literary texts.  These are: two Irish plays, Brian Friel’s Faith Healer, and Jim Nolan’s Blackwater Angel, and two pieces of Irish fiction, P.J. Curtis’ novel The Lightning Tree and Claire Keegan’s short story “The Night of the Quicken Trees”.  Strong similarities are found on many fronts between the texts, especially in the acceptance of healing and the mystery associated with it.  However, differences also occur, depending on the artistic choices of the authors, the gender and community emphasis used, and the relative importance of healing in the context of the work.  Women healers seem to be more rooted and less tragic than their male counterparts, but all healers are seen paradoxically as both an asset and a potential threat to society. When these texts are compared with research into historical and cultural aspects of Irish folk medicine, they clearly draw on tradition for their plot elements, but only in the fiction and plays can the full dramatic potential of these life and death situations be explored.

  13. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  14. Crowdsourcing for children : exploring threats and opportunities

    NARCIS (Netherlands)

    de Wit, J.M.S.; Manojlovic, S.; Gavrilo, K.; Khan, J.V.; Hansson, K.; Aitamurto, T.; Ludwig, T.; Gupta, N.; Muller, M.

    2016-01-01

    Children are increasingly being engaged in product development, but they have yet to be introduced to the concept of crowdsourcing. Several opportunities and threats when designing a crowdsourcing platform specifically for children are proposed as topics for further discussion.

  15. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  16. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  17. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  18. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  19. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... Form Controls Cancel Submit Search The CDC Antibiotic / Antimicrobial Resistance Note: Javascript is disabled or is not ... please visit this page: About CDC.gov . Antibiotic / Antimicrobial Resistance About Antimicrobial Resistance Biggest Threats Emerging Drug ...

  20. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  1. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  2. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  3. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  4. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  5. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  6. Nocturia is the Lower Urinary Tract Symptom With Greatest Impact on Quality of Life of Men From a Community Setting

    Directory of Open Access Journals (Sweden)

    Eduardo de Paula Miranda

    2014-06-01

    Full Text Available PurposeLower urinary tract symptoms are numerous, but the specific impact of each of these symptoms on the quality of life (QoL has not been evaluated in community-dwelling men. An assessment of these symptoms and their effects on QoL was the focus of this study.MethodsWe performed a cross-sectional study with 373 men aged >50 years from a community setting. Patients completed the International Prostate Symptom Score questionnaire, which includes questions on each of the specific urinary symptoms and a question addressing health-related QoL that are graded from 0 to 5. We used the Pearson correlation test to assess the impact of each symptom on QoL.ResultsNocturia (58.9% was the most prevalent urinary symptom. The mean score was 0.9±1.4 for incomplete emptying, 1.0±1.5 for frequency, 0.9±1.3 for intermittency, 0.8±1.3 for urgency, 1.0±1.5 for weak stream, 0.5±1.0 for straining, and 2.0±1.6 for nocturia. Nocturia and frequency were the only symptoms associated with poorer QoL, with nocturia showing a stronger association.ConclusionsNocturia affects 50% of community dwelling men aged >50 years, and is the lower urinary tract symptom with the greatest negative impact on QoL.

  7. The Institute for Southern Contemporary Art (ISCA

    Directory of Open Access Journals (Sweden)

    João Enxuto

    2016-12-01

    Full Text Available João Enxuto and Erica Love are artists and writers living in New York City. Their writing has appeared in Art in America, Mousse Contemporary Art Magazine, Wired, and X-TRA Contemporary Art Quarterly. They have given talks and exhibited work at the Centre Pompidou, Whitney Museum of Art, the New Museum, Anthology Film Archives, Walker Art Center, Yossi Milo Gallery, Carriage Trade, Louisiana Museum in Denmark, ArtCenter/South Florida, and the Tamayo Museum in Mexico City.

  8. Constructing the contemporary via digital cultural heritage

    DEFF Research Database (Denmark)

    Andreasen, Torsten Arni Caleb

    2015-01-01

    The present article questions the construction of 'the contemporary' in digital cultural heritage archives as specific strategic articulations between past and present with regard to the future. A historical exploration of the discourse of cultural heritage presents three strategic axes supposedly...... the possibility of ascribing inherent epistemological, existential, empirical and geopolitical force to a given technological archival order. - See more at: http://twentyfour.fibreculturejournal.org/2015/06/04/fcj-174-constructing-the-contemporary-via-digital-cultural-heritage/#sthash.sNhW8uuA.dpuf...

  9. Queering gender in contemporary female Bildung narrative

    Directory of Open Access Journals (Sweden)

    Šnircová Soňa

    2015-09-01

    Full Text Available The paper explores, in the context of feminist discussions about the Bildungsroman, a contemporary British novel that offers shocking images of female coming of age at the turn of the millennium. Queering gender and introducing male elements into the heroine’s process of maturation, the analysed novel appears to raise questions about the continuous relevance of the feminist distinction between male and female version of the genre. The paper however argues that although significantly rewriting both female Bildung and pornographic narratives, Helen Walsh’s Brass can still be read as a variation of the female Bildungsroman and an example of its contemporary developments.

  10. Contemporary models of the atomic nucleus

    CERN Document Server

    Nemirovskii, P E

    2013-01-01

    Contemporary Models of the Atomic Nucleus discusses nuclear structure and properties, expounding contemporary theoretical concepts of the low-energy nuclear processes underlying in nuclear models. This book focuses on subjects such as the optical nuclear model, unified or collective model, and deuteron stripping reaction. Other topics discussed include the basic nuclear properties; shell model; theoretical analysis of the shell model; and radiative transitions and alpha-decay. The deuteron theory and the liquid drop nuclear model with its application to fission theory are also mentioned, but o

  11. Present and future arboviral threats.

    Science.gov (United States)

    Weaver, Scott C; Reisen, William K

    2010-02-01

    , invaded Europe after climate warming and enabled the major midge vector to expand is distribution northward into southern Europe, extending the transmission season and vectorial capacity of local midge species. Perhaps the greatest health risk of arboviral emergence comes from extensive tropical urbanization and the colonization of this expanding habitat by the highly anthropophilic (attracted to humans) mosquito, Aedes aegypti. These factors led to the emergence of permanent endemic cycles of urban DENV and CHIKV, as well as seasonal interhuman transmission of yellow fever virus. The recent invasion into the Americas, Europe and Africa by Aedes albopictus, an important CHIKV and secondary DENV vector, could enhance urban transmission of these viruses in tropical as well as temperate regions. The minimal requirements for sustained endemic arbovirus transmission, adequate human viremia and vector competence of Ae. aegypti and/or Ae. albopictus, may be met by two other viruses with the potential to become major human pathogens: Venezuelan equine encephalitis virus, already an important cause of neurological disease in humans and equids throughout the Americas, and Mayaro virus, a close relative of CHIKV that produces a comparably debilitating arthralgic disease in South America. Further research is needed to understand the potential of these and other arboviruses to emerge in the future, invade new geographic areas, and become important public and veterinary health problems. Copyright 2009 Elsevier B.V. All rights reserved.

  12. Stereotype Threat Effects on Learning From a Cognitively Demanding Mathematics Lesson.

    Science.gov (United States)

    Lyons, Emily McLaughlin; Simms, Nina; Begolli, Kreshnik N; Richland, Lindsey E

    2018-03-01

    Stereotype threat-a situational context in which individuals are concerned about confirming a negative stereotype-is often shown to impact test performance, with one hypothesized mechanism being that cognitive resources are temporarily co-opted by intrusive thoughts and worries, leading individuals to underperform despite high content knowledge and ability (see Schmader & Beilock, ). We test here whether stereotype threat may also impact initial student learning and knowledge formation when experienced prior to instruction. Predominantly African American fifth-grade students provided either their race or the date before a videotaped, conceptually demanding mathematics lesson. Students who gave their race retained less learning over time, enjoyed the lesson less, reported a diminished desire to learn more, and were less likely to choose to engage in an optional math activity. The detrimental impact was greatest among students with high baseline cognitive resources. While stereotype threat has been well documented to harm test performance, the finding that effects extend to initial learning suggests that stereotype threat's contribution to achievement gaps may be greatly underestimated. Copyright © 2017 Cognitive Science Society, Inc.

  13. Victims’ Reactions to the Interpersonal Threat to Public Identity Posed by Copycats

    Directory of Open Access Journals (Sweden)

    Stephen Reysen

    2014-06-01

    Full Text Available Interpersonal threats to public identity consist of situations where another person intentionally attempts to illegitimately undermine one’s ability to display a valued and distinctive public identity. In three studies, we examined victims’ reactions to copycatting as an interpersonal threat to public identity to test each component of this definition. In Study, participants expressed the greatest degree of anger when the copying was illegitimate and intentional. In Study 2, participants expressed a greater degree of anger to copying of an important (vs. unimportant characteristic. In Study 3, we manipulated the number of identity characteristics copied. A structural model showed that as the number of copied characteristics increased, participants’ perception of the situation as illegitimate and the copying as intentional predicted a threat to one’s freedom, which in turn predicted felt reactance predicting an unfavorable impression and a desire to confront the copycat. Together, the results support the definition of interpersonal threats to public identity and copycatting as such a situation.

  14. Population structure, behavior, and current threats to the sarus crane (Grus antigone antigone in Nepal

    Directory of Open Access Journals (Sweden)

    Kamal Raj Gosai

    2016-09-01

    Full Text Available The sarus crane (Grus antigone antigone is listed as “vulnerable” in the International Union for Conservation of Nature (IUCN Red List of Threatened Species. Sarus cranes are distributed in the lowlands, but most live outside protected areas, especially in agricultural areas and wetlands of Nepal. The continuous expansion of agricultural land and the reduction of wetland habitats pose the greatest threats to the conservation of the species. We studied the sarus crane in the Rupandehi District of Nepal to understand their population structure, behavior, and current threats. We used the line (i.e., road transect method from August 2013 to February 2014. The study area contained 147 sarus cranes. Agricultural land and wetland areas contained the highest number of sarus cranes. Our analysis showed that the population of sarus crane in the area has declined since 2007. Most sarus cranes lived in pairs. A single flock contained 13 cranes at maximum. Sarus crane behavior was not significantly different before and after the breeding seasons. Human–sarus crane conflict began when cranes started utilizing agricultural areas. The main threats to the hatching success and survival of sarus cranes in the Rupendehi District are egg theft and the hunting of cranes for meat. The findings of this study establish baseline information on the overall conservation status, habitat availability, and ecological behavior of sarus cranes in the district. We propose regular surveys to monitor sarus crane population levels in the face of multiple anthropogenic threats to their survival.

  15. Understanding the threats posed by non-native species: public vs. conservation managers.

    Directory of Open Access Journals (Sweden)

    Rodolphe E Gozlan

    Full Text Available Public perception is a key factor influencing current conservation policy. Therefore, it is important to determine the influence of the public, end-users and scientists on the prioritisation of conservation issues and the direct implications for policy makers. Here, we assessed public attitudes and the perception of conservation managers to five non-native species in the UK, with these supplemented by those of an ecosystem user, freshwater anglers. We found that threat perception was not influenced by the volume of scientific research or by the actual threats posed by the specific non-native species. Media interest also reflected public perception and vice versa. Anglers were most concerned with perceived threats to their recreational activities but their concerns did not correspond to the greatest demonstrated ecological threat. The perception of conservation managers was an amalgamation of public and angler opinions but was mismatched to quantified ecological risks of the species. As this suggests that invasive species management in the UK is vulnerable to a knowledge gap, researchers must consider the intrinsic characteristics of their study species to determine whether raising public perception will be effective. The case study of the topmouth gudgeon Pseudorasbora parva reveals that media pressure and political debate has greater capacity to ignite policy changes and impact studies on non-native species than scientific evidence alone.

  16. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  17. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  18. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  19. When the most potent combination of antibiotics selects for the greatest bacterial load: the smile-frown transition.

    Directory of Open Access Journals (Sweden)

    Rafael Pena-Miller

    Full Text Available Conventional wisdom holds that the best way to treat infection with antibiotics is to 'hit early and hit hard'. A favoured strategy is to deploy two antibiotics that produce a stronger effect in combination than if either drug were used alone. But are such synergistic combinations necessarily optimal? We combine mathematical modelling, evolution experiments, whole genome sequencing and genetic manipulation of a resistance mechanism to demonstrate that deploying synergistic antibiotics can, in practice, be the worst strategy if bacterial clearance is not achieved after the first treatment phase. As treatment proceeds, it is only to be expected that the strength of antibiotic synergy will diminish as the frequency of drug-resistant bacteria increases. Indeed, antibiotic efficacy decays exponentially in our five-day evolution experiments. However, as the theory of competitive release predicts, drug-resistant bacteria replicate fastest when their drug-susceptible competitors are eliminated by overly-aggressive treatment. Here, synergy exerts such strong selection for resistance that an antagonism consistently emerges by day 1 and the initially most aggressive treatment produces the greatest bacterial load, a fortiori greater than if just one drug were given. Whole genome sequencing reveals that such rapid evolution is the result of the amplification of a genomic region containing four drug-resistance mechanisms, including the acrAB efflux operon. When this operon is deleted in genetically manipulated mutants and the evolution experiment repeated, antagonism fails to emerge in five days and antibiotic synergy is maintained for longer. We therefore conclude that unless super-inhibitory doses are achieved and maintained until the pathogen is successfully cleared, synergistic antibiotics can have the opposite effect to that intended by helping to increase pathogen load where, and when, the drugs are found at sub-inhibitory concentrations.

  20. When the most potent combination of antibiotics selects for the greatest bacterial load: the smile-frown transition.

    Science.gov (United States)

    Pena-Miller, Rafael; Laehnemann, David; Jansen, Gunther; Fuentes-Hernandez, Ayari; Rosenstiel, Philip; Schulenburg, Hinrich; Beardmore, Robert

    2013-01-01

    Conventional wisdom holds that the best way to treat infection with antibiotics is to 'hit early and hit hard'. A favoured strategy is to deploy two antibiotics that produce a stronger effect in combination than if either drug were used alone. But are such synergistic combinations necessarily optimal? We combine mathematical modelling, evolution experiments, whole genome sequencing and genetic manipulation of a resistance mechanism to demonstrate that deploying synergistic antibiotics can, in practice, be the worst strategy if bacterial clearance is not achieved after the first treatment phase. As treatment proceeds, it is only to be expected that the strength of antibiotic synergy will diminish as the frequency of drug-resistant bacteria increases. Indeed, antibiotic efficacy decays exponentially in our five-day evolution experiments. However, as the theory of competitive release predicts, drug-resistant bacteria replicate fastest when their drug-susceptible competitors are eliminated by overly-aggressive treatment. Here, synergy exerts such strong selection for resistance that an antagonism consistently emerges by day 1 and the initially most aggressive treatment produces the greatest bacterial load, a fortiori greater than if just one drug were given. Whole genome sequencing reveals that such rapid evolution is the result of the amplification of a genomic region containing four drug-resistance mechanisms, including the acrAB efflux operon. When this operon is deleted in genetically manipulated mutants and the evolution experiment repeated, antagonism fails to emerge in five days and antibiotic synergy is maintained for longer. We therefore conclude that unless super-inhibitory doses are achieved and maintained until the pathogen is successfully cleared, synergistic antibiotics can have the opposite effect to that intended by helping to increase pathogen load where, and when, the drugs are found at sub-inhibitory concentrations.

  1. Pain is the Greatest Preoperative Concern for Patients and Parents Before Posterior Spinal Fusion for Adolescent Idiopathic Scoliosis.

    Science.gov (United States)

    Chan, Priscella; Skaggs, David L; Sanders, Austin E; Villamor, Gabriela A; Choi, Paul D; Tolo, Vernon T; Andras, Lindsay M

    2017-11-01

    Prospective cross-sectional study. To evaluate patients' and parents' concerns so they can be addressed with appropriate preoperative counseling. Despite much research on outcomes for posterior spinal fusion (PSF) in adolescent idiopathic scoliosis (AIS), little is available about preoperative fears or concerns. Patients with AIS undergoing PSF, their parents, and surgeons were prospectively enrolled and asked to complete a survey on their fears and concerns about surgery at their preoperative appointment. Forty-eight patients and parents completed surveys. Four attending pediatric spine surgeons participated and submitted 48 responses. Mean age of patients was 14.2 years. On a scale of 0 to 10, mean level of concern reported by parents (6.9) was higher than that reported by patients (4.6). Surgeons rated the procedure's complexity on a scale of 0 to 10 and reported a mean of 5.2. Neither patients' nor parents' level of concern correlated with the surgeons' assessment of the procedure's complexity level (R = 0.19 and 0.12, P = 0.20 and P = 0.42, respectively). Top three concerns for patients were pain (25%), ability to return to activities (21%), and neurologic injury (17%). Top three concerns for parents were pain (35%), neurologic injury (21%), and amount of correction (17%). Top three concerns for surgeons were postoperative shoulder balance (44%), neurologic injury (27%), and lowest instrumented vertebrae selection (27%). Patients reported the same concerns 23% of the time as parents, and 17% of the time as surgeons. Parents and surgeons reported the same concerns 21% of the time. Pain was the greatest concern for both patients and parents but was rarely listed as a concern by surgeons. Parent and patient level of concern did not correlate to the surgeon's assessment of the procedure's complexity. Neurologic injury was a top concern for all groups, but otherwise there was little overlap between physician, patient, and parent concerns. 3.

  2. Teaching Medical Student Psychiatry Through Contemporary Music

    Science.gov (United States)

    Egan, William H.

    1977-01-01

    An audio technique uses contemporary music recordings to illustrate various personality disorders, including: schizoid, paranoid, compulsive, antisocial, and hysterical. The works of Bob Dylan, Paul Simon, Harry Chapin, the Beatles, Janis Ian, James Taylor, Tammy Wynette, and others are cited. (LBH)

  3. INTERPERSONAL COMUNICATION IN THE CONTEMPORARY SIRCUMSTANCES

    Directory of Open Access Journals (Sweden)

    Slobodan JAKULIC

    1998-12-01

    Full Text Available In this item, the writer emphasizes the origination of the interpersonal communications in contemporary circumstances on the present evolutionary stage of the civilization. In addition the phenomenon of the interpersonal communications determine the social being of the humans in the area of the family and nation together with the area of the wide social community.

  4. logical Challenges in Developing a Contemporary Reading

    African Journals Online (AJOL)

    rbr

    formed by theory, together with an examination of the data-collection procedures ... the collection of evidence based solely on the lexicographer's linguistic intui- ... The reading programme involves the systematic collection of citations or quo- .... The field of primary sources for the DSAE contemporary reading programme is.

  5. Contemporary Theories and International Law-Making

    NARCIS (Netherlands)

    Venzke, I.

    2013-01-01

    Many contemporary theories approach international law-making with a shift in emphasis from the sources of law towards the communicative practices in which a plethora of actors use, claim and speak international law. Whereas earlier approaches would look at the sources as the singular moment of

  6. Contemporary Art and Rock, some relations

    Directory of Open Access Journals (Sweden)

    Leonardo Felipe

    2011-12-01

    Full Text Available This article investigates some relations between contemporary art and rock, from a collection of examples of the involvement between artists and rockers through history. Notably Pop Art, punk, Conceptual Art and the figure of Hélio Oiticica. The article detaches geographical aspects in this relation, with special attention to the New York and London scenes between 1960-1980.

  7. Surveillance Privacy and Technology: Contemporary Irish Perspectives

    Science.gov (United States)

    Doyle, Kenny

    2013-01-01

    Surveillance is typically envisaged as the act of a person being physically watched, their movements and behaviour monitored in a given space and time. While this type of watching undoubtedly takes place, there is also the more subtle and pervasive monitoring of people through the data they accumulate in their daily lives. Contemporary Irish…

  8. Recording technology in contemporary Nigeria: connecting the ...

    African Journals Online (AJOL)

    Recording technology in contemporary Nigeria: connecting the Nigerian ... Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. DOWNLOAD FULL TEXT Open Access DOWNLOAD FULL TEXT ... for themselves in the nation's music recording industry and its performance ...

  9. Individualism and community consciousness in contemporary Africa ...

    African Journals Online (AJOL)

    The contemporary Africa is witnessing a subtle encroachment of Western styled socio-political cum economic individualism. This indiscriminate assimilation of values has invariably led to the gradual eroding and bastardization of her once cherished communal approach to life. This paper critically examines the foregoing ...

  10. Heutiges Russisch (2) (Contemporary Russian [2])

    Science.gov (United States)

    Russisch, 1976

    1976-01-01

    Considers contemporary Russian usage with regard to variations in the genitive, accusative and nominative inflections and the synonymity of full and shortened adjective forms. Material is excerpted from "Stilistik der russischen Sprache" (Russian Language Style) by D. Rosental and M. Telenkowa. (Text is in German.) (FB)

  11. Heutiges Russisch (Schluss) (Contemporary Russian [Conclusion])

    Science.gov (United States)

    Russisch, 1976

    1976-01-01

    Considers two aspects of contemporary Russian language usage: (1) synonymity of prepositions, and (2) semantic and stylistic differences arising when certain verbs govern nouns in different cases. Material is excerpted from "Stilistik der russischen Sprache" (Russian Language Style) by Rosental and M. Telenkowa. (Text is in German.) (FB)

  12. The Origins of Contemporary Ukrainian Nationalism

    OpenAIRE

    Сергей Сергеевич Жильцов

    2014-01-01

    The article idedicated to formation and development of Ukrainian nationalism after Ukraine’s independence. The author analyzes fundamental reasons of raise of influence of Ukrainian nationalism. Theoretical foundations of contemporary Ukrainian nationalism are analyzed. In addition, the author evaluates the possible role of nationalism in the future development of Ukraine.

  13. The Origins of Contemporary Ukrainian Nationalism

    Directory of Open Access Journals (Sweden)

    Сергей Сергеевич Жильцов

    2014-12-01

    Full Text Available The article idedicated to formation and development of Ukrainian nationalism after Ukraine’s independence. The author analyzes fundamental reasons of raise of influence of Ukrainian nationalism. Theoretical foundations of contemporary Ukrainian nationalism are analyzed. In addition, the author evaluates the possible role of nationalism in the future development of Ukraine.

  14. The Japanese Mind: Understanding Contemporary Japanese Culture.

    Science.gov (United States)

    Davies, Roger J., Ed.; Ikeno, Osamu, Ed.

    This collection of essays offers an overview of contemporary Japanese culture, and can serve as a resource for classes studying Japan. The 28 essays offer an informative, accessible look at the values, attitudes, behavior patterns, and communication styles of modern Japan from the unique perspective of the Japanese people. Filled with examples…

  15. 'A crushing curse': Widowhood in contemporary Anglophone ...

    African Journals Online (AJOL)

    Moving from the premise that widows have been at the margins of literary discourse in Cameroon, this paper examines widowhood in contemporary Anglophone Cameroon literature using John Nkemngong Nkengasong's The Widow's Might (2006) and Alobwed'Epie's Patching the Broken Dream (2012) as the springboard ...

  16. Contemporary Sexism in the South African Navy

    Science.gov (United States)

    Van Wijk, Charles H.

    2011-01-01

    The military traditionally embraces highly sexist attitudes. Over the past decade, the South African Navy (SAN) has been exposed to an increasingly progressive political environment. This study investigated contemporary expressions of sexism in the SAN. A representative sample of 476 sailors completed the Ambivalent Sexism Inventory, Modern Sexism…

  17. Contemporary compositional procedures in Nigerian music practices

    African Journals Online (AJOL)

    ... music types created and performed in Nigeria, their forms, rating relevance and continuity and change. The findings of this research shows that the Nigerian contemporary composers have made appreciable efforts in various areas to reach out and homogenize the Nigerian audiences with different genres of music that ...

  18. Climate history shapes contemporary leaf litter decomposition

    Science.gov (United States)

    Michael S. Strickland; Ashley D. Keiser; Mark A. Bradford

    2015-01-01

    Litter decomposition is mediated by multiple variables, of which climate is expected to be a dominant factor at global scales. However, like other organisms, traits of decomposers and their communities are shaped not just by the contemporary climate but also their climate history. Whether or not this affects decomposition rates is underexplored. Here we source...

  19. Teaching Conversations, Contemporary Art, and Figure Drawing

    Science.gov (United States)

    Graham, Mark A.

    2012-01-01

    An important problem for high school art teachers is deciding what belongs in the art curriculum. What works of art, media, or ideas will inspire their students to more fully develop their own artistic potential and critically engage with contemporary art and culture? What artifacts of art, visual culture, or material culture should be included…

  20. Investment and Project Economics: Contemporary Lessons for ...

    African Journals Online (AJOL)

    Taking up the contemporary challenge to sensitize and synergize instructional, industrial and governmental functionaries along this line are leading global faculties such as the Academy of Project Management (APM), Project Management Institute (PMI), and Business Analyst (BA) Times, amongst others. This work is ...

  1. Contemporary Development of Marxist Philosophy in China

    Science.gov (United States)

    Kang, Ouyang

    2002-01-01

    There are many points of interest pertaining to the development of Marxist philosophy in contemporary China. This paper will focus on the following areas and problems: (1) the debate about the criterion of truth; (2) Marxist philosophical textbook reform; (3) the inquiry into the human agent and subjectivity; (4) Marxism and Confucianism; (5) Deng…

  2. The Cultural Revolution and Contemporary Chinese Art

    Science.gov (United States)

    Yang, Guey-Meei; Suchan, Tom

    2009-01-01

    Using this instructional resource, teachers can explore the impact of the Cultural Revolution (1966-1976) on contemporary art in mainland China with their students. The three artists Luo Zhongli (b. 1948), Xu Bing (b. 1955), and Wang Guangyi (b. 1957) came of age during the Cultural Revolution and are representative of a much larger number of…

  3. Escaping entrapment : Gothic heroines in contemporary film

    NARCIS (Netherlands)

    Onaran, G.

    2017-01-01

    In my dissertation I do a close reading of five contemporary films through a Deleuzean feminist framework: What Lies Beneath (Robert Zemeckis, 2000), The Others (Alejandro Amenábar, 2001), The Forgotten (Joseph Ruben, 2004), Flightplan (Robert Schwentke, 2005), and In The Cut (Jane Campion, 2003). I

  4. Interactive Contemporary Art : Participation in Practice

    NARCIS (Netherlands)

    Brown, K.J.

    2014-01-01

    Audience participation has polarized the critical debate surrounding contemporary art's social, moral and aesthetic potential. This incisive collection of essays sheds new light on the political, ethical and artistic capacity of participatory works and tests the most recent theoretical approaches to

  5. Contemporary Drama in the English Class.

    Science.gov (United States)

    Siegfried, William

    1968-01-01

    Various approaches that teachers can use to help students interpret contemporary plays are presented in this discussion of teaching drama. Plays discussed include two from the Theater of Illusion ("Look Back in Anger,""A Raisin in the Sun"), two from the Theater of the Absurd ("Rhonoceros,""Rosencrantz and Guildenstern are Dead"), and two from…

  6. LOGISTICS MANAGEMENT IN THE CONTEMPORARY ECONOMY

    Directory of Open Access Journals (Sweden)

    Ion SARBU

    2014-03-01

    Full Text Available The evolution of logistics management as a system in the recent decades can be characterized by the influence of the globalization processes and the economic integration in the European Union. Systemic logistic approach ensured revolutionizing the optimization of the logistics chain. Logistics management must be given to permanent forms of the new legal and organizational structure appropriate to the contemporary economy.

  7. LOGISTICS MANAGEMENT IN THE CONTEMPORARY ECONOMY

    Directory of Open Access Journals (Sweden)

    Ion SARBU

    2014-01-01

    Full Text Available The evolution of logistics management as a system in the recent decades can be characterized by the influence of the globalization processes and the economic integration in the European Union. Systemic logistic approach ensured revolutionizing the optimization of the logistics chain. Logistics management must be given to permanent forms of the new legal and organizational structure appropriate to the contemporary economy.

  8. An introduction to contemporary work psychology

    NARCIS (Netherlands)

    Peeters, M.C.W.; Jonge, de J.; Taris, Toon W.

    2014-01-01

    This is the first comprehensive overview of work psychology, with coverage of classic models, current theories, and contemporary issues affecting the 21st-century worker. Examines the positive aspects of work–motivation, performance, creativity, and engagement—instead of focusing only on adverse

  9. In search of the 'Wild Contemporary'

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    further back to touch upon the legacy of Marinetti/Futurism and Le Corbusier). These ideas and visions, which at their time was considered extreme and far-fetched, are used as ‘prisms' for setting up the imaginary visioning of contemporary and future challenges to mobility within and between cities...

  10. Xenophobia In Contemporary Society: A Sociological Analysis ...

    African Journals Online (AJOL)

    This chapter examines the problem of xenophobia from a sociological perspective. The chapter discusses the problematique of xenophobia as a subject of study and includes an assessment of the incidence/prevalence of xenophobia in contemporary society, as well as indicators of xenophobia. The chapter also provides ...

  11. Contemporary management of advanced laryngeal cancer.

    Science.gov (United States)

    Britt, Christopher J; Gourin, Christine G

    2017-10-01

    The treatment of advanced laryngeal cancer has undergone a paradigm shift in recent years, with an increase in chemoradiation for organ preservation and a decrease in primary surgery. This review will summarize the contemporary management of advanced laryngeal cancer and discuss treatment-related toxicity and strategies to improve outcomes. NA.

  12. Contemporary Trends in Radiation Oncology Resident Research

    International Nuclear Information System (INIS)

    Verma, Vivek; Burt, Lindsay; Gimotty, Phyllis A.; Ojerholm, Eric

    2016-01-01

    Purpose: To test the hypothesis that recent resident research productivity might be different than a decade ago, and to provide contemporary information about resident scholarly activity. Methods and Materials: We compiled a list of radiation oncology residents from the 2 most recent graduating classes (June 2014 and 2015) using the Association of Residents in Radiation Oncology annual directories. We queried the PubMed database for each resident's first-authored publications from postgraduate years (PGY) 2 through 5, plus a 3-month period after residency completion. We abstracted corresponding historical data for 2002 to 2007 from the benchmark publication by Morgan and colleagues (Int J Radiat Oncol Biol Phys 2009;74:1567-1572). We tested the null hypothesis that these 2 samples had the same distribution for number of publications using the Wilcoxon rank-sum test. We explored the association of demographic factors and publication number using multivariable zero-inflated Poisson regression. Results: There were 334 residents publishing 659 eligible first-author publications during residency (range 0-17; interquartile range 0-3; mean 2.0; median 1). The contemporary and historical distributions were significantly different (P<.001); contemporary publication rates were higher. Publications accrued late in residency (27% in PGY-4, 59% in PGY-5), and most were original research (75%). In the historical cohort, half of all articles were published in 3 journals; in contrast, the top half of contemporary publications were spread over 10 journals—most commonly International Journal of Radiation Oncology • Biology • Physics (17%), Practical Radiation Oncology (7%), and Radiation Oncology (4%). Male gender, non-PhD status, and larger residency size were associated with higher number of publications in the multivariable analysis. Conclusion: We observed an increase in first-author publications during training compared with historical data from the mid-2000s. These

  13. Contemporary Trends in Radiation Oncology Resident Research

    Energy Technology Data Exchange (ETDEWEB)

    Verma, Vivek [Department of Radiation Oncology, University of Nebraska, Omaha, Nebraska (United States); Burt, Lindsay [Department of Radiation Oncology, University of Utah, Salt Lake City, Utah (United States); Gimotty, Phyllis A. [Department of Biostatistics and Epidemiology, University of Pennsylvania, Philadelphia, Pennsylvania (United States); Ojerholm, Eric, E-mail: eric.ojerholm@uphs.upenn.edu [Department of Radiation Oncology, University of Pennsylvania, Philadelphia, Pennsylvania (United States)

    2016-11-15

    Purpose: To test the hypothesis that recent resident research productivity might be different than a decade ago, and to provide contemporary information about resident scholarly activity. Methods and Materials: We compiled a list of radiation oncology residents from the 2 most recent graduating classes (June 2014 and 2015) using the Association of Residents in Radiation Oncology annual directories. We queried the PubMed database for each resident's first-authored publications from postgraduate years (PGY) 2 through 5, plus a 3-month period after residency completion. We abstracted corresponding historical data for 2002 to 2007 from the benchmark publication by Morgan and colleagues (Int J Radiat Oncol Biol Phys 2009;74:1567-1572). We tested the null hypothesis that these 2 samples had the same distribution for number of publications using the Wilcoxon rank-sum test. We explored the association of demographic factors and publication number using multivariable zero-inflated Poisson regression. Results: There were 334 residents publishing 659 eligible first-author publications during residency (range 0-17; interquartile range 0-3; mean 2.0; median 1). The contemporary and historical distributions were significantly different (P<.001); contemporary publication rates were higher. Publications accrued late in residency (27% in PGY-4, 59% in PGY-5), and most were original research (75%). In the historical cohort, half of all articles were published in 3 journals; in contrast, the top half of contemporary publications were spread over 10 journals—most commonly International Journal of Radiation Oncology • Biology • Physics (17%), Practical Radiation Oncology (7%), and Radiation Oncology (4%). Male gender, non-PhD status, and larger residency size were associated with higher number of publications in the multivariable analysis. Conclusion: We observed an increase in first-author publications during training compared with historical data from the mid-2000s. These

  14. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  15. Stress Sensitivity, Aberrant Salience, and Threat Anticipation in Early Psychosis: An Experience Sampling Study.

    Science.gov (United States)

    Reininghaus, Ulrich; Kempton, Matthew J; Valmaggia, Lucia; Craig, Tom K J; Garety, Philippa; Onyejiaka, Adanna; Gayer-Anderson, Charlotte; So, Suzanne H; Hubbard, Kathryn; Beards, Stephanie; Dazzan, Paola; Pariante, Carmine; Mondelli, Valeria; Fisher, Helen L; Mills, John G; Viechtbauer, Wolfgang; McGuire, Philip; van Os, Jim; Murray, Robin M; Wykes, Til; Myin-Germeys, Inez; Morgan, Craig

    2016-05-01

    While contemporary models of psychosis have proposed a number of putative psychological mechanisms, how these impact on individuals to increase intensity of psychotic experiences in real life, outside the research laboratory, remains unclear. We aimed to investigate whether elevated stress sensitivity, experiences of aberrant novelty and salience, and enhanced anticipation of threat contribute to the development of psychotic experiences in daily life. We used the experience sampling method (ESM) to assess stress, negative affect, aberrant salience, threat anticipation, and psychotic experiences in 51 individuals with first-episode psychosis (FEP), 46 individuals with an at-risk mental state (ARMS) for psychosis, and 53 controls with no personal or family history of psychosis. Linear mixed models were used to account for the multilevel structure of ESM data. In all 3 groups, elevated stress sensitivity, aberrant salience, and enhanced threat anticipation were associated with an increased intensity of psychotic experiences. However, elevated sensitivity to minor stressful events (χ(2)= 6.3,P= 0.044), activities (χ(2)= 6.7,P= 0.036), and areas (χ(2)= 9.4,P= 0.009) and enhanced threat anticipation (χ(2)= 9.3,P= 0.009) were associated with more intense psychotic experiences in FEP individuals than controls. Sensitivity to outsider status (χ(2)= 5.7,P= 0.058) and aberrantly salient experiences (χ(2)= 12.3,P= 0.002) were more strongly associated with psychotic experiences in ARMS individuals than controls. Our findings suggest that stress sensitivity, aberrant salience, and threat anticipation are important psychological processes in the development of psychotic experiences in daily life in the early stages of the disorder. © The Author 2016. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  16. Stress Sensitivity, Aberrant Salience, and Threat Anticipation in Early Psychosis: An Experience Sampling Study

    Science.gov (United States)

    Reininghaus, Ulrich; Kempton, Matthew J.; Valmaggia, Lucia; Craig, Tom K. J.; Garety, Philippa; Onyejiaka, Adanna; Gayer-Anderson, Charlotte; So, Suzanne H.; Hubbard, Kathryn; Beards, Stephanie; Dazzan, Paola; Pariante, Carmine; Mondelli, Valeria; Fisher, Helen L.; Mills, John G.; Viechtbauer, Wolfgang; McGuire, Philip; van Os, Jim; Murray, Robin M.; Wykes, Til; Myin-Germeys, Inez; Morgan, Craig

    2016-01-01

    While contemporary models of psychosis have proposed a number of putative psychological mechanisms, how these impact on individuals to increase intensity of psychotic experiences in real life, outside the research laboratory, remains unclear. We aimed to investigate whether elevated stress sensitivity, experiences of aberrant novelty and salience, and enhanced anticipation of threat contribute to the development of psychotic experiences in daily life. We used the experience sampling method (ESM) to assess stress, negative affect, aberrant salience, threat anticipation, and psychotic experiences in 51 individuals with first-episode psychosis (FEP), 46 individuals with an at-risk mental state (ARMS) for psychosis, and 53 controls with no personal or family history of psychosis. Linear mixed models were used to account for the multilevel structure of ESM data. In all 3 groups, elevated stress sensitivity, aberrant salience, and enhanced threat anticipation were associated with an increased intensity of psychotic experiences. However, elevated sensitivity to minor stressful events (χ2 = 6.3, P = 0.044), activities (χ2 = 6.7, P = 0.036), and areas (χ2 = 9.4, P = 0.009) and enhanced threat anticipation (χ2 = 9.3, P = 0.009) were associated with more intense psychotic experiences in FEP individuals than controls. Sensitivity to outsider status (χ2 = 5.7, P = 0.058) and aberrantly salient experiences (χ2 = 12.3, P = 0.002) were more strongly associated with psychotic experiences in ARMS individuals than controls. Our findings suggest that stress sensitivity, aberrant salience, and threat anticipation are important psychological processes in the development of psychotic experiences in daily life in the early stages of the disorder. PMID:26834027

  17. Maximising the effect of combination HIV prevention through prioritisation of the people and places in greatest need: a modelling study.

    Science.gov (United States)

    Anderson, Sarah-Jane; Cherutich, Peter; Kilonzo, Nduku; Cremin, Ide; Fecht, Daniela; Kimanga, Davies; Harper, Malayah; Masha, Ruth Laibon; Ngongo, Prince Bahati; Maina, William; Dybul, Mark; Hallett, Timothy B

    2014-07-19

    Epidemiological data show substantial variation in the risk of HIV infection between communities within African countries. We hypothesised that focusing appropriate interventions on geographies and key populations at high risk of HIV infection could improve the effect of investments in the HIV response. With use of Kenya as a case study, we developed a mathematical model that described the spatiotemporal evolution of the HIV epidemic and that incorporated the demographic, behavioural, and programmatic differences across subnational units. Modelled interventions (male circumcision, behaviour change communication, early antiretoviral therapy, and pre-exposure prophylaxis) could be provided to different population groups according to their risk behaviours or their location. For a given national budget, we compared the effect of a uniform intervention strategy, in which the same complement of interventions is provided across the country, with a focused strategy that tailors the set of interventions and amount of resources allocated to the local epidemiological conditions. A uniformly distributed combination of HIV prevention interventions could reduce the total number of new HIV infections by 40% during a 15-year period. With no additional spending, this effect could be increased by 14% during the 15 years-almost 100,000 extra infections, and result in 33% fewer new HIV infections occurring every year by the end of the period if the focused approach is used to tailor resource allocation to reflect patterns in local epidemiology. The cumulative difference in new infections during the 15-year projection period depends on total budget and costs of interventions, and could be as great as 150,000 (a cumulative difference as great as 22%) under different assumptions about the unit costs of intervention. The focused approach achieves greater effect than the uniform approach despite exactly the same investment. Through prioritisation of the people and locations at greatest

  18. Posts, pics, or polls? Which post type generates the greatest engagement in a Facebook physical activity intervention?

    Science.gov (United States)

    Edney, Sarah; Looyestyn, Jemma; Ryan, Jillian; Kernot, Jocelyn; Maher, Carol

    2018-04-05

    Social networking websites have attracted considerable attention as a delivery platform for physical activity interventions. Current evidence highlights a need to enhance user engagement with these interventions to actualize their potential. The purpose of this study was to determine which post type generates the most engagement from participants and whether engagement was related to change in physical activity in an intervention delivered via Facebook. Subgroup analysis of the intervention condition of a randomized controlled trial was conducted. The group moderator posted a new message to the private Facebook group each day of the program. The Facebook posts (n = 118) were categorized into the following types: moderator-initiated running program, multimedia, motivational, opinion polls, or discussion question and participant-initiated experience shares, or questions. Four metrics were used to measure volume of engagement with each post type, "likes," "comments," "poll votes," and "photo uploads." One-way ANOVA was used to determine whether engagement differed by post type and an independent samples t-test to determine differences in engagement between moderator and participant-initiated posts. Pearson correlation was used to examine associations between total engagement and change in physical activity. Engagement varied by post type. Polls elicited the greatest engagement (p ≤ .01). The most common form of engagement was "likes," and engagement was higher for moderator-initiated rather than participant-initiated posts (mean = 8.0 [SD 6.8] vs. 5.3 [SD 3.2]; p ≤ .01). Total engagement with the Facebook group was not directly associated with change in physical activity (r = -.13, p = .47). However, engagement was associated with compliance with the running program (r = .37, p = .04) and there was a nonsignificant positive association between compliance and change in physical activity (r = .32, p = .08). Posts requiring a simple response generated the most

  19. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  20. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  1. THE THEORY OF CIVILIZATIONS THROUGH THE LENS OF CONTEMPORARY HUMANITIES

    Directory of Open Access Journals (Sweden)

    T. V. Danylova

    2016-06-01

    Full Text Available Purpose. This paper invites reflections on the further development of civilizational theory through the lens of contemporary humanities. It argues that philosophy is one of the key dimensions of the integral theory of civilizations. The purpose is to promote dialogue-rich interdisciplinary civilizational approach with philosophical understanding of human essence at its core. Methodology. The author has used comparative historical analysis, along with hermeneutical methodology and interdisciplinary approach. Theoretical basis and results. Faced with the challenges of our time, researchers are turning to the civilizational approach, according to which world history appears to us as a colourful spectrum of the options for the development of humanity. At the present stage of scientific development the integral theory of civilizations seems to be the most productive tool for the interpretation of the events taking place in our world. Origianlity. The problem of human being is a key factor in understanding the dynamics of civilizational process and designing a promising theory of civilizations. Philosophy should occupy an important place in the development of a new theory of civilizations: philosophy is the spiritual quintessence of every epoch, every cultural and civilizational community. In particular, a new theory has to take into account both classic and contemporary investigations in the field of philosophical anthropology and theory of values. The increasing threat posed by the clash of civilizations can become a swan song of humanity. For the preservation and further development of the world civilization, there is no other choice but to elaborate the strategies, mechanisms for consultation and dialogue, cooperation and partnership of civilizations and states. That is why the urgent task is to create the certain philosophical position that will contribute to mutual understanding. Conclusions. It is important to involve philosophers in the

  2. Inflation Metaphor in Contemporary American English

    Science.gov (United States)

    Hu, Chunyu; Chen, Zhi

    2015-01-01

    Inflation is often regarded as a dangerous phenomenon which poses a potential threat to economies in the world. It is thus an entity that demands the constant attention of economists, policymakers and the general public. In order to make this abstract entry more concrete and vivid, a number of metaphorical expressions are used to depict inflation.…

  3. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  4. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  5. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  6. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  7. INFORMATION THREATS IN A GLOBALIZED WORLD: ECONOMICS, POLITICS, SOCIETY (EXPERIENCE OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Anatoliy Holovka

    2016-11-01

    Full Text Available The scientific article deals with both integral vision of the contemporary informative risks in the globalized world and their classification. The essence of the informative security is exposed, which is one of main factors of steady development of the modern informative society. In consideration of the foreign practice, the experience of Ukraine is also analyzed in counteraction to the contemporary informative threats. The effective policy of safety and counteraction to the informative threats is one of the basic constituents of the state national safety system and at the same time testifies to the correct character of connections between the public organs and the society. Under the conditions of unrestrained progress of information technologies and general informatization in all sectors of people’s life (politics, economy, defense, energy etc., providing of control and defense of informative space of the country becomes much more difficult task. Modern Ukrainian realities certify convincingly, that Ukraine is in an extremely difficult political situation that influences all spheres of Ukrainians’ life. The key reason of such situation is a military-informative aggression against Ukraine from Russia, which is the fact of waging a «hybrid war». As it is known, this type of war combines the application of both classic soldiery instruments (military technique, firearms, regular troops and methods of informative influence (cyber-attack, informative diversions, aggressive propaganda, impact on public opinion. This factor encourages such research. The object of the study is the phenomenon of information risks in the modern world. Subject of research – is the impact of modern information threats to the state and society, namely the economic, political and social spheres. For a holistic analysis of the subject of research was used appropriate methodology – systematic approach, method of comparative analysis, general scientific methods

  8. Contemporary intellectual property law and policy

    CERN Document Server

    MacQueen, Hector; Laurie, Graeme; Brown, Abbe

    2011-01-01

    Contemporary Intellectual Property: Law and Policy offers a unique perspective on intellectual property law, unrivalled amongst IP textbooks available today. Beyond providing an up-to-date account of intellectual property law, the text examines the complex policies that inform and guide modern IP law at the domestic (including Scottish), European and international levels, giving the reader a true insight into the discipline and the shape of things to come. The focus is on contemporary challenges to intellectual property law and policy and the reader is encouraged to engage critically both with the text and the subject matter. Carefully developed to ensure that the complexities of the subject are addressed in a clear and approachable manner, the extensive use of practical examples, exercises and visual aids throughout the text enliven the subject and stimulate the reader.

  9. Contemporary solutions for managing Class III malocclusion

    Directory of Open Access Journals (Sweden)

    Nathamuni Rengarajan Krishnaswamy

    2015-01-01

    Full Text Available Although patients with Class III malocclusions constitute a small percentage of the average orthodontic practice, providing them with optimal treatment is a daunting task. The treatment approach is dependent upon the growth status of the individual and the severity of the skeletal dysplasia. For growing individuals, facemask therapy to protract the maxilla is ineffective because of its dependence on dental anchorage to bring forth skeletal correction. Orthodontic camouflage in nongrowing mild skeletal Class III individuals is met with limited success because of the anatomical boundaries and the conventional biomechanics. Orthognathic surgery to correct the maxillomandibular relations is time-consuming, and the facial esthetics is compromised during the orthodontic decompensation period. Contemporary solutions to overcome these limitations are now viable with the use of temporary anchorage devices and by performing surgery prior to orthodontic decompensation. The rationale for employing these contemporary approaches will be discussed in this study with illustrative cases.

  10. Pragmatics of Contemporary Teaching and Learning Methods

    Directory of Open Access Journals (Sweden)

    Ryszard Józef Panfil

    2013-09-01

    Full Text Available The dynamics of the environment in which educational institutions operate have a significant influence on the basic activity of these institutions, i.e. the process of educating, and particularly teaching and learning methods used during that process: traditional teaching, tutoring, mentoring and coaching. The identity of an educational institution and the appeal of its services depend on how flexible, diverse and adaptable is the educational process it offers as a core element of its services. Such a process is determined by how its pragmatism is displayed in the operational relativism of methods, their applicability, as well as practical dimension of achieved results and values. Based on the above premises, this publication offers a pragmatic-systemic identification of contemporary teaching and learning methods, while taking into account the differences between them and the scope of their compatibility. Secondly, using the case of sport coaches’ education, the author exemplifies the pragmatic theory of perception of contemporary teaching and learning methods.

  11. Embodiment and aging in contemporary physiotherapy.

    Science.gov (United States)

    Hay, Melissa E; Connelly, Denise M; Kinsella, Elizabeth Anne

    2016-05-01

    Contemporary discourses in the health sciences vary in their treatment of aging bodies and the mind-body relationship, yet our understanding of aging experiences and health care practices can be limited by an overreliance on biomedical or social constructionist approaches alone. This paper offers a conceptual exploration of embodiment as an innovative approach to enhance our understandings of aging bodies and health in physiotherapy practice. Embodiment attends to body and mind, nature and culture, structure and agency, while appreciating differences in aging bodies and health in aging. Conclusions consider embodiment in the practice and disciplinary discourse of contemporary physiotherapy, specifically, considering the ways embodied perspectives can support therapists in their health care practice and relationships with people with aging bodies.

  12. Religion and spirituality in contemporary dreams

    Directory of Open Access Journals (Sweden)

    Werner Nell

    2012-02-01

    Full Text Available This article examines the spiritual value and role of dreams in the lives of South African Christians, based on the findings of a qualitative research project in which semistructured interviews were used to examine the dream-related beliefs and practices of contemporary Christians. The findings indicated that dreams are still considered to be of distinct religious value and importance by a significant number of the Christian participants who took part in the study. Specifically, the participants reported that their dreams often serve as source of spiritual inspiration, insight and guidance, as well as feedback on decisions and ways of living. It was also indicated that dreams sometimes constituted an important natural resource in coming to terms with bereavement. In response to this, the article closes with a call for a re-evaluation of the position and value of dreams in contemporary Christianity, and offers several practical suggestions for working with dreams in a spiritual context.

  13. Contemporary intellectual property law and policy

    CERN Document Server

    Waelde, Charlotte; Kheria, Smita; Cornwell, Jane

    2016-01-01

    Contemporary Intellectual Property: Law and Policy offers a unique perspective on intellectual property law. It goes beyond an up-to-date account of the law and examines the complex policies that inform and guide modern intellectual property law at the domestic (including Scottish), European and international levels, giving the reader a true insight into the discipline and the shape of things to come. The focus is on contemporary challenges to intellectual property law and policy and the reader is encouraged to engage critically both with the text and the subject matter. Carefully developed to ensure that the complexities of the subject are addressed in a clear and approachable manner, the extensive use of practical examples, exercises and visual aids throughout the text enliven the subject and stimulate the reader.

  14. Tectonic thinking in contemporary industrialized architecture

    DEFF Research Database (Denmark)

    Beim, Anne

    2013-01-01

    a creative force in building constructions, structural features and architectural design (construing) – helps to identify and refine technology transfer in contemporary industrialized building construction’. Through various references from the construction industry, business theory and architectural practice......This paper argues for a new critical approach to the ways architectural design strategies are developing. Contemporary construction industry appears to evolve into highly specialized and optimized processes driven by industrialized manufacturing, therefore the role of the architect...... and the understanding of the architectural design process ought to be revised. The paper is based on the following underlying hypothesis: ‘Tectonic thinking – defined as a central attention towards the nature, the properties, and the application of building materials (construction) and how this attention forms...

  15. Scoring an Abstract Contemporary Silent Film

    OpenAIRE

    Frost, Crystal

    2014-01-01

    I composed an original digital audio film score with full sound design for a contemporary silent film called Apple Tree. The film is highly conceptual and interpretive and required a very involved, intricate score to successfully tell the story. In the process of scoring this film, I learned new ways to convey an array of contrasting emotions through music and sound. After analyzing the film's emotional journey, I determined that six defining emotions were the foundation on which to build an ...

  16. Dirty Pop: Contemporary British Painting, Group Exhibition

    OpenAIRE

    Stubbs, Michael

    2013-01-01

    Phil Allen, Peter Ashton Jones, Jake Clark, Richard Clegg, Dan Coombs, Nelson Diplexcito, Nadine Feinson, Mick Finch, Richard Hamilton, Dan Hays, Gavin Lockheart, Andrea Medjesi Jones, David Leeson, Duncan Newton, Sarah Pickstone, Colin Smith, John Stark, Michael Stubbs, James White, Mark Wright.\\ud \\ud Dirty Pop, curated for &Model by Mark Wright, presents twenty contemporary painters whose work connects with Pop Art of the 1960’s, and particularly the legacy of the important British artist ...

  17. Cases to accompany contemporary strategy analysis

    OpenAIRE

    R. Grant

    2007-01-01

    This volume represents an ongoing committment to examining the concepts and techniques of business strategy analysis in the context of real business situations. The cases have been written to accompany Contemporary Strategy Analysis textbook. Each case presents issues that illuminate the ideas, concepts, and analytical techniques contained in one or more chapters of the textbook. Most important, the cases promote deep learning by students of strategic management by requiring the application o...

  18. Gender inequality: The challenge of contemporary demography

    OpenAIRE

    Šobot Ankica

    2010-01-01

    Gender perspective is a heuristic device in researching social phenomena, and gender inequality is a social fact which requires an adequate answer. Also, social differences between women and men are examined as relevant factors of demographic phenomena. The contemporary demography is opening up space not only for the gender aspect, but also for gender inequality as a relevant research topic. This paper discusses the possibilities of demographic approach to studying social inequality between w...

  19. Doing fatherhood, doing family: contemporary paternal perspectives

    OpenAIRE

    Osborn, Sharani Evelyn

    2015-01-01

    Research in recent decades has identified a conception among fathers, and others, of a widespread qualitative change in the potential nature of fatherhood for men. This widely circulated ideal of contemporary, participatory fatherhood is characterised as new, intimate, involved and productive of new practices of ‘masculinity’ (Henwood and Procter, 2003). A belief that fathers play a major part in family life and family a major part in fathers’ lives may, first, change the natur...

  20. “IDENTITY” IN CONTEMPORARY SOCIOLOGICAL THEORY

    Directory of Open Access Journals (Sweden)

    N. L. Polyakova

    2016-01-01

    Full Text Available The problem of identity has come to the fore of contemporary societies in the conditions when the institutional structures of these societies their ascriptive statuses have become looser when modernity is “liquid”, “soft”. Varions conceptualizations of identity are becoming a basic part of contemporary sociological theory. The paper aims to reveal the key problems that sociology faces when striving to work out a theory of identity. The paper takes as its starting point the classic notion of identity. This notion was shaped by Erik Erikson on the basis of his dynamic psychology. The paper proves that the contemporary identity is connected with the process of individualization in modern societies. Numerous and varied studies of contemporary identity can be divided into three large groups according to three methodological approaches: constructivist, postmodern and interactionist. The paper compares the major theories based on these approaches and reveals their theoretical and methodological problems. The paper shows that the constructivist approach is based on the notion of reflexivity which is viewed as a mechanism of identity formation by an individual. Identity is a reflexive project which is being realized in a conscious manner. The postmodern theories of identity reveal the fragmentation incompleteness of ego-identitity and it’s narcissic decay. They also reveal the inability of the individual to solve the problem of continuity and unity of her (his own personality. Identity as a notion is replaced by the notion of identification which reduces identity to varions modes of repsentation. The interactionist methodology conld open up the way to tackle, the problem of individual’s unity and continuity as the main problem of human existence. This is the condition of the individual’s psychic and social health. 

  1. Contemporary perspectives on Lacanian theories of psychosis

    OpenAIRE

    Redmond, Jonathan D.

    2013-01-01

    Abstract:In contemporary Lacanian psychoanalysis, Verhaeghe’s theory of actualpathology / psychopathology in psychosis and the Millerian idea of ordinary psychosis provide diverging conceptual approaches to psychosis. In this paper, the two approaches to psychosis are examined with a particular emphasis on mild psychosis and compensatory mechanisms. Despite the shared focus on similar clinical phenomena, particularly body disturbances, these two theories provide different explanations of psyc...

  2. Volumetric polymerization shrinkage of contemporary composite resins

    OpenAIRE

    Nagem Filho, Halim; Nagem, Haline Drumond; Francisconi, Paulo Afonso Silveira; Franco, Eduardo Batista; Mondelli, Rafael Francisco Lia; Coutinho, Kennedy Queiroz

    2007-01-01

    The polymerization shrinkage of composite resins may affect negatively the clinical outcome of the restoration. Extensive research has been carried out to develop new formulations of composite resins in order to provide good handling characteristics and some dimensional stability during polymerization. The purpose of this study was to analyze, in vitro, the magnitude of the volumetric polymerization shrinkage of 7 contemporary composite resins (Definite, Suprafill, SureFil, Filtek Z250, Fill ...

  3. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  4. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  5. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    Directory of Open Access Journals (Sweden)

    Hannes Gaisberger

    Full Text Available Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change. We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs, climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted

  6. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  7. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  8. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  9. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  10. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  11. Cyber threat intelligence exchange: A growing requirement

    CSIR Research Space (South Africa)

    Veerasamy, Namosha

    2017-06-01

    Full Text Available Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a...

  12. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  13. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  14. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  15. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  16. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic

  17. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  18. The Divisive Threat of Immigration in Europe

    Science.gov (United States)

    2012-12-01

    Wilders established the Party for Freedom (PVV), in 2005 with a strong anti-immigration agenda. The party believes Judeo-Christian and humanist ...Allied administration of post-WWI Europe. Right-wing movements of the 60’s and 80’s were a response to an existential threat during the Cold War rather

  19. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  20. Norman Mailer - the most influental critic of contemporary reality in the second half of the twentieth century

    Directory of Open Access Journals (Sweden)

    Jasna Potočnik Topler

    2013-12-01

    Full Text Available Norman Mailer, one of the most influential authors of the second half of the twentieth century, faithfully followed his principle that a writer should alsobe a critic of contemporary reality. Therefore, most of his works portray the reality of the United States of America and the complexities of the contemporary American scene. Mailer described the spirit of his time - from the terror of war and numerous dynamic social and political processes to the 1969 moon landing. Conflicts were often in the centre of his writing, as was the relationship between an individual and the society; he speaks of politicalpower and the dangerous power of capital, while pointing to the threat of totalitarianism in America. Mailer spent his entire career writing about violence, power, perverted sexuality, the phenomenon of Hitler, terrorism, religion and corruption. He continually pointed out that individuals were in constant danger of losing freedom and dignity.

  1. Genetic restoration of a stocked brown trout Salmo trutta population using microsatellite DNA analysis of historical and contemporary samples

    DEFF Research Database (Denmark)

    Hansen, Michael Møller; Bekkevold, Dorte; Jensen, L.F.

    2006-01-01

    1. Gene flow from domesticated to wild populations is a major threat to wild salmonid fish. However, few studies have addressed how populations could be restored after admixture has occurred. We analysed the prospects for restoring the previously intensively stocked brown trout population...... of the Skjern River, Denmark, by identifying remaining non-admixed individuals to be used for supportive breeding. 2. We analysed microsatellite DNA markers in historical (1940-50s) and contemporary (1992-2004) samples from the Skjern River system, from the strain of domesticated trout previously used...... for stocking, and from the neighbouring Stora River. We analysed admixture proportions to estimate the genetic contribution by domesticated trout. We identified non-admixed trout using assignment tests, and further analysed the possible sources of indigenous trout by estimating contemporary migration among...

  2. Science and Its Images--Promise and Threat: From Classic Literature to Contemporary Students' Images of Science and "The Scientist"

    Science.gov (United States)

    Koren, Pazit; Bar, Varda

    2009-01-01

    The physical and social image of the scientist among school children, student teachers, and teachers over the last 50 years was investigated. Interest has also been shown in the perception of the personality behind the physical stereotype. Nevertheless, the value judgments of science and scientists and the positive and negative mind-sets attaching…

  3. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Science.gov (United States)

    Coll, Marta; Piroddi, Chiara; Steenbeek, Jeroen; Kaschner, Kristin; Ben Rais Lasram, Frida; Aguzzi, Jacopo; Ballesteros, Enric; Bianchi, Carlo Nike; Corbera, Jordi; Dailianis, Thanos; Danovaro, Roberto; Estrada, Marta; Froglia, Carlo; Galil, Bella S; Gasol, Josep M; Gertwagen, Ruthy; Gil, João; Guilhaumon, François; Kesner-Reyes, Kathleen; Kitsos, Miltiadis-Spyridon; Koukouras, Athanasios; Lampadariou, Nikolaos; Laxamana, Elijah; López-Fé de la Cuadra, Carlos M; Lotze, Heike K; Martin, Daniel; Mouillot, David; Oro, Daniel; Raicevich, Sasa; Rius-Barile, Josephine; Saiz-Salinas, Jose Ignacio; San Vicente, Carles; Somot, Samuel; Templado, José; Turon, Xavier; Vafidis, Dimitris; Villanueva, Roger; Voultsiadou, Eleni

    2010-08-02

    The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular, the Strait of

  4. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Directory of Open Access Journals (Sweden)

    Marta Coll

    Full Text Available The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular

  5. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  6. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  7. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  8. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  9. Organisational culture: A contemporary management perspective

    Directory of Open Access Journals (Sweden)

    Richard Weeks

    2010-12-01

    Full Text Available Purpose: The purpose of this paper is to analyse the concept "organisational culture from a traditional and a more contemporary management perspective. Problem investigated: The concept organizational culture has assumed a very prominent place within the management literature and has been analysed from diverse multidisciplinary perspectives. Central to the importance attributed to the concept is the fact that it acts as a perceptual and behavioural determinant, which implies that it will have a significant impact on all human related institutional activities and thus the interest in the concept and its management. Researchers and management practitioners have come to assume that while the concept is difficult to manage in practice, it is possible to determine the prevailing culture of an institution, identify what is termed to be a desired culture for an institution and then analyse the cultural gap that exists. Based on the analysis conducted, it is further frequently assumed that the transition from the prevailing to a desired culture can be managed. A more contemporary management perspective, based on complexity theory, would appear to challenge the assumption of being able to actively manage the organisation's culture transformation process to ensure that a desired culture is manifest within the institution. The traditional and more contemporary approaches for dealing with the concept "organisational culture" are the focus of discussion and analysis in this paper. Methodology: A multidisciplinary literature review and analysis is undertaken to gain an insight of traditional and contemporary management theory and practice, as it relates to the concept "organisational culture" and its management. Findings: An important conclusion drawn from the study is that traditional paradigms of organisational culture management, that evolved within a more mechanistic manufacturing economy, is no longer effective for dealing with the unpredictable and

  10. Comparison of the effectiveness of contemporary ophthalmic lenses against β radiation

    International Nuclear Information System (INIS)

    Dunlap, J.H.; Harvey, P.W.; Schwing, R.L.

    1977-01-01

    As part of a study intended to identify the lens material and type that provides maximum eye protection against beta radiation, the effectiveness of contemporary ophthalmic lenses has been evaluated. From the calculations and measurements presented it is evident that safety glasses with crown glass ophthalmic lenses afford the eye the greatest protection against beta radiation, whereas street glasses with plastic ophthalmic lenses afford the eye very little protection. It is to be noted that glass street lenses (approximately 2.2 mm thick) provide greater protection than plastic safety lenses (approximately 3.5 mm thick). A warning is given against the use of safety lenses containing a large percentage of thorium. (U.K.)

  11. Antropology according to contemporary orthodox theologians

    Directory of Open Access Journals (Sweden)

    Krzysztof Leśniewski

    2014-11-01

    Full Text Available The article presents anthropological views of some very influential Orthodox theologians. The author starts his attempt from sketching a direct historical context of a rapid development of anthropology since19th century. He indicates that since the middle of 20th century one cannotice an increasing interest concerning on the understanding of human person, human freedom and human rights in social structures. Then he summarizes main points of the mystical anthropology of Vladimir Lossky. This very influential theologian, who concentrated mostly oncategory of person in apophatic and Trinitarian perspective on the basisof the patristic wisdom, has influenced many contemporary religious thinkers.Grounds of the anthropological reflection of Orthodox theologians were described in the second part of the article. Contemporary theologians have been trying to find answers for such questions as: “Who is a human being?”; “How to understand his or her freedom, rights, morality, life and existence?”; “What does compose the essence of his or her relationswith other human beings in the community of the Church and society”– taking into account the Divine Scripture, the teaching of the Churchand modern philosophical reflections.The third part of the article shows four examples of Greek theologians who significantly have contributed to the contemporary discussion on the mystery of human person. Each of them characterizes of a specific attempt towards looking for anthropological solutions from Christian point of view. The author labeled the main interest of each of them by a specific title: Panayiotis Nellas – a Christocentric exponent of patristic anthropology, Nikos Nissiotis – a courageous searcher of bases of dialogical anthropology, Christos Yannaras – a brilliant architect of relational ontology of person, Metropolitan John Zizioulas – a persistent builder of personalistic ecclesiological anthropology.

  12. The contemporary Romanian paradigm of marketing promotion

    Directory of Open Access Journals (Sweden)

    Manic Marius

    2018-01-01

    Full Text Available Contemporary marketing takes place in the field of permanent interconnection, of instant information and immediate rewards. Communication through marketing promotion will take these characteristics into account or will be just an inefficient spending. The Romanian market is no different from the global one. Marketing promotion currently has new tools that lead to new challenges in that it makes use of traditional, yet pow erful forms, but also absolute ways of communication. The Romanian promotion is helped today by these tools, but its task is more complex than it was a decade ago .

  13. Advanced light sculpting for contemporary biophotonics

    DEFF Research Database (Denmark)

    Glückstad, Jesper; Palima, Darwin; Villangca, Mark Jayson

    , structured illumination, optical security, parallel laser marking and recently in contemporary biophotonics applications such as for real-­‐time parallel two-­‐photon optogenetics and neurophotonics. Our most recent GPC light sculpting developments geared towards these applications will be presented....... This includes both a static and a dynamic GPC Light Shaper implementation based on our latest theoretical derivations to demonstrate the benefits for typical applications where lasers have to be actively shaped into particular light patterns. We then show the potential of GPC for biomedical and multispectral...

  14. Contemporary Network Proteomics and Its Requirements

    Science.gov (United States)

    Goh, Wilson Wen Bin; Wong, Limsoon; Sng, Judy Chia Ghee

    2013-01-01

    The integration of networks with genomics (network genomics) is a familiar field. Conventional network analysis takes advantage of the larger coverage and relative stability of gene expression measurements. Network proteomics on the other hand has to develop further on two critical factors: (1) expanded data coverage and consistency, and (2) suitable reference network libraries, and data mining from them. Concerning (1) we discuss several contemporary themes that can improve data quality, which in turn will boost the outcome of downstream network analysis. For (2), we focus on network analysis developments, specifically, the need for context-specific networks and essential considerations for localized network analysis. PMID:24833333

  15. Astronomy Education: a Challenge for Contemporary Education

    Science.gov (United States)

    Metaxa, M.

    2010-07-01

    Tales around the World give visibility to local, national and international fundamental connection that always existed between people and the night sky that means Astronomy. In this paper we discuss and analyze further the role of Astronomy Education for achieving an integrated concept of education, one that enables individuals to adapt to a rapidly changing social, economic and cultural environment, and to continue to learn throughout life. It is no longer enough to learn how to read, write and count. We also discuss and present initiatives undertaken in the context of various national, and international educational projects in Greece as best practices on how Astronomy Education can actually reinforce the Contemporary Education.

  16. Contemporary pain management in total knee arthroplasty.

    Science.gov (United States)

    Khanasuk, Yutthana; Ngarmukos, Srihatach

    2012-10-01

    Pain management has become a very important part of postoperative care for total knee arthroplasty patients. Contemporary pain control has evolved from high-dose opioid in the past to state-of-the-art multimodal regimens. These include multiple non-opioid medication such as NSAIDs, COX-2 inhibitors, and gabapentinoid, and novel anesthetic techniques such as preemptive analgesia and ultrasound-guided peripheral nerve blocks. Another method which is gaining popularity is intraarticular injection of anesthetic cocktail during surgery. Pre-op education can also help patients cope with their pain better.

  17. Editorial: Contemporary Issues in International Economics

    Directory of Open Access Journals (Sweden)

    Piotr STANEK

    2013-09-01

    Full Text Available International dimension is at the core of modern business activity and globalization processes tighten interconnectedness also at the macroeconomic level to unprecedented levels. This is clearly demonstrated by the first two issues of our review and expressed in editorial introductions (Wach, 2013; Klich, 2013. Thus, the third issue is explicitly devoted to contemporary issues in international economics. Obviously, tackling them in the way as complete as for example in Global Shift: Mapping the Changing Contours of the World Economy (Dicken, 2011 is impossible, taken into consideration limits of a journal issue.

  18. Preserving the Person in Contemporary Psychiatry.

    Science.gov (United States)

    Gabbard, Glen O

    2018-06-01

    Psychodynamic psychiatry is a way of thinking that places the person at the heart of diagnostic understanding and treatment. This emphasis on unique characteristics of an individual is at odds with much of contemporary psychiatric thought, which is geared to identifying a set of criteria designed to identify discrete diagnostic categories with biological underpinnings. This article addresses component parts of the person that are linked to psychodynamic constructs and lie at the heart of diagnostic understanding and treatment in psychodynamic psychiatry. Copyright © 2018 Elsevier Inc. All rights reserved.

  19. Contemporary energy storage sources. Energy saving

    International Nuclear Information System (INIS)

    Manev, Veselin

    2011-01-01

    The development of renewable energy system for electricity production is impede because of needs to be stabilized with nearly equivalent installed power of energy storage devices. The development of more electrical energy storage facilities will be extremely important for electricity generation in the future. Using hydro pumping, combined with a long life and fast charge/discharge rate, highly efficient contemporary power energy storage as Altairnano lithium ion battery, currently is seems to be the best solution for fast penetration rate of wind and solar energy systems

  20. Contemporary Chinese Art Under Deng Xiaoping

    OpenAIRE

    Lincot, Emmanuel

    2008-01-01

    Studying contemporary art in China is not an exclusively aesthetic choice. In the context of an emerging market, art is as much a matter of cultural economy as of socio-politics. Thus art is not the product of an independent condition. In its imagination, as well as in its own diversity and its transformations, it encompasses and summarises the changes of a culture which is appropriating the schemes, images and notions inherited both from an age-old tradition and from the West (a West which i...

  1. Contemporary management of drug-packers

    Science.gov (United States)

    Kelly, J; Corrigan, M; Cahill, RA; Redmond, HP

    2007-01-01

    Experience with management of drug-packers (mules) is variable among different centres. However, despite a recorded increase in drug trafficking in general, as yet, no unified, clear guidelines exist to guide the medical management of those who only occasionally encounter these individuals. We describe our recent experience with this growing problem and discuss the most salient points concerning the contemporary management of body packers. Our recent experience demonstrates that type IV packages may now be managed conservatively for the most part. PMID:17448234

  2. Nasal Myiasis in Hinduism and Contemporary Otorhinolaryngology.

    Science.gov (United States)

    Bosmia, Anand N; Zimmermann, Terence M; Griessenauer, Christoph J; Shane Tubbs, R; Rosenthal, Eben L

    2017-08-01

    Various case reports on nasal myiasis written during the 1990s and 2000s state that nasal myiasis, which is known as peenash among South Asian natives, is a form of divine punishment in Hindu mythology, but do not provide citations from Hindu scriptures that would suggest this interpretation. This paper aims to discuss the phenomenon of peenash in a historical context by examining medical literature written during the nineteenth and early twentieth centuries, to identify Hindu texts contributing to the belief of some Hindus that nasal myiasis is a form of divine punishment, and to provide an overview of contemporary treatment for and management of nasal myiasis.

  3. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  4. Current nuclear threats and possible responses

    Science.gov (United States)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  5. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  6. Self-Models and Relationship Threat

    Directory of Open Access Journals (Sweden)

    Máire B. Ford

    2015-07-01

    Full Text Available This study investigated a key claim of risk regulation theory, namely, that psychological internalizing of a relationship threat will serve as a mediator of the link between self-models (self-esteem and attachment anxiety and relationship responses (moving closer to a partner vs. distancing from a partner. Participants (N = 101 received feedback that threatened their current romantic relationship (or no feedback and then completed measures of internal–external focus, relationship closeness–distancing, and acceptance–rejection of the feedback. Results showed that participants with negative self-models responded to the relationship threat by becoming more internally focused and by distancing from their partners, whereas those with positive self-models became more externally focused and moved closer to their partners. Mediation analyses indicated that the link between self-models and relationship closeness–distancing was partially explained by internal focus.

  7. Developing and Validating a Santa Ana Wildfire Threat Index

    Science.gov (United States)

    Capps, S. B.; Rolinski, T.; DAgostino, B.; Vanderburg, S.; Fovell, R. G.; Cao, Y.

    2014-12-01

    Santa Ana winds, common to southern California during the fall through spring, are a type of katabatic wind that originates from a direction generally ranging from 360°/0° to 100° and is usually accompanied by very low humidity. Since fuel conditions tend to be driest from late September through the middle of November, Santa Ana winds occurring during this period have the greatest potential to produce large, devastating fires when an ignition occurs. Such catastrophic fires occurred in 1993, 2003, 2007, and 2008. Because of the destructive nature of these fires, there has been a growing desire to categorize Santa Ana wind events in much the same way that tropical cyclones have been categorized. The Santa Ana Wildfire Threat index (SAWT) is an attempt to categorize such events with respect to fire activity, based on surface wind velocity, dew point depression, and forecasted fuel conditions. The index, a USDA Forest Service product, was developed by the Forest Service in collaboration with San Diego Gas and Electric Utility (SDG&E), the Department of Atmospheric and Oceanic Sciences at UCLA, The Desert Research Institute (DRI), and Vertum Partners. The methodology behind the SAWT index, along with the index itself will be presented in detail. Also, there will be a discussion on the construction of a 30-year climatology of the index, which includes various meteorological and fuel parameters. We will demonstrate the usefulness of the index as another decision support tool for fire agencies and first responders, and how it could assist the general public and private industry in the preparation of critical Santa Ana wind events.

  8. Smart Grid Security: Threats, Challenges, and Solutions

    OpenAIRE

    Sanjab, Anibal; Saad, Walid; Guvenc, Ismail; Sarwat, Arif; Biswas, Saroj

    2016-01-01

    The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utmost importance to: a) understand its underlying vulnerabilities and associated threats, b) quanti...

  9. THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT

    Science.gov (United States)

    2016-04-01

    Putin’s intent. What we can do is learn from his actions, and what we see suggests growing Russian capabilities, significant military modernization...AU/ACSC/POWELL, N/AY16 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT...The methodology focuses on Russian capability, capacity, and intention to threaten NATO members’ existence. While Russia does possess nuclear weapons

  10. Hollow Threats: Why Coercive Diplomacy Fails

    Science.gov (United States)

    2015-06-01

    brand this as selection bias, the study of coercion has neglected the cumulative factor and is therefore worth bringing into the spotlight. As this...ended. Therefore, the Somali factions had both the luxury and foreknowledge to wait until the menace decreased and the costs increased (as...observation, was a trip wire. Since the luxury of hindsight demonstrates that Assad did use WMD and since that part of the deterrent threat was

  11. Water Privatization: A Threat to Human Rights?

    OpenAIRE

    Pavelich, Kelly

    2017-01-01

    In developing countries, women often have responsibilities that are water dependent, such as collecting water and tending to the sick (Sewpaul, 2008: 45) As unpolluted water supplies diminish, these tasks become increasingly difficult to accomplish. Women face greater threats to their security as they are forced to walk farther, occasionally into dangerous areas, and lose several hours of their day, potentially reducing the household income and resulting in missed economic opportunities (Sewp...

  12. Zika Virus: An Emerging Worldwide Threat

    OpenAIRE

    Irfan A. Rather; Jameel B. Lone; Vivek K. Bajpai; Woon K. Paek; Jeongheui Lim

    2017-01-01

    ZIKA virus (ZIKV) poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV) and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is bei...

  13. Threats and opportunities for information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-10-01

    Full Text Available Reference Inadequate or weak contract management, fuzzy focus [16, 30, 50, 58, 62, 64] Inadequate process (“how”) e.g. inadequate planning [16, 17, 30, 36, 57] Poor management of contractors and lack of governance [16, 17, 30, 46, 61, 64, 71... decision-making cycles, lack of proper programme management and disempowered outsource programme team members. Threats in the outsourcing process and the management of the outsourcing contract may result in poor management of contractors, a lack...

  14. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  15. Maritime Threat Detection using Plan Recognition

    Science.gov (United States)

    2012-11-01

    operate in close proximity to large but much less maneuverable vessels. Various approaches for automated threat and anomaly detection have been...version space techniques, and other closed -world reasoning algorithms, while probabilistic algorithms include those that use stochastic grammars and...differ along many dimensions, such as their agent relation (e.g., keyhole , intention, adversarial), what they infer (e.g., action, plan, goal

  16. Date Sensitive Computing Problems: Understanding the Threat

    Science.gov (United States)

    1998-08-29

    equipment on Earth.3 It can also interfere with electromagnetic signals from such devices as cell phones, radio, televison , and radar. By itself, the ...spacecraft. Debris from impacted satellites will add to the existing orbital debris problem, and could eventually cause damage to other satellites...Date Sensitive Computing Problems Understanding the Threat Aug. 17, 1998 Revised Aug. 29, 1998 Prepared by: The National Crisis Response

  17. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  18. Assessment of the Emerging Biocruise Threat

    Science.gov (United States)

    2000-08-01

    more about Los Angeles than they do about Taiwan.”15 And obviously believing in the efficacy of their long-range nuclear missile capability in... vaccinated against anthrax. Apparently, Hussein was deterred from using his WMD by U.S. and Israeli threats of nuclear retaliation. The credibility of the...gangrene, aflatoxin, trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus , camel pox Israel Researching

  19. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  20. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  1. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  2. Toddlers’ Duration of Attention towards Putative Threat

    Science.gov (United States)

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  3. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  4. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  5. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  6. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  7. Factors increasing snake detection and perceived threat in captive rhesus macaques (Macaca mulatta).

    Science.gov (United States)

    Etting, Stephanie F; Isbell, Lynne A; Grote, Mark N

    2014-02-01

    The primary predators of primates are all ambush hunters, and yet felids, raptors, and snakes differ in aspects of their ecology that affect the evasive strategies of their primate prey. Felids and raptors can traverse long distances quickly, thus the urgency of threat they present increases as they come closer in proximity to primates. In contrast, snakes do not move rapidly over long distances, and so primates may be reasonably safe even at close distances provided snakes can be detected and monitored. We investigated the ability of captive rhesus macaques (Macaca mulatta) to detect snakes at distances ranging from 15 to 1.5 m. We also examined variation in intensity of perceived threat by applying a Hidden Markov Model to infer changes in underlying state from observable behaviors, that is, increased attention and mobbing. We found that the macaques often failed to detect snake models but that closer proximity improved snake detection, which is necessary before threat can be perceived. We also found that having only one individual in fairly close proximity (≤ 7.5 m) was sufficient to alert the rest of the group and so the chances of detection did not increase with increasing group size. Finally, we found that when the snakes were perceived, they did not elicit greater intensity of response with closer proximity. These results provide evidence that the threat from snakes is greatest when they are in proximity to primates but are unseen. When snakes are seen, however, distance appears not to affect primates' perceived risk, in contrast to their perceived risk from raptors and felids. © 2013 Wiley Periodicals, Inc.

  8. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  10. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  11. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  12. [Stereotyping of overweight children by their contemporaries].

    Science.gov (United States)

    Thiel, Ansgar; Alizadeh, Manuela; Giel, Katrin; Zipfel, Stephan

    2008-12-01

    Childhood obesity represents not only a health risk but results also in social exclusion and stigmatization. While several studies have been conducted on this topic in America [1-3], there are hardly any German trials on the social impact of obesity in childhood and adolescence. This study investigates whether and how obese children and adolescents are stigmatized by their contemporaries because of their corpulence. A total of 454 (230 female, 224-male) children and adolescents aged 10-15 years from high and secondary modern schools in a Southern German university city were asked about how they appreciate their obese contemporaries. The interviewees were asked to assess six photographs of girls and boys with regard to sympathy, playmate preference, activity, intelligence and attractiveness. Obese children were assessed far more negatively in all asked areas compared to normal weight healthy and physically disabled children respectively. They were also referred to as more dislikable, lazy, less intelligent, unalluring and less considerable as playmates. This applies particularly for the obese boy. Hence, negative stereotypization of obese people can already be observed in childhood and adolescence.

  13. Reconceptualising manual therapy skills in contemporary practice.

    Science.gov (United States)

    Rabey, Martin; Hall, Toby; Hebron, Clair; Palsson, Thorvaldur Skuli; Christensen, Steffan Wittrup; Moloney, Niamh

    2017-06-01

    With conflicting evidence regarding the effectiveness of manual therapy calls have arisen within some quarters of the physiotherapy profession challenging the continued use of manual skills for assessment and treatment. A reconceptualisation of the importance of manual examination findings is put forward, based upon a contemporary understanding of pain science, rather than considering these skills only in terms of how they should "guide" manual therapy interventions. The place for manual examination findings within complex, multidimensional presentations is considered using vignettes describing the presentations of five people with low back pain. As part of multidimensional, individualised management, the balance of evidence relating to the effectiveness, mechanisms of action and rationale for manual skills is discussed. It is concluded that if manual examination and therapeutic skills are used in a manner consistent with a contemporary understanding of pain science, multidimensional patient profiles and a person-centred approach, their selective and judicious use still has an important role. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Berlin: Emergency shelters and contemporary border struggles

    Directory of Open Access Journals (Sweden)

    Žiga Podgornik-Jakil

    2016-06-01

    Full Text Available Researching the developments of present political economy must necessarily include investigating the tools of contemporary border regime. These are used for surveillance and control of populations in order to create new divisions of labour and enable extraction of rent by using peoples’ bodies. The article focuses on emergency shelters in Berlin, that is, on their function and ways in which the asylum seekers accommodated there spontaneously struggle against them. The research was done as a militant and cooperative work of the network Lager Mobilisation Network in Berlin’s district Wedding, which builds connections with people housed in the sports halls in the mentioned district. The author underlines that exhausting the aslyum seekers psychically is one of the strategies for filtering the ‘unwanted’ from the ‘wanted’, that is the ones that are interesting for the labour market. At the same time, the restriction of movement and limited access to civil rights confine asylum seekers in emergency shelters run by private companies, which seek profits on their account. Far from claiming that non-profit companies have a ‘better’ shelter administration, since the boundaries between them and profit-oriented companies are often blurred, the author rather speaks of new forms of anticolonial struggles by the people living inside. He understands these struggles as the struggles against the contemporary border regime in Germany and the EU and as a potential for building an inclusive society.

  15. Information Practices in Contemporary Cosmopolitan Civil Society

    Directory of Open Access Journals (Sweden)

    Michael Olsson

    2014-09-01

    Full Text Available What is the nature of information?  What is its role in Contemporary Cosmopolitan Civil Society? What is the basis for the widespread current belief that we live in an ‘information society’? The present article will examine these questions through an examination of the historical origins of established ‘scientized’ views of information in the philosophy of the Enlightenment. It describes how postmodern and poststructuralist critique of such positivist approaches led to profound paradigmatic and methodological shifts in the social and information studies fields in recent decades. It consider how the emergence of social constructivist approaches to information research drawing on discourse analysis, practice theory and ethnographic theories and methodologies has led to a have led researchers to a radically different understanding of central concepts such as: the influence of emergent information and communication technologies on contemporary society; the relationship between knowledge and power, the nature of expertise and authoritative information; a re-thinking of community and consensus; a re-interpretation of notions of space and place in information dissemination, sharing and use and a reconsideration of the role of the researcher. The article illustrates this changing research landscape through reference to the work of scholars in the Cosmopolitan Civil Societies Research Centre at the University of Technology, Sydney, published in the Centre’s journal.

  16. The Bobath concept in contemporary clinical practice.

    Science.gov (United States)

    Graham, Julie Vaughan; Eustace, Catherine; Brock, Kim; Swain, Elizabeth; Irwin-Carruthers, Sheena

    2009-01-01

    Future development in neurorehabilitation depends upon bringing together the endeavors of basic science and clinical practice. The Bobath concept is widely utilized in rehabilitation following stroke and other neurological conditions. This concept was first developed in the 1950s, based on the neuroscience knowledge of those times. The theoretical basis of the Bobath concept is redefined based on contemporary neuroscience and rehabilitation science. The framework utilized in the Bobath concept for the analysis of movement and movement dysfunction is described. This framework focuses on postural control for task performance, the ability to move selectively, the ability to produce coordinated sequences of movement and vary movement patterns to fit a task, and the role of sensory input in motor behaviour and learning. The article describes aspects of clinical practice that differentiate this approach from other models of practice. Contemporary practice in the Bobath concept utilizes a problem-solving approach to the individual's clinical presentation and personal goals. Treatment is focused toward remediation, where possible, and guiding the individual towards efficient movement strategies for task performance. The aim of this article is to provide a theoretical framework on which future research into the Bobath concept can be based.

  17. TRENDS IN CONTEMPORARY PORT SERVICES MARKETS

    Directory of Open Access Journals (Sweden)

    Hanna Klimek

    2014-12-01

    Full Text Available This article describes the issues associated with functioning of contemporary seaport services markets. The growth of international supply chains, technical progress and the integration processes in shipping, growth of containerization, increasing competition in the seaport services markets and environmental protection regulations make it necessary for port service providers to adapt to the changing expectations and requirements of their customers, both shippers and, especially maritime, carriers. Thus, the activities they undertake are associated with making investments to ensure an adequate capacity to handle cargo, passengers and means of transport, required quality of service, but also with appropriate organization of port supply centres and lead to an improvement of their competitiveness. Both the factors associated with the external and internal environment of seaports affect the changes in the relationship between the supply and demand on port services markets. Contemporary port services markets are characterized by certain phenomena which can be a sign of their adaptation and development. The aim of this article is to present the essence of the port services market and its relationship with the environment, which subject to rapid and significant changes, creates new conditions for the operation of port supply centres and the entire port services market.

  18. Intergenerational fertility correlations in contemporary developing counties.

    Science.gov (United States)

    Murphy, Michael

    2012-01-01

    To estimate the magnitude of intergenerational continuities in total and effective fertility among women in a group of 46 contemporary developing countries. Information collected from 93,000 women aged 45-49 for estimation of maternal mortality in the demographic and health surveys (DHS) program is analyzed using Pearson product moment intergenerational fertility correlations. A positive but usually small intergenerational correlation is found for both completed fertility (CFS, total number of children born) and effective fertility (EFS, number of children surviving to age of reproduction). Although the developing countries are mainly located in sub-Saharan Africa, a similar pattern appears to hold for the Asian and Latin American countries included. Women in the second generation with no education have a stronger relationship with their parents' fertility than women with some education. The relationship is also stronger in rural than in urban areas and in countries with lower levels of development. Intergenerational correlations of completed fertility in both generations are marginally stronger than for effective fertility largely because the number of a woman's total sibs is more strongly related to her subsequent childbearing than her number of adult sibs. Values of intergenerational correlations for these countries are similar to published values for a number of Western pretransitional populations, but well below values in contemporary developed societies. Copyright © 2012 Wiley Periodicals, Inc.

  19. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  20. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  1. The National Youth Service Corps Programme and Growing Security Threat in Nigeria

    Directory of Open Access Journals (Sweden)

    Chukwuemeka Okafor

    2014-06-01

    Full Text Available The National Youth Service Corps (NYSC was established in 1973 after the Nigerian civil war to involve Nigerian university graduates below the age of thirty in nation building. Gradually, the scheme was opened-up for polytechnic graduates.  The article presents the objectives and deployment policy of the programme. It shows that the early phase of the programme recorded the problems of corruption, ghost corps members, accommodation, language barriers as well as hostile culture. However, the contemporary Nigerian society has been overtaken by the destructive wind of insecurity. The article reveals that the various waves of political violence in the country, including Boko Haram terrorism, hostage crises, and geographical threats have turned into a collection of overwhelming menace to the programme, thereby leading to massive agitation for itabrogation. The article recommends for multiple series of reforms in order to protect the lives of many Nigerian graduates that are building the nation through this admirable development programme.

  2. JOINT FORCE AND CONTEMPORARY MILITARY ACTIONS

    Directory of Open Access Journals (Sweden)

    Codrin HERTANU

    2012-01-01

    Full Text Available In the current changing international context, the worldwide power balance along with its inter-dependencies shows that mankind is facing problems and pressures posed by resources limitation (the oil ones being the most relevant dramatic climate evolution and a decisive impact of technologies. The approach of the armed forces to the national defense related interests, as well as to the asymmetrical and irregular threats underlines the joint force’s capacity to be the most powerful and adequate tool to address all of these.

  3. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    Energy Technology Data Exchange (ETDEWEB)

    Glenn, Colleen [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Sterbentz, Dane [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Wright, Aaron [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center

    2016-12-20

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks, the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices

  4. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  5. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  6. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  7. Women’s world in contemporary Tuva

    Directory of Open Access Journals (Sweden)

    Larisa V. Anzhiganova

    2016-06-01

    Full Text Available The article examines the ethnodemographic and ethnosocial position of ethnic Tuvan women in Tuva. Our analysis makes use of the concept of ‘women’s world’ which is actively used by researchers in the current state of increasing gender asymmetry. We treat ‘women’s world’ as a holistic worldview of women united by single values, attitudes and practices of living. The contemporary shift in traditional male and female roles leads to blurring the boundaries between male and female functions and responsibilities. The crisis of family values has been brought about by the market economy and the overall social and economic situation in the country. In contemporary society women find themselves involved in public life, which limits her abilities in the sphere of family relations and marriage. To analyze the values, attitudes and practices which are important for Tuvan women, we have held an opinion poll of 250 women respondents in Tuva in spring 2015. Tuvan society has always viewed family as the supreme value, and still does. When choosing a partner (which a woman is free to decide for herself, Tuvan women look for a caring, understanding, kind, educate, loving partner, with no pernicious addictions. Three is the ideal number of children in the family, although most families have only 1 or 2. Women of elder generations would typically have a bigger number of children. Younger generations are known for high divorce rate. One of the most important reasons for divorce is the urgent need for satisfying the family’s material needs. A contemporary Tuvan woman combines in her social position both traditional and new functions, trying to uphold the values of family life, high level of welfare and the opportunity for self-actualization. Due to this combination, Tuvan society has a relatively high (if compared to other regions level of reproductive goals, which means that a large part of respondents plans to have many children. However, the unstable

  8. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  9. Contemporary Conceptual Approaches in Fluvial Geomorphology

    Directory of Open Access Journals (Sweden)

    Mônica dos Santos Marçal

    2016-06-01

    Full Text Available Contemporary fluvial geomorphology faces challenging questions, especially as it goes by understanding the Late Holocene/Anthropocene period, which has repercussions today and are intrinsically important to understand the human river disturbance. Given the scale that physical rates operate in complex river systems, two conceptual paths were developed to analyze the spatial and temporal organization. The network view emphasizes controls on catchment-scale and a reach approach focuses on discontinuity and local controls. Fluvial geomorphology has seek to understand the organization of complex river systems from the integrated view of the continuity and discontinuity paradigm. This integrated approach has stimulated within the geomorphology, the emergence of new theoretical-methodological instruments. It is recognized that rivers management is an ongoing process, part of the socio-cultural development, which refers to both a social movement and scientific exercise.

  10. Differential Kinematics Of Contemporary Industrial Robots

    Science.gov (United States)

    Szkodny, T.

    2014-08-01

    The paper presents a simple method of avoiding singular configurations of contemporary industrial robot manipulators of such renowned companies as ABB, Fanuc, Mitsubishi, Adept, Kawasaki, COMAU and KUKA. To determine the singular configurations of these manipulators a global form of description of the end-effector kinematics was prepared, relative to the other links. On the basis of this description , the formula for the Jacobian was defined in the end-effector coordinates. Next, a closed form of the determinant of the Jacobian was derived. From the formula, singular configurations, where the determinant's value equals zero, were determined. Additionally, geometric interpretations of these configurations were given and they were illustrated. For the exemplary manipulator, small corrections of joint variables preventing the reduction of the Jacobian order were suggested. An analysis of positional errors, caused by these corrections, was presented

  11. Interpretation of clothing heritage for contemporary tourism

    Science.gov (United States)

    Vilman Proje, J.; Bizjak, M.

    2017-10-01

    In tourism is the first impression of essential meaning as tourists falling by what they see. In designing the clothing image, for commercial use in tourist sector, should be considered that clothes are consistent with the clothing habits of the region and that comply with the heritage story and style of the geographical area. Clothing image of the tourism representatives of the Bohinj region (Slovenia) has been developed. When designing, the inspiration was sought in historical and contemporary clothing image and heritage stories, in elements that representatives of the community recognize as their own cultural heritage. Affiliated clothes for tourism employees should have a useful function of comfortable workwear with heritage expression, meaning clothes are to be accepted as “everyday” clothes and not as a costume.

  12. Urban electric vehicles: a contemporary business case

    Directory of Open Access Journals (Sweden)

    Noha SADEK

    2012-01-01

    Full Text Available In a world where energy supply security and environmental protection are major concerns, the development of green vehicles is becoming a necessity. The Electric vehicle (EV is one of the most promising technologies that will make the “green dream” come true. This paper is a contemporary business case that encourages the immediate deployment of urban EVs. It proposes a model in which we can profit from the benefits of urban EVs namely, high energy efficiency, emissions reduction, small size and noise reduction. The model mitigates the EV potential limitations such as energy source, charging infrastructure, impact on electrical power system and cost issues. It also provides ideas to overcome the barriers of the technology application in order to speed up their commercialization. This study reveals that having an environmentally friendly vehicle can soon become a reality if our collaborative efforts are properly directed.

  13. Capitalist Development in Contemporary Southeast Asia

    DEFF Research Database (Denmark)

    Juego, Bonn

    2013-01-01

    ), and an emerging social form of authoritarian liberalism (i.e., a political-economic regime whereby a neoliberal economy operates within an authoritarian polity). The empirical examination of the studied cases shows how elite interests shape, mediate, negotiate, or resist the process of neoliberal reproduction......, producing and encouraging the social form of authoritarian liberalism. Importantly, it highlights the reality that the elite interests-driven process of neoliberal reproduction which reinforces authoritarian liberalism is replete with structural contradictions and agential conflicts in both latent...... other existing, prospective, or counter-hegemonic processes, interests, and forms. Conceptually, it introduces and develops the key concepts of neoliberal reproduction, elite interests, and authoritarian liberalism that are essential in understanding the contemporary shape of capitalism...

  14. Japanese women in the contemporary society

    Directory of Open Access Journals (Sweden)

    Dinca Violeta Mihaela

    2017-07-01

    Full Text Available The purpose of this paper is to examine Japanese society and present contemporary issues with emphasis on the changes in the role, status and preferences of Japanese women within the Japanese society, through the years. The first part of the paper makes an overview on the evolution of the role of women in Japanese society during Shogunate until now, focusing mainly on increasing Japanese women's status within the enterprise. In the second part of the paper, the author exposes the results of several studies on the effects on the marketing of luxury for Japanese women, highlighting the correlation between increased interest to be as competitive in the workplace and enhancing concern for luxury brands.

  15. Aquinas and Contemporary Cosmology: Creation and Beginnings

    Science.gov (United States)

    Carroll, William E.

    Discussions in the Middle Ages about creation and the temporal beginning of the world involved sophisticated analyses in theology, metaphysics, and natural philosophy. Mediaeval insights on this subject, especially Thomas Aquinas' defense of the intelligibility of an eternal, created universe, can help to clarify reflections about the philosophical and theological implications of contemporary cosmological theories: from the "singularity" of the Big Bang, to "quantum tunneling from nothing," to multiverse scenarios. Thomas' insights help us to see the value of Georges Lemaître's insistence that his cosmological reflections must be kept separate from an analysis of creation. This essay will look at different senses of "beginning" and examine the claim that creation, in its fundamental meaning, tells us nothing about whether there is a temporal beginning to the universe. Multiverse models, like that recently proposed by Stephen Hawking and Leonard Mlodinow, may challenge certain views of a Grand Designer, but not of a Creator.

  16. Contemporary evaluation and management of renal trauma.

    Science.gov (United States)

    Chouhan, Jyoti D; Winer, Andrew G; Johnson, Christina; Weiss, Jeffrey P; Hyacinthe, Llewellyn M

    2016-04-01

    Renal trauma occurs in approximately 1%-5% of all trauma cases. Improvements in imaging and management over the last two decades have caused a shift in the treatment of this clinical condition. A systematic search of PubMed was performed to identify relevant and contemporary articles that referred to the management and evaluation of renal trauma. Computed tomography remains a mainstay of radiological evaluation in hemodynamically stable patients. There is a growing body of literature showing that conservative, non-operative management of renal trauma is safe, even for Grade IV-V renal injuries. If surgical exploration is planned due to other injuries, a conservative approach to the kidney can often be utilized. Follow up imaging may be warranted in certain circumstances. Urinoma, delayed bleeding, and hypertension are complications that require follow up. Appropriate imaging and conservative approaches are a mainstay of current renal trauma management.

  17. Contemporary Universities and the Production of Value

    DEFF Research Database (Denmark)

    Bengtsen, Søren Smedegaard; Shumar, Wesley

    value and a different conversation about creating new value. By drawing on Ronald Barnett's philosophy of higher education we argue that universities are much occupied with their 'acting' and 'knowing' efforts, while they forget the dimension of 'being' - who they are and what they want for themselves......Today, contemporary universities are encouraged to be innovative, creative, and foster knowledge production and knowledge transfer. These are a set of values, but they have a very specific meaning within the context of neoliberal capitalism. They encapsulate certain free market economic values...... that universities are encouraged to cultivate. In this way we can think about universities as being commodified—their core mission has become focused on creating greater economic value for the individual, for corporations, and for the society. In this focusing of the university mission on the economic...

  18. The Contemporary School and Knowledge management

    Directory of Open Access Journals (Sweden)

    Mulej Majtaž

    2008-03-01

    Full Text Available The school of today faces circumstances that differ very much from the ones in which the current educators have been educated as students, especially in the countries that are new members of the European Union as EU-27. Therefore, in order to manage knowledge in their school of today, one must understand the socio-economic development trends and their impact over the school as a subsystem of the emerging innovative society in which the innovative business leaves little or no room for the routine-loving behaviour of previous decades, centuries, and millennia. This contribution summarizes a dialectical system of this development trends and the resulting newly required attributes of the contemporary schools and teachers, but it does so on the level of provocation for readers’ creative and innovative thinking and action rather than on the level of any final answers. The Bologna Process seems to be an underused opportunity for innovation of higher education in Europe.

  19. ARE CONTEMPORARY WARS “NEW”?

    Directory of Open Access Journals (Sweden)

    Clara Darabont

    2010-03-01

    Full Text Available This paper will assess the existing perspectives on “new wars” in the literature. It will then analyze the degree to which contemporary wars are “new” by looking firstly at the changing nature of the state. It will not however support the view that state’s weakness is a structural cause of conflict but rather that it is a facilitator one. Finally, it will explore the degree to which globalization has impacted the role Romanian forces have to play in hotbeds such as Irak or Afghanistan. While engaging the existing literature, I argue that we must understand the “new wars” as an adapted form of engagement and not necessarily as a new breed of war.

  20. Understanding Contemporary Challenges to INGO Legitimacy

    DEFF Research Database (Denmark)

    Walton, Oliver; Davies, Thomas; Thrandardottir, Erla

    2016-01-01

    In recent years, INGO legitimacy has been subject to growing scrutiny from analysts and practitioners alike. Critics have highlighted a backlash against INGOs in the Global South, a growing mismatch between INGO capacities and contemporary global challenges, and diminishing support for norms...... such as democracy and human rights that underpin INGOs’ work. Though these problems have attracted significant attention within the academic literature, this article argues that existing explorations of INGO legitimacy have broadly conformed either to a top-down approach focused on global norms and institutions...... or a bottom-up approach focused on the local dynamics surrounding states and populations in the Global South. We suggest that this divide is is unhelpful for understanding the current predicament and propose a new approach, which pays closer attention to the interaction between bottom-up and top...

  1. George Jeffreys: Pentecostal and Contemporary Implications

    Directory of Open Access Journals (Sweden)

    William K Kay

    2018-02-01

    Full Text Available The life and work of the Welsh evangelist George Jeffreys resulted in the planting of two denominations in the UK between 1915 and 1962, when he died. The Elim churches continue to this day to be one of the larger classical Pentecostal denominations in the UK, while the Bible Pattern Fellowship dispersed on Jeffreys’ death. The disputes that led to Jeffreys’ departure from Elim were said to have arisen from his adherence to British Israel doctrine, though his supporters believed they arose from his championing of local church ownership and democracy. This paper considers sociological and other reasons for Jeffreys’ remarkable success in the interwar years and his eventual departure from a denomination he founded. It concludes by reflecting on topics (such as the importance of debate and law that have relevance for contemporary Pentecostalism.

  2. Gilles Deleuze and the contemporary biopolitical debate

    Directory of Open Access Journals (Sweden)

    Marcelo Antonelli

    2015-09-01

    Full Text Available The present work is a research on Gilles Deleuze’s contribution to the contemporary biopolitical debate. To begin with, we analyze his interpretation of Foucault’s conception of biopolitics, especially the vitalist matrix of his reading, and we examine its impact on the distinction between “biopower” and “biopolitics” according to certain authors (Lazzarato, Negri, Revel. We then reveal the presence of deleuzian notions in other perspectives (the “impersonal” in Esposito, the “society of control” in Negri. Finally, we propose renewing the fundamental tensions of the debate on Life, Politics, Language and the Condition of Man, based on concepts elaborated by Deleuze

  3. Trade Intelligence and Contemporary Exports Strategy

    Directory of Open Access Journals (Sweden)

    M. Tayfun Gülle

    2013-11-01

    Full Text Available The book mainly focuses on the divergences in the competitive environment resulting from the entrance of information and communications technologies into commercial life. Denoting that these divergences are rooted, above all, in the differences among countries in historical, social and geographic terms, the book claims that the increased use of trade information combined with these divergences will facilitate obtaining results in trade and that the synergy to emerge will pave the way for trade intelligence. The book also underlines that such trade intelligence, which is actually the natural commercial manner of Turkish entrepreneurs, could be accepted as the Turkish Style in international trade, with the rational management of the export process, and that this would ferment the national competition intelligence, as the strategy of contemporary exports.

  4. Constrictive pericarditis in a contemporary Danish cohort

    DEFF Research Database (Denmark)

    Landex, Nadia Lander; Ihlemann, Nikolaj; Olsen, Peter Skov

    2015-01-01

    OBJECTIVES: The aetiology and outcome of constrictive pericarditis vary between geographic regions and has changed over time. We describe the diagnostic work-up and outcome in a contemporary cohort of Danish patients with constrictive pericarditis. DESIGN: Hospital databases were searched...... and inflammatory disease were the most prevalent underlying conditions. Diagnosis was made primarily by echocardiography and right- and left-sided cardiac catheterisation. Echocardiography was particularly notable for dilated inferior caval vein, increased E/A ratio, and high septal tissue velocity in addition...... to the presence of septal bounce. Pericardiectomy was performed in 47 patients with a 30-day mortality of 8.5%. Clinical improvement was noted in 69% of cases. Several echocardiographic parameters normalised with time, including markers of diastolic function. CONCLUSIONS: Long-term outcome after pericardiectomy...

  5. The contemporary management of intracranial atherosclerotic disease.

    Science.gov (United States)

    Leng, Xinyi; Wong, Ka Sing; Leung, Thomas W

    2016-06-01

    Intracranial atherosclerotic disease is the most common cause of cerebral vasculopathy and an important stroke etiology worldwide, with a higher prevalence in Asian, Hispanic and African ethnicities. Symptomatic intracranial atherosclerotic disease portends a recurrent stroke risk as high as 18% at one year. The key to secondary prevention is an understanding of the underlying stroke mechanism and aggressive control of conventional cardiovascular risks. Contemporary treatment includes antiplatelet therapy, optimal glycemic and blood pressure control, statin therapy and lifestyle modifications. For patients with high-grade (70-99%) symptomatic steno-occlusion, short-term dual antiplatelet therapy with aspirin and clopidogrel followed by life-long single antiplatelet therapy may reduce the recurrent risk. Current evidence does not advocate percutaneous transluminal angioplasty and stenting as an initial treatment. External counterpulsation, encephaloduroarteriosynangiosis and remote limb ischemic preconditioning are treatments under investigation. Future studies should aim at predicting patients prone to recurrence despite of medical therapies and testing the efficacy of emerging therapies.

  6. [The discourse of psychosis in contemporary philosophy].

    Science.gov (United States)

    Stompe, Thomas; Ritter, Kristina

    2009-01-01

    The preoccupation of philosophy with madness can be traced back till the Greek antiquity. For many philosophers like Descartes psychotic phenomena were symbols for the fragility of human mental powers, while others like Plato or Nietzsche saw madness as a way to escape the constraints of rationality. After 1960 three direction of contemporary philosophy dealt with the topics madness--schizophrenia--psychosis: Following Nietzsche and Bataille, Foucault as well as Deleuze and Guattari considered schizophrenia as the societal oppressed reverse of modern rationality, a notion which had a strong influence on the anti-psychiatric movement. Philosophical phenomenology primarily focussed on ontological problems of the psychotic existence. Finally Philosophy of Mind, the modern Anglo-American version of analytical philosophy, analyzed the logical coherence of psychotic inferences and experiences. Especially the insights of analytical philosophy may be important for a more sophisticated interpretation of psychopathological research as well as of the new findings of neuroscience.

  7. Climatic threats on the worldwide peace

    International Nuclear Information System (INIS)

    Valantin, J.M.

    2005-06-01

    This book approaches the climatic change under the international relation aspect. It recalls the progressive growth of the collective awareness about the threats of human activities on Earth's climate and analyzes more particularly the policies adopted by the US, UK and the European Union. It evokes also the problems encountered by the developing countries, the energy needs of which are continuously increasing. Finally, it puts the question of the capacity of the international community to solve, by negotiations and not by conflicts, the tensions generated by environmental crises. (J.S.)

  8. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  9. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  10. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  11. The last Fermat theorem. The story of the riddle that has defied the greatest minds in the world during 358 years

    International Nuclear Information System (INIS)

    Singh, S.

    1998-01-01

    Pierre de Fermat, one of the greatest French mathematician of the seventeenth century, noticed in the margin of his exercise book 'X n + Y n Z n impossible if n upper than 2, i have found a wonderful solution but i am short of place to develop it here'. Only in 1993 a young British man, Andrew Wiles, professor at Princeton, after seven years of work settled this riddle. That is that story that is told here. (N.C.)

  12. Contemporary Reception of Rene Descartes’ Mysticism

    Directory of Open Access Journals (Sweden)

    Volodymyr Khmil

    2017-09-01

    Full Text Available The article aim is to turn the spotline on the main thesis of refl ection of Descartes’ skepticism doctrine as well one’s argumentation estimation at the context of thinker’s creativeness. These steps will promote the overcoming of one-dimensional comprehension of his attitude on skepticism as an essential part of his doctrine. That is why it has sense to concentrate an attention on some interpretations of key motives of Cartesian anti-skeptic approach at research literature as well as defi ne the place of anthropological project at these motives fi rstly. Secondly, make an accent on the key role of anthropological dimension of one’s doctrine at the context of philosophical polemics with skepticism. The analysis of interpretations of Descartes’ heritage as well as one’s original texts demonstrates the absence of adequate interpretation of one’s place at the history of skepticism. The specifi c place of Descartes’ anti-skepticism is also demonstrated. Most of researchers pay ones’ attention on the tight vision of Modern Age at the form of development of scientifi c worldview. This position does not takes into account the contemporary level of Descartes’ studies. First of all, authors make an accent on the need to overcome the fragmentary vision of thinker’s heritage. Secondly, the valuable role of anthropological dimension of Descartes’ texts is underlined. This position lets perform more authentic perception of one’s anti-skeptic approach. In the course of fi nding the roots of researched situation, the authors’ attention was consistently concentrated on the features of the contemporary interpretation of Modern Age request which is reduced to development of scientifi c worldview by the skepticism researchers. Such position marginalizes the anthropological component of one’s doctrine.

  13. Additive threats from pathogens, climate and land-use change for global amphibian diversity

    DEFF Research Database (Denmark)

    Hof, Christian; Bastos Araujo, Miguel; Jetz, Walter

    2011-01-01

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change...... to be found in Africa, parts of northern South America and the Andes. Regions with the highest projected impact of land-use and climate change coincide, but there is little spatial overlap with regions highly threatened by the fungal disease. Overall, the areas harbouring the richest amphibian faunas...... and spread of the pathogenic fungal disease chytridiomycosis. Here we assess the spatial distribution and interactions of these primary threats in relation to the global distribution of amphibian species. We show that the greatest proportions of species negatively affected by climate change are projected...

  14. The Greatest Show on Earth

    Indian Academy of Sciences (India)

    Darwin and Alfred Russel Wallace: life on earth had evolved ... over long epochs, the pace of change was infinitesimal. ... Thanks to the work of the Japanese theoreti- cian Motoo ... pleasure-minus-expenditure balance is posi- tive. This way of ...

  15. Climate change: Wilderness's greatest challenge

    Science.gov (United States)

    Nathan L. Stephenson; Connie Millar

    2014-01-01

    Anthropogenic climatic change can no longer be considered an abstract possibility. It is here, its effects are already evident, and changes are expected to accelerate in coming decades, profoundly altering wilderness ecosystems. At the most fundamental level, wilderness stewards will increasingly be confronted with a trade-off between untrammeled wilderness character...

  16. Uterine fibroids: clinical manifestations and contemporary management.

    Science.gov (United States)

    Doherty, Leo; Mutlu, Levent; Sinclair, Donna; Taylor, Hugh

    2014-09-01

    Uterine fibroids (leiomyomata) are extremely common lesions that are associated with detrimental effects including infertility and abnormal uterine bleeding. Fibroids cause molecular changes at the level of endometrium. Abnormal regulation of growth factors and cytokines in fibroid cells may contribute to negative endometrial effects. Understanding of fibroid biology has greatly increased over the last decade. Although the current armamentarium of Food and Drug Administration-approved medical therapies is limited, there are medications approved for use in heavy menstrual bleeding that can be used for the medical management of fibroids. Emergence of the role of growth factors in pathophysiology of fibroids has led researchers to develop novel therapeutics. Despite advances in medical therapies, surgical management remains a mainstay of fibroid treatment. Destruction of fibroids by interventional radiological procedures provides other effective treatments. Further experimental studies and clinical trials are required to determine which therapies will provide the greatest benefits to patients with fibroids. © The Author(s) 2014.

  17. New sounds, new stories : narrativity in contemporary music

    NARCIS (Netherlands)

    Meelberg, Vincent

    2006-01-01

    In this dissertation, I study the relation between narrativity and contemporary composed music. The purpose of this study is twofold. Firstly, in so doing, I am able to articulate what musical narrativity is in a precise manner. Since many contemporary musical works question or problematize the

  18. Book Review: Instagram and contemporary image, Lev Manovich

    Directory of Open Access Journals (Sweden)

    Carla Barrio Romera

    2018-05-01

    Full Text Available Book Review: Instagram and contemporary image, Lev Manovich, California Institute for Telecommunication and Information & The Graduate Center, City University of New York (CUNY, Cultural Analytics Lab, 2017, http://manovich.net/index.php/projects/instagram-and-contemporary-image, Attribution-NonCommercial-NoDerivatives 4.0 International Creative Commons license, 148 págs.

  19. Teen Artists: Impact of a Contemporary Art Museum

    Science.gov (United States)

    Erickson, Mary; Hales, Laura

    2014-01-01

    This study describes the effects of a yearlong, multivisit teen program in a contemporary art museum on adolescents' reflections about art. Our purpose was to discover whether this program, focused on experiences with contemporary art and artists with its metacognitive approach, affected students' thinking about their own artmaking. The…

  20. Planting contemporary practice theory in the garden of information science

    NARCIS (Netherlands)

    Huizing, A.; Cavanagh, M.

    2011-01-01

    Introduction. The purpose of this paper is to introduce to information science in a coherent fashion the core premises of contemporary practice theory, and thus to engage the information research community in further debate and discussion. Method. Contemporary practice-based approaches are

  1. Nigerian values and contemporary popular music: a new look ...

    African Journals Online (AJOL)

    Log in or Register to get access to full text downloads. ... Nigerian contemporary pop music is playing an increasingly pivotal role in shaping the continent's music ... Keywords: Nigerian values, Music industry, Contemporary popular music, Youths and society. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  2. Morality and exchange in the Mumbai contemporary art world

    NARCIS (Netherlands)

    Sooudi, O.K.; Velthuis, O.; Baia Curioni, S.

    2015-01-01

    The Indian contemporary art market developed dramatically over the 1990s and 2000s. More buyers and increased prices for, as well as new attention on, Indian contemporary art, both domestically and abroad, also entailed the maturation of local art scenes, especially in Mumbai and Delhi, as new

  3. The problem of language in contemporary African philosophy: some ...

    African Journals Online (AJOL)

    A critical discussion of the contentious problem of language in contemporary African philosophy is attempted in this paper. The problem centres on whether or not African languages can be used in 'doing' contemporary African philosophy, where 'doing' means teaching, writing and researching. It also revolves around the ...

  4. Social Engagements with Contemporary Art: Connecting Theory with Practice

    Science.gov (United States)

    Leake, Maria D.

    2014-01-01

    In this article, Leake is arguing for the relevance of contemporary art as a way to bridge the gap between theory and practice in the spaces of art education. Graeme Sullivan develops a similar argument in his "Studies" article, "The Art of Research." Where Leake looks to possibilities for contemporary art as it is presented in…

  5. The Contemporary Women's Movement and Women's Education in India.

    Science.gov (United States)

    Patel, Ila

    1998-01-01

    Examines how the contemporary women's movement in India (1975-present) has addressed the issue of women's education. Highlights contributions of the 19th-century social-reformist movement and the nationalist movement. Details the role of the contemporary women's movement in redefining knowledge and the curriculum. Concludes with challenges facing…

  6. The usage of African languages in three selected contemporary ...

    African Journals Online (AJOL)

    The word 'contemporary' refers to approximately the last ten years and 'German' to novels written in the German language, i.e. novels from Switzerland (for example) are also included. The nature, quantity and function of utterances from three selected contemporary German novels will be presented, in order to show how ...

  7. Image acts and visual communities: everyday nationalism in contemporary Turkey

    NARCIS (Netherlands)

    Kuryel, A.

    2015-01-01

    In the dissertation entitled "Image Acts and Visual Communities: Contemporary Nationalism in Turkey", I investigate the image politics of nationalist practices in everyday life by focusing on contemporary Turkey and tracking the way images of the nation travel through a variety of fields. I depart

  8. The Economic Situation in Contemporary Africa: Comment on ...

    African Journals Online (AJOL)

    The Economic Situation in Contemporary Africa: Comment on Questions Posed by Lansana Keita. P Bond, DM Dembele. Abstract. The economic situation in contemporary Africa is highly problematic, creating populations that are in general much discontented with matters as they now stand. Africa's populations are now ...

  9. Prefrontal control of attention to threat

    Directory of Open Access Journals (Sweden)

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  10. Religion, group threat and sacred values

    Directory of Open Access Journals (Sweden)

    Hammad Sheikh

    2012-03-01

    Full Text Available Sacred or protected values have important influences on decision making, particularly in the context of intergroup disputes. Thus far, we know little about the process of a value becoming sacred or why one person may be more likely than another to hold a sacred value. We present evidence that participation in religious ritual and perceived threat to the group lead people to be more likely to consider preferences as protected or sacred values. Specifically, three studies carried out with Americans and Palestinians show: (a that the more people participate in religious ritual the more likely they are to report a preference to be a sacred value (Studies 1--3; (b that people claim more sacred values when they are reminded of religious ritual (Study 2; and (c that the effect of religious ritual on the likelihood of holding a sacred value is amplified by the perception of high threat to the in-group (Study 3. We discuss implications of these findings for understanding intergroup conflicts, and suggest avenues for future research into the emergence and spread of sacred values.

  11. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  12. Initial perspectives on process threat management

    International Nuclear Information System (INIS)

    Whiteley, James R. Rob; Mannan, M. Sam

    2004-01-01

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this 'inside the gate' response as process threat management. The authors have initiated a joint industry/academia study to address: - the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and; - identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study

  13. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  14. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  15. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  16. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  17. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  18. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  19. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    Science.gov (United States)

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  20. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  1. Differentiating the threat of radiological/nuclear terrorism: Motivations and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Post, J M [Elliott School of International Affairs, George Washington University, Washington, DC (United States)

    2001-07-01

    Full text: Reviewing the spectrum of terrorist groups in terms of motivation, incentives and constraints, for nearly all groups, nuclear terrorism could be highly counter-productive. The constraints are particularly severe for large-scale mass casualty terrorism for groups that are concerned with their constituents--social revolutionary and nationalist separatist terrorists--although discriminate low level attacks are possible. Right-wing extremists, including individuals who are members of the right-wing virtual community of hatred, represent a distinct danger for low level discriminate attacks against their targets. Religious fundamentalist terrorist groups represent a particular threat, because they are not trying to influence the West but to expel Western modernizing influences. Moreover, they believe that their acts of violence are given sacred significance. The severe constraints against catastrophic terrorism for most groups argues for continuing to protect against the greatest danger - conventional terrorism - and to devote significantly increased resources to monitoring more closely the groups at greatest risk for nuclear terrorism. (author)

  2. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    Science.gov (United States)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  3. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  4. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  5. Threats and opportunities of plant pathogenic bacteria.

    Science.gov (United States)

    Tarkowski, Petr; Vereecke, Danny

    2014-01-01

    Plant pathogenic bacteria can have devastating effects on plant productivity and yield. Nevertheless, because these often soil-dwelling bacteria have evolved to interact with eukaryotes, they generally exhibit a strong adaptivity, a versatile metabolism, and ingenious mechanisms tailored to modify the development of their hosts. Consequently, besides being a threat for agricultural practices, phytopathogens may also represent opportunities for plant production or be useful for specific biotechnological applications. Here, we illustrate this idea by reviewing the pathogenic strategies and the (potential) uses of five very different (hemi)biotrophic plant pathogenic bacteria: Agrobacterium tumefaciens, A. rhizogenes, Rhodococcus fascians, scab-inducing Streptomyces spp., and Pseudomonas syringae. Copyright © 2013 Elsevier Inc. All rights reserved.

  6. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-12-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST conditions. The conditions included an explicit ST condition, an implicit ST condition, and a nullified condition. Results indicated that males in all three conditions performed similarly on a set of physics problems. Females in the nullified condition outperformed females in the explicit ST condition and females in the implicit and explicit conditions performed similarly. Males performed better than females in the implicit and explicit ST conditions, but male and female performance on the physics problems was not significantly different in the nullified condition. The implications of these findings for physics instruction and future research on gender differences in physics and ST in science are discussed.

  7. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  8. Consequences of a changing CBRN threat

    International Nuclear Information System (INIS)

    Medema, J.

    2009-01-01

    The OPCW now counts 186 member States. Member States that possessed chemical weapons (CW) are destroying those weapons, albeit at a slow pace. In the coming decade most, if not all, of the 100.000 + tons of CW from the previous century will have been destroyed. Of the 12± States, not part of the OPCW, four of them potentially have CW but their quantities are restricted to less than 1000 tons. About one kg of the more potent nerve agent or Mustard gas is required to produce on average one casualty amongst unprotected troops, 1000 tons potentially can produce 1 million casualties. Protection, passive chemical defense, is therefore mandatory. However, once a detection and protection system is in place, with a protection factor of say one thousand, the amount required to produce one casualty amongst troops in a military scenario becomes prohibitive. Furthermore, available CW quantities will have been reduced by pre-emptive airstrikes and the aggressor will have little chance to fully deploy his CW capability. The threat from massive CW with units facing several attacks per week has changed to incidental attacks on a smaller scale and with far lower frequency. This should have consequences for the chemical defense posture of the forces, Detection and protection are still required but the protection can have a lower capacity, less spares per individual. Because the number of incidents will be far lower it might be more cost effective to abandon contaminated equipment than to decontaminate it. As the number of CW casualties entering the military medical system will be small it might be better to find cures for diseases from biological weapons than to spent money on improved therapies for nerve agent or mustard. Although research in CW medical over the last 50 years was great, it has not produced a therapy for mustard or a significant improvement over the old therapy for nerve agent poisoning. With a declining CW threat the BW threat is on the rise, making a passive

  9. The nuclear threat. 6. enl. ed.

    International Nuclear Information System (INIS)

    Anders, G.

    1993-01-01

    This is the sixth edition of 'The last days and end of time', augmented by a foreword, which was first published in 1972. The reflections it contains cannot become outdated because their object: the risk of global catastrophe, persists. But it continues to exist not only because we can never now hope to efface what knowledge we have of self-annihilation methods, but also because we have become frighteningly used to the fact of being threatened. What we fight is not this or that adversary who attacks, or might be got rid of, by nuclear means, but the nuclear situation as such. Since this enemy is the enemy of all human beings, those who up to now have considered each other as adversaries should rally as allies against the common threat. (orig./HP) [de

  10. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  11. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Stienstra, S.

    2007-01-01

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  12. Zika Virus: An Emerging Worldwide Threat

    Directory of Open Access Journals (Sweden)

    Irfan A. Rather

    2017-07-01

    Full Text Available ZIKA virus (ZIKV poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is being performed by RT-PCR and IgM-captured enzyme-linked immunosorbent assay (MAC-ELISA. The real brunt of the virus is, however, borne by children and adults alike. Case studies of the ZIKV outbreaks in the French Polynesia and other places have suggested that there is a close link between the ZIKV and Gullian-Barre syndrome (GBS. The GBS has closely followed in areas facing ZIKV outbreaks. Although solid evidence is yet to emerge, clinical data integration has revealed a large number of ZIKV patients having GBS. Moreover, the amniotic fluids, blood cord, and miscarriage tissues of mothers have been detected with ZIKV, which indicates that the virus either gets transferred from mother to fetus or seeks direct entry in the fetus, causing microcephaly and other brain anomalies in the newborn babies. Studies on mice have confirmed the link between the ZIKV infection during pregnancy and microcephaly in babies. Reports have highlighted the sexual transmission of the ZIKV, as it has been detected in the semen and saliva of affected persons. The intensity with which the ZIKA is spreading can collapse the health sector of several countries, which are poor. A comprehensive strategy is a need of an hour to combat this virus so as to prevent its transmission and avert the looming threat. At the same time, more research on the cure of the ZIKV is imperative.

  13. The Need For ``Pleasure in Finding Things Out:'' The Use of History and Our Greatest Scientists for Human Survival and Scientific Integrity

    Science.gov (United States)

    Borchardt, Joshua

    2011-03-01

    Why Homo sapiens search for interesting things and the methods of which we do so. The use of philosophical, theoretical, and demonstrated processes for exploration of the natural, and not so natural world are presented based on the ideas and wishes of some of History's greatest scientists, with concentration on Richard P. Feynman's lens on scientific discovery and pursuit, for which the abstract gets its title. This talk is presented towards the layman as well as the physicist, and gives insight to the nature of discovery and what it means to have pleasure in finding things out for the betterment of all mankind.

  14. Contemporary issues in transfusion medicine informatics

    Directory of Open Access Journals (Sweden)

    Gaurav Sharma

    2011-01-01

    Full Text Available The Transfusion Medicine Service (TMS covers diverse clinical and laboratory-based services that must be delivered with accuracy, efficiency and reliability. TMS oversight is shared by multiple regulatory agencies that cover product manufacturing and validation standards geared toward patient safety. These demands present significant informatics challenges. Over the past few decades, TMS information systems have improved to better handle blood product manufacturing, inventory, delivery, tracking and documentation. Audit trails and access to electronic databases have greatly facilitated product traceability and biovigilance efforts. Modern blood bank computing has enabled novel applications such as the electronic crossmatch, kiosk-based blood product delivery systems, and self-administered computerized blood donor interview and eligibility determination. With increasing use of barcoding technology, there has been a marked improvement in patient and specimen identification. Moreover, the emergence of national and international labeling standards such as ISBT 128 have facilitated the availability, movement and tracking of blood products across national and international boundaries. TMS has only recently begun to leverage the electronic medical record to address quality issues in transfusion practice and promote standardized documentation within institutions. With improved technology, future growth is expected in blood bank automation and product labeling with applications such as radio frequency identification devices. This article reviews several of these key informatics issues relevant to the contemporary practice of TMS.

  15. Preventive psychiatry: Current status in contemporary psychiatry

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Chadda

    2017-01-01

    Full Text Available Preventive psychiatry is one of the most ignored subdiscipline of psychiatry, which has got important role to play in the contemporary psychiatry. Mental disorders are very common with lifetime prevalence of about 25%, and tend to be chronic. Due to the stigma associated with mental disorders, lack of awareness, and also lack of adequate mental health resources, nearly 60%–80% of the persons suffering from mental disorders do not access mental health care services. Mental and substance use disorders have been identified as one of the major contributors to the disease-related burden and disability-adjusted life years. In this background, preventive psychiatry has an important role to play in public health sector. Since etiology of most of the mental disorders is not known, it is not possible to follow here the standard model of primary, secondary, and tertiary prevention of public health. A concept of universal, selective, and indicated prevention has been proposed in primary prevention. Preventive approaches in psychiatry focus on evidence-based risk and protective factors, promoting quality of life, reducing stressors, and improving resilience. Such interventions, when planned targeting at specific mental disorders, have a potential to prevent mental disorders. Thus, preventive psychiatry has a crucial role to play in mental health, considering the high prevalence of mental disorders, the associated disability and burden, and a great drain on human resources.

  16. Laying the Foundations of Contemporary Romanian Astronomy

    Science.gov (United States)

    Marin, Sorin

    2017-11-01

    This article describes the first stage in the history of Romanian astronomy represented by the events, processes and evolution which led to the formation of great scientific personalities, development drives and the creation of the material base for the contemporary Romanian astronomy, having a focus point on the activity of Bucharest Observatory. The article discusses the roots of an evolution pathway determined and inspired by the activity of several scientific personalities of Romania such as Stefan Hepites, Spiru Haret, Nicolae Coculescu and others. It also underlines that a great importance for the astronomical research in Romania was given by the outstanding technical value of the main instruments used at the Observatory in the first decades of activity and, consequentially, by their longevity in service: in the Equatorial Dome - the impressive 6 m. Prin-Mertz telescope and in the Meridian Hall - the GautierPrin telescope. This determined the formation of a powerful astrometry division and a research drive which led over time to important scientific works such as the ultraprecise stellar catalogues developed in Romania at Bucharest Observatory, which were appreciated and awarded nationally and internationally. Therefore, the article includes the moments and the people which determined the success of laying the foundations of the Observatory in 1908 and then having completed the initial scientific infrastructure in 1912 when the construction work was finished, and briefly presents the features, scientific utilisation and outputs of its telescopes, some of the best in the world in their golden years.

  17. Learning from a contemporary history of immunology.

    Science.gov (United States)

    Cohn, Melvin

    2017-06-01

    This essay is a selected aspect of the history of contemporary immunology seen from a "what can we learn" point of view. It is limited to the ideas and experiments from which we might draw a take-home message. The emphasis is on the convoluted pathway that was actually used by immunologists to arrive at understanding compared to the direct pathway that could have been used given the knowledge at that time. It takes the reader through the instructionist era of the 1940s to the present by stressing the elements of thinking most conducive to the arrival at a default understanding of the intact immune system. It is a personalized account because the author participated directly in the debates that led eventually to agreed-upon or default conceptualizations. Given this, a peek at the future is attempted as a test of the validity of a Cartesian or reductionist approach to arriving at simplification of complexity and at the maximizing of generalization. A reasoned guess (i.e., a theory) is the only way we have to understand the world around us.

  18. Contemporary trends in the hotel industry development

    Directory of Open Access Journals (Sweden)

    Barjaktarović Dragan

    2016-01-01

    Full Text Available International tourism has a leading position in the world's economy at the end of the 20th century and at the beginning of the 21st century. The number of participants in international tourism is near one billion tourists. Tourism FX income is above USD 1.260 billion, globally. More than 2/3 of total tourism turn over is provided by hospitality and restaurants business, which is the best indicator of relevance of those industries, for further development of total economic development and the tourism. Projections of different relevant world's institutions go in direction that tourism will have dynamic developing trend which will provide its' stronger position in the world's industry development. In accordance with UNWTO's estimations, number of foreign tourists will increase up to 1.8 million and FX tourist income is expected to reach USD 2.000 billion at the end of 2030. In order to meet the sophisticated requests of the modern tourists and provide an answer to contemporary market trends, hotel industry, as the base part of tourism, will respond with the new qualitative, technology based facilities and services.

  19. CONTEMPORARY SLOVENIAN TIMBER ARCHITECTURE INTERNATIONAL RECOGNIZED

    Directory of Open Access Journals (Sweden)

    Manja Kitek Kuzman

    2014-12-01

    Full Text Available The book presents Slovenia' s contemporary timber architecture. Thanks to its abundant forests, Slovenia has preserved the tradition of wood construction. As much as 60% of its surface is covered by forests. Slovenia is also the third most forested country in Europe. The high share of forest-covered surface allows for a sustainable production of high-quality wood. In the past, wood was used primarily in the construction of farm buildings, but now timber architecture is used for everything from residences and office buildings to public buildings such as community centres and schools. Timber construction is becoming increasingly popular. Apart from larger companies taking this approach, a great number of wooden houses have sprung up, built either on personal initiative or with the support of carpenter workshops. Slovenian timber architecture has taken a new approach to environmental and energy-efficiency problems and received great international recognition. The book discusses over fifty projects built over a ten-year period, and includes descriptions, photographs, and plans. The projects include residential areas, administration, and office, as well as tourist, educational, and industrial buildings. Timber architecture is presented as an integral part of the Slovenian landscape. The monograph will be useful to designers and future experts in their planning of optimal timber buildings and will highlight the main benefits of using timber construction.

  20. Debate on class issue in contemporary sociology

    Directory of Open Access Journals (Sweden)

    Antonić Slobodan

    2008-01-01

    Full Text Available The contemporary debate on class issue within the sociology in English speaking countries focuses on two questions. The first question is whether the crisis of the Marxist class analysis, which arose as a consequence of weakening of class identity and class behavior, is at the same time a sign of crisis of sociological class conception. There are American, British and Australian sociologists whose answer to this question is affirmative. However, others have been claiming that the Marxist class analysis could be replaced by the Weberian concept of stratification. The second question in this debate is on the exploratory importance of class for sociological analysis. Some sociologists have been claiming that its explanatory capacity is exhausted. However, there are others who argue that classes remain one of the most important tools a modern sociologist has. Finally, this paper points to the third way of saving the class analysis. It is about focusing on collective identity and collective action of the members of "developed" professions, as a kind of "small" classes or "proto-classes".