WorldWideScience

Sample records for greatest contemporary threats

  1. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  2. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    Energy Technology Data Exchange (ETDEWEB)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  3. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  4. Learning from history, predicting the future: the UK Dutch elm disease outbreak in relation to contemporary tree disease threats

    Science.gov (United States)

    Potter, Clive; Harwood, Tom; Knight, Jon; Tomlinson, Isobel

    2011-01-01

    Expanding international trade and increased transportation are heavily implicated in the growing threat posed by invasive pathogens to biodiversity and landscapes. With trees and woodland in the UK now facing threats from a number of disease systems, this paper looks to historical experience with the Dutch elm disease (DED) epidemic of the 1970s to see what can be learned about an outbreak and attempts to prevent, manage and control it. The paper draws on an interdisciplinary investigation into the history, biology and policy of the epidemic. It presents a reconstruction based on a spatial modelling exercise underpinned by archival research and interviews with individuals involved in the attempted management of the epidemic at the time. The paper explores what, if anything, might have been done to contain the outbreak and discusses the wider lessons for plant protection. Reading across to present-day biosecurity concerns, the paper looks at the current outbreak of ramorum blight in the UK and presents an analysis of the unfolding epidemiology and policy of this more recent, and potentially very serious, disease outbreak. The paper concludes by reflecting on the continuing contemporary relevance of the DED experience at an important juncture in the evolution of plant protection policy. PMID:21624917

  5. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  6. Freedom's Greatest Threat, The Metaterrorist

    National Research Council Canada - National Science Library

    Jones, Gary

    1997-01-01

    The end of the Cold War ushered on to the world scene a new hybrid of terrorist. This new breed of criminal is called the metaterrorist, because his art of instilling terror goes beyond anything we have ever seen in the past...

  7. The Greatest Mathematical Discovery?

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, David H.; Borwein, Jonathan M.

    2010-05-12

    What mathematical discovery more than 1500 years ago: (1) Is one of the greatest, if not the greatest, single discovery in the field of mathematics? (2) Involved three subtle ideas that eluded the greatest minds of antiquity, even geniuses such as Archimedes? (3) Was fiercely resisted in Europe for hundreds of years after its discovery? (4) Even today, in historical treatments of mathematics, is often dismissed with scant mention, or else is ascribed to the wrong source? Answer: Our modern system of positional decimal notation with zero, together with the basic arithmetic computational schemes, which were discovered in India about 500 CE.

  8. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  9. About Security in Contemporary World

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2015-06-01

    Full Text Available The task to ensure security in contemporary world is a complicated political, scientific-technological and socio-economic problem. As the security itself is complicated, multifactor and hierarchized phenomen also its investigation has to be of an interdisciplinary character. The character of security environment, the character of security risks and threats and also the character of tools for their elimination are essentially changing. The basis to security of social subject consisted in arrangement of the conditions for their existence, to surviving in the present time and advancement into the future. Assurance of this condition means it provided ability to the social subjects to eliminated threats that are defined. In situations of asymmetrical security, the threats are not always clearly defined. They often consist of their own structure systems, in relationships and status the subjects of internationals relations. Asymmetrical of security, by our opinion, presents a discrepancy, unbalance, non-parity between subjects of the international security environment. The unbalance, discrepancy, non-parity has political, military, economic, law, social and societal dimensions.

  10. Impact of Human Security Threats on Leadership and Political ...

    African Journals Online (AJOL)

    Human security threats in contemporary Africa have become a major political challenge. Whether it involves sectional conflicts, kidnapping, human trafficking, armed robbery they have continued to exert a far reaching impact on the leadership and political stability in the region. This paper is therefore an attempt to examine ...

  11. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  12. How Threat Assessment Could Become Self-Fulfilling Prophecy: Case of U.S.-China Relations

    Directory of Open Access Journals (Sweden)

    Muhamad Arif

    2016-12-01

    Full Text Available This article tries to explain how misperception can trigger conflict between countries. The article would employ spiral model of conflict proposed by Robert Jervis as a theoretical framework to scrutinize contemporary US and Chinese contemporary competition. As a result, this paper shows how threat assessment could trigger a spiral of conflict through state’s tendency to overestimate threat level and its failure to perceive that defensive behavior can be interpreted as offensive by the belligerent. Based on this analysis, the probability of conflicts can be reduced as each country tries to comprehend motivations that drive other behavior, perceptions and reactions that might arise as a result of the strategic empathy.

  13. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  14. Contemporary Language Issues in Ukraine: Bilingualism or Russification

    Directory of Open Access Journals (Sweden)

    Iryna Zbyr

    2015-02-01

    Full Text Available The article aims to focus on the analysis of the contemporary language issues in Ukraine. A characteristic feature of contemporary language situation in Ukraine is a co-existence on its territory of two languages, Ukrainian and Russian, along with various forms of Ukrainian-Russian bilingualism. Narrowing down the spheres of use of the Ukrainian language and the strong interferential influence of Russian have led to the emergence of the hybrid of Ukrainian-Russian forms of the everyday language known as Surzhyk. The article discusses how language forms are connected with conceptualizations of national identity in contemporary Ukrainian language ideology. It especially focuses on Surzhyk a pejorative collective label for non-standard language varieties that dissolve the language boundary between Ukrainian and Russian standard languages. Although most attention in Ukrainian debates on language is directed towards the complex relations between two standard languages, Surzhyk is considered an important problem, not the least among those for whom it is a major threat to the survival of the Ukrainian language.

  15. Life and styles of contemporary African artists: a biography of Jaji M ...

    African Journals Online (AJOL)

    It is a consensus among scholars that the greatest contributions of Africans to civilization are in the arts. Great European artists like Pablo Picasso, Georges Braque and others had to copy African art styles to change the face of European art in the early 20th century. Today, contemporary African artists have the zeal and ...

  16. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  17. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  18. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  19. Potential future land use threats to California's protected areas

    Science.gov (United States)

    Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson

    2015-01-01

    Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.

  20. Nature's Greatest Puzzles

    International Nuclear Information System (INIS)

    Quigg, Chris

    2005-01-01

    It is a pleasure to be part of the SLAC Summer Institute again, not simply because it is one of the great traditions in our field, but because this is a moment of great promise for particle physics. I look forward to exploring many opportunities with you over the course of our two weeks together. My first task in talking about Nature's Greatest Puzzles, the title of this year's Summer Institute, is to deconstruct the premise a little bit

  1. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  2. Victims’ Reactions to the Interpersonal Threat to Public Identity Posed by Copycats

    Directory of Open Access Journals (Sweden)

    Stephen Reysen

    2014-06-01

    Full Text Available Interpersonal threats to public identity consist of situations where another person intentionally attempts to illegitimately undermine one’s ability to display a valued and distinctive public identity. In three studies, we examined victims’ reactions to copycatting as an interpersonal threat to public identity to test each component of this definition. In Study, participants expressed the greatest degree of anger when the copying was illegitimate and intentional. In Study 2, participants expressed a greater degree of anger to copying of an important (vs. unimportant characteristic. In Study 3, we manipulated the number of identity characteristics copied. A structural model showed that as the number of copied characteristics increased, participants’ perception of the situation as illegitimate and the copying as intentional predicted a threat to one’s freedom, which in turn predicted felt reactance predicting an unfavorable impression and a desire to confront the copycat. Together, the results support the definition of interpersonal threats to public identity and copycatting as such a situation.

  3. INTERNATIONAL LEGAL ASPECTS OF DEALING WITH THE CONTEMPORARY TERRORISM THREATS

    Directory of Open Access Journals (Sweden)

    Vesna Poposka

    2017-05-01

    Full Text Available Recent challenges in international security posed by two terrorist organizations, Al Qaeda and ISIS, have highlighted an urgent domestic and foreign policy challenge. Terrorism has been, for more than a decade, top headline in the world media, and the cost of terrorist activities is expressed in numerous human lives and enormous material damage. Yet to date, international organizations and governments have not been successful in the attempt to find a common definition or uniform approach. Up to now, the approaches towards terrorist activities differ from case to case. There is no single legal regime to deal with terrorist activities, and the legal regime is what gives the answer and the framework for the counter-terrorist activities of the security forces, in order to be able to deal with the threat. This paper will attempt to answer at least some of the dilemmas.

  4. Stereotype Threat Effects on Learning From a Cognitively Demanding Mathematics Lesson.

    Science.gov (United States)

    Lyons, Emily McLaughlin; Simms, Nina; Begolli, Kreshnik N; Richland, Lindsey E

    2018-03-01

    Stereotype threat-a situational context in which individuals are concerned about confirming a negative stereotype-is often shown to impact test performance, with one hypothesized mechanism being that cognitive resources are temporarily co-opted by intrusive thoughts and worries, leading individuals to underperform despite high content knowledge and ability (see Schmader & Beilock, ). We test here whether stereotype threat may also impact initial student learning and knowledge formation when experienced prior to instruction. Predominantly African American fifth-grade students provided either their race or the date before a videotaped, conceptually demanding mathematics lesson. Students who gave their race retained less learning over time, enjoyed the lesson less, reported a diminished desire to learn more, and were less likely to choose to engage in an optional math activity. The detrimental impact was greatest among students with high baseline cognitive resources. While stereotype threat has been well documented to harm test performance, the finding that effects extend to initial learning suggests that stereotype threat's contribution to achievement gaps may be greatly underestimated. Copyright © 2017 Cognitive Science Society, Inc.

  5. Computational Physics' Greatest Hits

    Science.gov (United States)

    Bug, Amy

    2011-03-01

    The digital computer, has worked its way so effectively into our profession that now, roughly 65 years after its invention, it is virtually impossible to find a field of experimental or theoretical physics unaided by computational innovation. It is tough to think of another device about which one can make that claim. In the session ``What is computational physics?'' speakers will distinguish computation within the field of computational physics from this ubiquitous importance across all subfields of physics. This talk will recap the invited session ``Great Advances...Past, Present and Future'' in which five dramatic areas of discovery (five of our ``greatest hits'') are chronicled: The physics of many-boson systems via Path Integral Monte Carlo, the thermodynamic behavior of a huge number of diverse systems via Monte Carlo Methods, the discovery of new pharmaceutical agents via molecular dynamics, predictive simulations of global climate change via detailed, cross-disciplinary earth system models, and an understanding of the formation of the first structures in our universe via galaxy formation simulations. The talk will also identify ``greatest hits'' in our field from the teaching and research perspectives of other members of DCOMP, including its Executive Committee.

  6. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  7. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  8. Polar marine ecosystems: major threats and future change

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, A. [British Antarctic Survey, Cambridge (United Kingdom); Harris, C.M. [Environmental Research and Assessment, Grantchester (United Kingdom)

    2003-07-01

    This review of polar marine ecosystems covers both the Arctic and Antarctic, identifying the major threats and, where possible, predicting their possible state(s) in 2025. Although the two polar regions are similar in their extreme photoperiod, low temperatures, and in being heavily influenced by snow and ice, in almost all other respects they are very different. The Arctic Ocean is a basin surrounded by continental landmasses close to, and influenced by, large populations and industrial activities. In contrast, the Southern Ocean is contiguous with all the other great oceans and surrounds a single land mass; Antarctica is remote from major centres of population and sources of pollution. Marine environments in both Polar Regions have been highly disturbed by fishing activity, but, in terms of pollution, some areas remain among the most pristine in the world. There are, however, both local and global pressures. Over the 2025 time horizon, the greatest concern for the Arctic is probably the ecological implications of climate change, particularly insofar as sea ice extent and duration are likely to be affected. Such changes are not expected to be as pronounced in the Southern Ocean over this time period, and concerns are related more to direct threats from harvesting of marine living resources, and the ability to manage these fisheries sustainably. In both Polar Regions, the capacity of marine ecosystems to withstand the cumulative impact of a number of pressures, including climate change, pollution and overexploitation, acting synergistically is of greatest concern. (author)

  9. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  10. Will Climate Change, Genetic and Demographic Variation or Rat Predation Pose the Greatest Risk for Persistence of an Altitudinally Distributed Island Endemic?

    Directory of Open Access Journals (Sweden)

    Alison Shapcott

    2012-11-01

    Full Text Available Species endemic to mountains on oceanic islands are subject to a number of existing threats (in particular, invasive species along with the impacts of a rapidly changing climate. The Lord Howe Island endemic palm Hedyscepe canterburyana is restricted to two mountains above 300 m altitude. Predation by the introduced Black Rat (Rattus rattus is known to significantly reduce seedling recruitment. We examined the variation in Hedyscepe in terms of genetic variation, morphology, reproductive output and demographic structure, across an altitudinal gradient. We used demographic data to model population persistence under climate change predictions of upward range contraction incorporating long-term climatic records for Lord Howe Island. We also accounted for alternative levels of rat predation into the model to reflect management options for control. We found that Lord Howe Island is getting warmer and drier and quantified the degree of temperature change with altitude (0.9 °C per 100 m. For H. canterburyana, differences in development rates, population structure, reproductive output and population growth rate were identified between altitudes. In contrast, genetic variation was high and did not vary with altitude. There is no evidence of an upward range contraction as was predicted and recruitment was greatest at lower altitudes. Our models predicted slow population decline in the species and that the highest altitude populations are under greatest threat of extinction. Removal of rat predation would significantly enhance future persistence of this species.

  11. Application of Contemporary Intelligence Models in Terms of Transformation and Security Sector Reform

    OpenAIRE

    Dojcinovski, Metodija; Ackoski, Jugoslav

    2011-01-01

    This paper presents a new approach to the contemporary methods of organizing, establishing and functioning of intelligence systems in a way of offering solutions against security threats and challenges of the 21st century. The effectiveness of implementing the measures and activities depends on the intelligence models, identified as functioning in relation to the structured elements of the represented and realistically created segments, standard operative procedures, security procedures and m...

  12. INFORMATION THREATS IN A GLOBALIZED WORLD: ECONOMICS, POLITICS, SOCIETY (EXPERIENCE OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Anatoliy Holovka

    2016-11-01

    Full Text Available The scientific article deals with both integral vision of the contemporary informative risks in the globalized world and their classification. The essence of the informative security is exposed, which is one of main factors of steady development of the modern informative society. In consideration of the foreign practice, the experience of Ukraine is also analyzed in counteraction to the contemporary informative threats. The effective policy of safety and counteraction to the informative threats is one of the basic constituents of the state national safety system and at the same time testifies to the correct character of connections between the public organs and the society. Under the conditions of unrestrained progress of information technologies and general informatization in all sectors of people’s life (politics, economy, defense, energy etc., providing of control and defense of informative space of the country becomes much more difficult task. Modern Ukrainian realities certify convincingly, that Ukraine is in an extremely difficult political situation that influences all spheres of Ukrainians’ life. The key reason of such situation is a military-informative aggression against Ukraine from Russia, which is the fact of waging a «hybrid war». As it is known, this type of war combines the application of both classic soldiery instruments (military technique, firearms, regular troops and methods of informative influence (cyber-attack, informative diversions, aggressive propaganda, impact on public opinion. This factor encourages such research. The object of the study is the phenomenon of information risks in the modern world. Subject of research – is the impact of modern information threats to the state and society, namely the economic, political and social spheres. For a holistic analysis of the subject of research was used appropriate methodology – systematic approach, method of comparative analysis, general scientific methods

  13. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis

    OpenAIRE

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-we...

  14. Motivation for Aggressive Religious Radicalization: Goal Regulation Theory and a Personality × Threat × Affordance Hypothesis

    OpenAIRE

    Ian eMcGregor; Joseph eHayes; Mike ePrentice; Mike ePrentice

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization. It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward aggressive religious radicalization. Conducive personality traits are oppositional, anxi...

  15. Differentiating the threat of radiological/nuclear terrorism: Motivations and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Post, J M [Elliott School of International Affairs, George Washington University, Washington, DC (United States)

    2001-07-01

    Full text: Reviewing the spectrum of terrorist groups in terms of motivation, incentives and constraints, for nearly all groups, nuclear terrorism could be highly counter-productive. The constraints are particularly severe for large-scale mass casualty terrorism for groups that are concerned with their constituents--social revolutionary and nationalist separatist terrorists--although discriminate low level attacks are possible. Right-wing extremists, including individuals who are members of the right-wing virtual community of hatred, represent a distinct danger for low level discriminate attacks against their targets. Religious fundamentalist terrorist groups represent a particular threat, because they are not trying to influence the West but to expel Western modernizing influences. Moreover, they believe that their acts of violence are given sacred significance. The severe constraints against catastrophic terrorism for most groups argues for continuing to protect against the greatest danger - conventional terrorism - and to devote significantly increased resources to monitoring more closely the groups at greatest risk for nuclear terrorism. (author)

  16. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    Science.gov (United States)

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and

  17. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  18. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    Science.gov (United States)

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  19. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  20. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  1. Nature's Greatest Puzzles

    Energy Technology Data Exchange (ETDEWEB)

    Quigg, Chris; /Fermilab

    2005-02-01

    It is a pleasure to be part of the SLAC Summer Institute again, not simply because it is one of the great traditions in our field, but because this is a moment of great promise for particle physics. I look forward to exploring many opportunities with you over the course of our two weeks together. My first task in talking about Nature's Greatest Puzzles, the title of this year's Summer Institute, is to deconstruct the premise a little bit.

  2. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  3. A Risk Management Approach to the "Insider Threat"

    Science.gov (United States)

    Bishop, Matt; Engle, Sophie; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

    Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, manydefine it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policyin a form that can be implemented on a computer system or network, createsgaps in enforcement. This paper defines "insider" precisely, in termsof thesegaps, andexploresan access-based modelfor analyzing threats that include those usually termed "insider threats." This model enables an organization to order its resources based on thebusinessvalue for that resource andof the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which usersareatthe greatestriskofacting inappropriately. We concludebyexamining how to merge this model with one of forensic logging and auditing.

  4. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  5. Understanding the threats posed by non-native species: public vs. conservation managers.

    Directory of Open Access Journals (Sweden)

    Rodolphe E Gozlan

    Full Text Available Public perception is a key factor influencing current conservation policy. Therefore, it is important to determine the influence of the public, end-users and scientists on the prioritisation of conservation issues and the direct implications for policy makers. Here, we assessed public attitudes and the perception of conservation managers to five non-native species in the UK, with these supplemented by those of an ecosystem user, freshwater anglers. We found that threat perception was not influenced by the volume of scientific research or by the actual threats posed by the specific non-native species. Media interest also reflected public perception and vice versa. Anglers were most concerned with perceived threats to their recreational activities but their concerns did not correspond to the greatest demonstrated ecological threat. The perception of conservation managers was an amalgamation of public and angler opinions but was mismatched to quantified ecological risks of the species. As this suggests that invasive species management in the UK is vulnerable to a knowledge gap, researchers must consider the intrinsic characteristics of their study species to determine whether raising public perception will be effective. The case study of the topmouth gudgeon Pseudorasbora parva reveals that media pressure and political debate has greater capacity to ignite policy changes and impact studies on non-native species than scientific evidence alone.

  6. NATO Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David

    2015-01-01

    The nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before considered. The programme of NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” has been focused on science and technology challenges associated with our need to improve the national and international capacity and capability to prevent, protect against, mitigate the effects of, respond to, and recover from the nuclear and radiological disasters, including nuclear and radiological accident, terrorist attack by Improvised Nuclear Device (IND) or by “Dirty Bomb”-Radiological Dispersal Device (RDD), that pose the greatest risk to the national and international security and safety...

  7. Contemporary jewelry definitions

    Directory of Open Access Journals (Sweden)

    Marlon Aparecido Mercaldi

    2016-12-01

    Full Text Available Contemporary jewelry terminology is open to many criticism and weaknesses as it is confronted with the classic definition of jewelry and also often attached to the historical widespread idea of adornment and jewelry to modernity. Therefore one of the this article issues is to approach about what it is contemporary jewelry and how it can be defined. Thus, we present the topics related to the jewel discussion in contemporary times that are organized into a set of assumptions and approaches that help us provide an overview about the contemporary jewelry.

  8. On the contemporary – and contemporary art history. A review of Terry Smith, What Is Contemporary Art

    Directory of Open Access Journals (Sweden)

    Anthony Gardner

    2011-06-01

    Full Text Available This analysis of Terry Smith’s 'What Is Contemporary Art?' evaluates Smith’s ongoing project to theorise contemporary art around the theme of multiple, interconnected temporalities. It questions how this ‘contemporaneity’ differs from the classic teleologism of modernism and postmodern relativism and suggests that Smith’s categories may be valuable for understanding other cultural areas, such as contemporary music. It then raises methodological problems associated with charting the terrain of contemporary art and how they overlap with economic considerations, arguing that the task implies particular forms of privilege that may threaten the autonomy of critical analysis, but that Smith’s work goes some way toward exposing this problem.

  9. Impulsive responding in threat and reward contexts as a function of PTSD symptoms and trait disinhibition.

    Science.gov (United States)

    Sadeh, Naomi; Spielberg, Jeffrey M; Hayes, Jasmeet P

    2018-01-01

    We examined current posttraumatic stress disorder (PTSD) symptoms, trait disinhibition, and affective context as contributors to impulsive and self-destructive behavior in 94 trauma-exposed Veterans. Participants completed an affective Go/No-Go task (GNG) with different emotional contexts (threat, reward, and a multidimensional threat/reward condition) and current PTSD, trait disinhibition, and risky/self-destructive behavior measures. PTSD interacted with trait disinhibition to explain recent engagement in risky/self-destructive behavior, with Veterans scoring high on trait disinhibition and current PTSD symptoms reporting the highest levels of these behaviors. On the GNG task, commission errors were also associated with the interaction of PTSD symptoms and trait disinhibition. Specifically, PTSD symptoms were associated with greater commission errors in threat vs. reward contexts for individuals who were low on trait disinhibition. In contrast, veterans high on PTSD and trait disinhibition exhibited the greatest number of commission errors in the multidimensional affective context that involved both threat and reward processing. Results highlight the interactive effects of PTSD and disinhibited personality traits, as well as threat and reward systems, as risk factors for impulsive and self-destructive behavior in trauma-exposed groups. Findings have clinical implications for understanding heterogeneity in the expression of PTSD and its association with disinhibited behavior. Copyright © 2017 Elsevier Ltd. All rights reserved.

  10. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  11. Contemporary Obstetric Triage.

    Science.gov (United States)

    Sandy, Edward Allen; Kaminski, Robert; Simhan, Hygriv; Beigi, Richard

    2016-03-01

    The role of obstetric triage in the care of pregnant women has expanded significantly. Factors driving this change include the Emergency Medical Treatment and Active Labor Act, improved methods of testing for fetal well-being, increasing litigation risk, and changes in resident duty hour guidelines. The contemporary obstetric triage facility must have processes in place to provide a medical screening examination that complies with regulatory statues while considering both the facility's maternal level of care and available resources. This review examines the history of the development of obstetric triage, current considerations in a contemporary obstetric triage paradigm, and future areas for consideration. An example of a contemporary obstetric triage program at an academic medical center is presented. A successful contemporary obstetric triage paradigm is one that addresses the questions of "sick or not sick" and "labor or no labor," for every obstetric patient that presents for care. Failure to do so risks poor patient outcome, poor patient satisfaction, adverse litigation outcome, regulatory scrutiny, and exclusion from federal payment programs. Understanding the role of contemporary obstetric triage in the current health care environment is important for both providers and health care leadership. This study is for obstetricians and gynecologists as well as family physicians. After completing this activity, the learner should be better able to understand the scope of a medical screening examination within the context of contemporary obstetric triage; understand how a facility's level of maternal care influences clinical decision making in a contemporary obstetric triage setting; and understand the considerations necessary for the systematic evaluation of the 2 basic contemporary obstetric questions, "sick or not sick?" and "labor or no labor?"

  12. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  13. Contemporary Nigerian Popular music: A Menace to National Development

    Directory of Open Access Journals (Sweden)

    Ogunrinade D O A

    2016-01-01

    Full Text Available There is no gainsaying that most of the recent forms of contemporary popular music produced, packaged, made available for public consumption constitute grave danger and serious threat to moral uprightness in Nigerian society. This has exposed the Nigerian society to a wide variety of insecurity and violence. This is evident as seen from series of moral decadence and dissipation that infiltrated the lives of the citizenry - especially the youths (the leaders of tomorrow ranging from, sexual abuse, money mongering, indiscipline, examination malpractice and indecent dressing to mention but a few. Music is a powerful tool and a force for mobilization which brings about either reformation or deformation of character due to the type of rhythm, melody, harmony and principally the lyrics of the songs. This paper examines the new trend of contemporary popular music in Nigeria with a view to assess its negative and pessimistic impacts on the character molding of the citizenry in Nigerian society. Live performances of contemporary popular music were observed and audio and video tape materials relating to the said music were also analyzed based on their educational  and moral values of such songs. It was  discovered that contemporary popular music as we have it today in Nigeria communicates vulgarity and coarseness to the listeners and this poses a lot of negative effects on the attitude of the youths. Musicians employ indecent words to attract the youth thus creating negative influence on the character of the leaders of tomorrow (the youth to engage in various   debauchery.  The paper therefore, suggested that relevant agencies should be put in place to ensure that apart from entertainment, music should convey positive character building messages rather than music that egg on and motivate illicit acts. Likewise, musicians should compose songs in the spirit of societal reformation so as to impact moral virtues on the younger generation  thus

  14. Comparison of the effectiveness of contemporary ophthalmic lenses against β radiation

    International Nuclear Information System (INIS)

    Dunlap, J.H.; Harvey, P.W.; Schwing, R.L.

    1977-01-01

    As part of a study intended to identify the lens material and type that provides maximum eye protection against beta radiation, the effectiveness of contemporary ophthalmic lenses has been evaluated. From the calculations and measurements presented it is evident that safety glasses with crown glass ophthalmic lenses afford the eye the greatest protection against beta radiation, whereas street glasses with plastic ophthalmic lenses afford the eye very little protection. It is to be noted that glass street lenses (approximately 2.2 mm thick) provide greater protection than plastic safety lenses (approximately 3.5 mm thick). A warning is given against the use of safety lenses containing a large percentage of thorium. (U.K.)

  15. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    Energy Technology Data Exchange (ETDEWEB)

    Glenn, Colleen [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Sterbentz, Dane [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Wright, Aaron [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center

    2016-12-20

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks, the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices

  16. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  17. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a

  18. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  19. Stress Sensitivity, Aberrant Salience, and Threat Anticipation in Early Psychosis: An Experience Sampling Study

    Science.gov (United States)

    Reininghaus, Ulrich; Kempton, Matthew J.; Valmaggia, Lucia; Craig, Tom K. J.; Garety, Philippa; Onyejiaka, Adanna; Gayer-Anderson, Charlotte; So, Suzanne H.; Hubbard, Kathryn; Beards, Stephanie; Dazzan, Paola; Pariante, Carmine; Mondelli, Valeria; Fisher, Helen L.; Mills, John G.; Viechtbauer, Wolfgang; McGuire, Philip; van Os, Jim; Murray, Robin M.; Wykes, Til; Myin-Germeys, Inez; Morgan, Craig

    2016-01-01

    While contemporary models of psychosis have proposed a number of putative psychological mechanisms, how these impact on individuals to increase intensity of psychotic experiences in real life, outside the research laboratory, remains unclear. We aimed to investigate whether elevated stress sensitivity, experiences of aberrant novelty and salience, and enhanced anticipation of threat contribute to the development of psychotic experiences in daily life. We used the experience sampling method (ESM) to assess stress, negative affect, aberrant salience, threat anticipation, and psychotic experiences in 51 individuals with first-episode psychosis (FEP), 46 individuals with an at-risk mental state (ARMS) for psychosis, and 53 controls with no personal or family history of psychosis. Linear mixed models were used to account for the multilevel structure of ESM data. In all 3 groups, elevated stress sensitivity, aberrant salience, and enhanced threat anticipation were associated with an increased intensity of psychotic experiences. However, elevated sensitivity to minor stressful events (χ2 = 6.3, P = 0.044), activities (χ2 = 6.7, P = 0.036), and areas (χ2 = 9.4, P = 0.009) and enhanced threat anticipation (χ2 = 9.3, P = 0.009) were associated with more intense psychotic experiences in FEP individuals than controls. Sensitivity to outsider status (χ2 = 5.7, P = 0.058) and aberrantly salient experiences (χ2 = 12.3, P = 0.002) were more strongly associated with psychotic experiences in ARMS individuals than controls. Our findings suggest that stress sensitivity, aberrant salience, and threat anticipation are important psychological processes in the development of psychotic experiences in daily life in the early stages of the disorder. PMID:26834027

  20. Genetic restoration of a stocked brown trout Salmo trutta population using microsatellite DNA analysis of historical and contemporary samples

    DEFF Research Database (Denmark)

    Hansen, Michael Møller; Bekkevold, Dorte; Jensen, L.F.

    2006-01-01

    1. Gene flow from domesticated to wild populations is a major threat to wild salmonid fish. However, few studies have addressed how populations could be restored after admixture has occurred. We analysed the prospects for restoring the previously intensively stocked brown trout population...... of the Skjern River, Denmark, by identifying remaining non-admixed individuals to be used for supportive breeding. 2. We analysed microsatellite DNA markers in historical (1940-50s) and contemporary (1992-2004) samples from the Skjern River system, from the strain of domesticated trout previously used...... for stocking, and from the neighbouring Stora River. We analysed admixture proportions to estimate the genetic contribution by domesticated trout. We identified non-admixed trout using assignment tests, and further analysed the possible sources of indigenous trout by estimating contemporary migration among...

  1. Greatest Happiness Principle in a Complex System Approach

    Directory of Open Access Journals (Sweden)

    Katalin Martinás

    2012-06-01

    Full Text Available The principle of greatest happiness was the basis of ethics in Plato’s and Aristotle’s work, it served as the basis of utility principle in economics, and the happiness research has become a hot topic in social sciences in Western countries in particular in economics recently. Nevertheless there is a considerable scientific pessimism over whether it is even possible to affect sustainable increases in happiness.In this paper we outline an economic theory of decision based on the greatest happiness principle (GHP. Modern equilibrium economics is a simple system simplification of the GHP, the complex approach outlines a non-equilibrium economic theory. The comparison of the approaches reveals the fact that the part of the results – laws of modern economics – follow from the simplifications and they are against the economic nature. The most important consequence is that within the free market economy one cannot be sure that the path found by it leads to a beneficial economic system.

  2. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis.

    Science.gov (United States)

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress.

  3. Norman Mailer - the most influental critic of contemporary reality in the second half of the twentieth century

    Directory of Open Access Journals (Sweden)

    Jasna Potočnik Topler

    2013-12-01

    Full Text Available Norman Mailer, one of the most influential authors of the second half of the twentieth century, faithfully followed his principle that a writer should alsobe a critic of contemporary reality. Therefore, most of his works portray the reality of the United States of America and the complexities of the contemporary American scene. Mailer described the spirit of his time - from the terror of war and numerous dynamic social and political processes to the 1969 moon landing. Conflicts were often in the centre of his writing, as was the relationship between an individual and the society; he speaks of politicalpower and the dangerous power of capital, while pointing to the threat of totalitarianism in America. Mailer spent his entire career writing about violence, power, perverted sexuality, the phenomenon of Hitler, terrorism, religion and corruption. He continually pointed out that individuals were in constant danger of losing freedom and dignity.

  4. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  5. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  6. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  7. Celebrity and contemporary context

    Directory of Open Access Journals (Sweden)

    Paula Guimarães Simões

    2014-12-01

    Full Text Available This paper discusses the hermeneutic power of a celebrity (seen from the concept of event, seeking to understand what it reveals about the contemporary context. Based on this premise, we attempt to recognize some aspects of contemporary social life that emerge from the trajectory of a specific celebrity: the former soccer player Ronaldo Fenômeno. This analysis brings to light the hermeneutic power of Ronaldo, i.e., how his life story reveals characteristics of contemporary social life. Individualism, machismo, emphasis on a heteronormative ideal, shifts in the construction of romantic relationships, and the overlapping spheres of public and private life, are some important aspects of contemporary society revealed by this analysis.

  8. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  9. Stress Sensitivity, Aberrant Salience, and Threat Anticipation in Early Psychosis: An Experience Sampling Study.

    Science.gov (United States)

    Reininghaus, Ulrich; Kempton, Matthew J; Valmaggia, Lucia; Craig, Tom K J; Garety, Philippa; Onyejiaka, Adanna; Gayer-Anderson, Charlotte; So, Suzanne H; Hubbard, Kathryn; Beards, Stephanie; Dazzan, Paola; Pariante, Carmine; Mondelli, Valeria; Fisher, Helen L; Mills, John G; Viechtbauer, Wolfgang; McGuire, Philip; van Os, Jim; Murray, Robin M; Wykes, Til; Myin-Germeys, Inez; Morgan, Craig

    2016-05-01

    While contemporary models of psychosis have proposed a number of putative psychological mechanisms, how these impact on individuals to increase intensity of psychotic experiences in real life, outside the research laboratory, remains unclear. We aimed to investigate whether elevated stress sensitivity, experiences of aberrant novelty and salience, and enhanced anticipation of threat contribute to the development of psychotic experiences in daily life. We used the experience sampling method (ESM) to assess stress, negative affect, aberrant salience, threat anticipation, and psychotic experiences in 51 individuals with first-episode psychosis (FEP), 46 individuals with an at-risk mental state (ARMS) for psychosis, and 53 controls with no personal or family history of psychosis. Linear mixed models were used to account for the multilevel structure of ESM data. In all 3 groups, elevated stress sensitivity, aberrant salience, and enhanced threat anticipation were associated with an increased intensity of psychotic experiences. However, elevated sensitivity to minor stressful events (χ(2)= 6.3,P= 0.044), activities (χ(2)= 6.7,P= 0.036), and areas (χ(2)= 9.4,P= 0.009) and enhanced threat anticipation (χ(2)= 9.3,P= 0.009) were associated with more intense psychotic experiences in FEP individuals than controls. Sensitivity to outsider status (χ(2)= 5.7,P= 0.058) and aberrantly salient experiences (χ(2)= 12.3,P= 0.002) were more strongly associated with psychotic experiences in ARMS individuals than controls. Our findings suggest that stress sensitivity, aberrant salience, and threat anticipation are important psychological processes in the development of psychotic experiences in daily life in the early stages of the disorder. © The Author 2016. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  10. Motivation for Aggressive Religious Radicalization: Goal Regulation Theory and a Personality × Threat × Affordance Hypothesis

    Directory of Open Access Journals (Sweden)

    Ian eMcGregor

    2015-09-01

    Full Text Available A new set of hypotheses is presented regarding the cause of aggressive religious radicalization. It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward aggressive religious radicalization. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered. Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that aggressive religious radicalization is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress.

  11. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction

  12. Teaching Architecture - Contemporary Challenges and Threats in the Complexity of Built Environment

    Science.gov (United States)

    Borucka, Justyna; Macikowski, Bartosz

    2017-10-01

    The complexity of the modern built environment is a problem not only of architectural and urban issues. This issue extends to many other disciplines as well as covering a wide range of social engagements. The idea of writing this paper is generally initiated by the debate which took place in Gdańsk on 22.01.2016, and was prepared in order to meet representatives of the four circles of interest within the architectural sphere: universities, professional architectural organisations and associations, architectural practice (professionals running their own studios, managing projects and leading construction) and local social organisations active in city of Gdańsk. This paper is a comparison of the results of this discussion in relation to the policy and methodology of architecture teaching on the University level. Teaching architecture and urban planning according to the present discussion needs to be improved and advanced to meet the increasing complexity of both disciplines. Contemporary dynamic development of cities creates the necessity of engaging multiple stakeholders, participants and users of architecture and urban space. This is crucial to make them conscious of sharing responsibility for increasing the quality of living in the built environment. This discussion about architectural education is open and has the nature of an ongoing process adapting to a changing environment and is in fact a constant challenge which brings questions rather than simple answers. Transformation of architecture and urban planning, and consequently its education are increasingly entering into the related fields, especially into the professional practice and social environment. The question of how to teach architecture and urban planning and educate users of urban space should take place in the context of a wide discussion. This interdisciplinary debate seems to be a crucial and challenging step towards improving the future education of architecture and urban planning leading to a

  13. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    Directory of Open Access Journals (Sweden)

    Hannes Gaisberger

    Full Text Available Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change. We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs, climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted

  14. Factors increasing snake detection and perceived threat in captive rhesus macaques (Macaca mulatta).

    Science.gov (United States)

    Etting, Stephanie F; Isbell, Lynne A; Grote, Mark N

    2014-02-01

    The primary predators of primates are all ambush hunters, and yet felids, raptors, and snakes differ in aspects of their ecology that affect the evasive strategies of their primate prey. Felids and raptors can traverse long distances quickly, thus the urgency of threat they present increases as they come closer in proximity to primates. In contrast, snakes do not move rapidly over long distances, and so primates may be reasonably safe even at close distances provided snakes can be detected and monitored. We investigated the ability of captive rhesus macaques (Macaca mulatta) to detect snakes at distances ranging from 15 to 1.5 m. We also examined variation in intensity of perceived threat by applying a Hidden Markov Model to infer changes in underlying state from observable behaviors, that is, increased attention and mobbing. We found that the macaques often failed to detect snake models but that closer proximity improved snake detection, which is necessary before threat can be perceived. We also found that having only one individual in fairly close proximity (≤ 7.5 m) was sufficient to alert the rest of the group and so the chances of detection did not increase with increasing group size. Finally, we found that when the snakes were perceived, they did not elicit greater intensity of response with closer proximity. These results provide evidence that the threat from snakes is greatest when they are in proximity to primates but are unseen. When snakes are seen, however, distance appears not to affect primates' perceived risk, in contrast to their perceived risk from raptors and felids. © 2013 Wiley Periodicals, Inc.

  15. Public and Private Intelligence: Historical and Contemporary Perspectives

    Directory of Open Access Journals (Sweden)

    Ruth Delaforce

    2013-06-01

    Full Text Available Intelligence is often regarded as information that is special or different, which must be safely kept. When sought, collected or used by the private sector, as opposed to public agencies, concerns are raised on the purpose and propriety of such an activity. However, in an historical context, intelligence collection or sharing between public and private interests for the purpose of national security was not unusual, particularly during the Cold War. Case studies from this era indicate that overlapping concerns were economic success combined with political strategy. Glimpses of these shared interests between the state and business can also be identified in the immediate post-Cold War era, and the aftermath of terrorist attacks in 2001. Perhaps the greatest contemporary change is not that “private” and “public” intelligence is shared between business and state, but the extent of such an enterprise. Further issues related to this change are: state dominance in the public-private relationship; potential fragmentation in the intelligence process; gaps in the historical record; and implications for future generations of intelligence professionals.

  16. Contemporary Art from Denmark

    DEFF Research Database (Denmark)

    Bonde, Lisbeth

    2014-01-01

    Danish contemporary art is currently expanding bot quantitatively and qualitatively to such a degree that we can speak of a new Danish Golden Age. The article introduces some of the most interesting, Danish contemporary artists which are being exposed at the exhibition in the European Central Bank...

  17. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  18. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  19. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  20. Population structure, behavior, and current threats to the sarus crane (Grus antigone antigone in Nepal

    Directory of Open Access Journals (Sweden)

    Kamal Raj Gosai

    2016-09-01

    Full Text Available The sarus crane (Grus antigone antigone is listed as “vulnerable” in the International Union for Conservation of Nature (IUCN Red List of Threatened Species. Sarus cranes are distributed in the lowlands, but most live outside protected areas, especially in agricultural areas and wetlands of Nepal. The continuous expansion of agricultural land and the reduction of wetland habitats pose the greatest threats to the conservation of the species. We studied the sarus crane in the Rupandehi District of Nepal to understand their population structure, behavior, and current threats. We used the line (i.e., road transect method from August 2013 to February 2014. The study area contained 147 sarus cranes. Agricultural land and wetland areas contained the highest number of sarus cranes. Our analysis showed that the population of sarus crane in the area has declined since 2007. Most sarus cranes lived in pairs. A single flock contained 13 cranes at maximum. Sarus crane behavior was not significantly different before and after the breeding seasons. Human–sarus crane conflict began when cranes started utilizing agricultural areas. The main threats to the hatching success and survival of sarus cranes in the Rupendehi District are egg theft and the hunting of cranes for meat. The findings of this study establish baseline information on the overall conservation status, habitat availability, and ecological behavior of sarus cranes in the district. We propose regular surveys to monitor sarus crane population levels in the face of multiple anthropogenic threats to their survival.

  1. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  2. Many Species, Many Threats: A Composite Risk Assessment of Climate Impacts for Salmonids in the Pacific Northwest

    Science.gov (United States)

    Graham, M. C.; Greene, C.; Beechie, T. J.; Raymond, C.

    2016-02-01

    The life cycles of salmonid species span freshwater, estuarine, and marine environments, exposing these economically, ecologically, and culturally important species to a wide variety of climate change threats. The diverse life histories of salmonids make them differentially vulnerable to climate change based on their use of different habitat types and the variability in climate change threats across these habitat types. Previous studies have focused mainly on assessing the vulnerability of particular life stages for a few species. Hence, we lack a broad perspective on how multiple climate threats are expected to impact the entire salmonid community, which spend much of their lives in marine waters. This lack of knowledge hampers our ability to prioritize various adaptation strategies for salmonid conservation. In order to conduct a more extensive vulnerability study of salmonids, we performed a life cycle-based risk assessment of climate change threats for nine species of salmonids (species within Oncorhynchus, Salvelinus, and Prosopium genera) inhabiting the Skagit River watershed, which is subject to an array of climate impacts. Our risk assessment integrated projections of impacts from various climate threats in freshwater, estuarine, and marine ecosystems with expert-based assessments of species-specific sensitivity and exposure. We found that projections (multiple global climate models under moderate emission scenarios) of both changes in magnitude and frequency of three flow-related freshwater impacts (flooding, low flows, and suspended sediment pulses) were more severe than threats in estuarine and marine habitats for which we could obtain projections. Combining projections with expert-based sensitivity and exposure scores revealed that these three threats exhibited the highest risk across all species. Of the nine species, the four most vulnerable were Chinook and coho salmon, steelhead, and bull trout. Even though these salmonids spend much of their lives

  3. Literacy in the contemporary scene

    Directory of Open Access Journals (Sweden)

    Angela B. Kleiman

    2014-11-01

    Full Text Available In this paper I examine the relationship between literacy and contemporaneity. I take as a point of departure for my discussion school literacy and its links with literacies in other institutions of the contemporary scene, in order to determine the relation between contemporary ends of reading and writing (in other words, the meaning of being literate in contemporary society and the practices and activities effectively realized at school in order to reach those objectives. Using various examples from teaching and learning situations, I discuss digital literacy practices and multimodal texts and multiliteracies from both printed and digital cultures. Throughout, I keep as a background for the discussion the functions and objectives of school literacy and the professional training of teachers who would like to be effective literacy agents in the contemporary world.

  4. Contemporary plasma physics

    International Nuclear Information System (INIS)

    Sodha, M.S.; Tewari, D.P.; Subbarao, D.

    1983-01-01

    The book consists of review articles on some selected contemporary aspects of plasma physics. The selected topics present a panoramic view of contemporary plasma physics and applications to fusion, space and MHD power generation. Basic non-linear plasma theory is also covered. The book is supposed to be useful for M.S./M.Sc. students specialising in plasma physics and for those beginning research work in plasma physics. It will also serve as a valuable reference book for more advanced research workers. (M.G.B.)

  5. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  6. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  7. TREND MECHANISMS IN CONTEMPORARY FASHION

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    2013-01-01

    Explores a spatial approach to trend mechanisms that is argued to be more contemporary than the traditional temporal appraoch.......Explores a spatial approach to trend mechanisms that is argued to be more contemporary than the traditional temporal appraoch....

  8. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  9. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  10. Proceedings of the Mongolian Biodiversity Databank Workshop: Assessing the Conservation Status of Mongolian Mammals and Fishes: II – Mam- mals: Assessment Results and Threats.

    Directory of Open Access Journals (Sweden)

    Emma L. Clark

    2005-12-01

    Full Text Available The Mongolian Biodiversity Databank Workshop was held at the National University of Mongolia and Hustai National Park from 1 st October to 4 th November, 2005. As part of the workshop, participants assessed the conservation status of all Mongolian mammal species using the IUCN Categories and Cri - teria. Of the 128 species assessed, 2% were Critically Endangered (CR, 11% Endangered (EN and 4% Vulnerable (VU. A further 5% were categorised as Near Threatened (NT and 36% categorised as Data Deficient (DD. Ungulates were the most highly impacted: 79% were threatened with extinction. Twelve percent of carnivore species and 12% of rodent species were threatened. No non-rodent small mammal species were listed in a threatened category. Rodents and non-rodent small mammals were less well known, with 44% and 43% respectively found to be Data Deficient. This may have affected the threat assessment of these species. Greatest species richness of Mongolian mammals was found in the northern and western part of the country. The greatest number of threatened species also inhabit the north of the country, as well as the south-west. The main threat affecting most mammals in Mongolia was hunting, with lack of enforcement of legislation also considered a problem.

  11. Greatest Happiness Principle in a Complex System: Maximisation versus Driving Force

    Directory of Open Access Journals (Sweden)

    Katalin Martinás

    2012-06-01

    Full Text Available From philosophical point of view, micro-founded economic theories depart from the principle of the pursuit of the greatest happiness. From mathematical point of view, micro-founded economic theories depart from the utility maximisation program. Though economists are aware of the serious limitations of the equilibrium analysis, they remain in that framework. We show that the maximisation principle, which implies the equilibrium hypothesis, is responsible for this impasse. We formalise the pursuit of the greatest happiness principle by the help of the driving force postulate: the volumes of activities depend on the expected wealth increase. In that case we can get rid of the equilibrium hypothesis and have new insights into economic theory. For example, in what extent standard economic results depend on the equilibrium hypothesis?

  12. Hypertrophic Cardiomyopathy in Children, Adolescents, and Young Adults Associated With Low Cardiovascular Mortality With Contemporary Management Strategies.

    Science.gov (United States)

    Maron, Barry J; Rowin, Ethan J; Casey, Susan A; Lesser, John R; Garberich, Ross F; McGriff, Deepa M; Maron, Martin S

    2016-01-05

    Youthful age has been considered the time of greatest risk for patients with hypertrophic cardiomyopathy (HCM), largely because of the possibility of sudden death. The last 2 decades have witnessed more reliable identification of at-risk patients and utilization of implantable cardioverter-defibrillators for prevention of sudden death, and other contemporary treatment options. Whether such management advances have significantly altered the considerable mortality rate for young HCM patients remains unresolved. We studied long-term outcome in 474 consecutive HCM patients between 7 and 29 years of age presenting at 2 referral institutions. Over 7.1±5.1 years of follow-up (6.0 [3.0, 10.0]), 452 patients (95%) survived, with 95% experiencing no or mild symptoms. HCM-related death occurred in 18 patients (3%; 0.54%/y): arrhythmic sudden death (n=12), progressive heart failure and heart transplant complications (n=5), or postoperatively (n=1). In contrast, aborted life-threatening events occurred in 63 other high-risk patients (13%) with implantable cardioverter-defibrillator interventions for ventricular tachyarrhythmias (n=31), resuscitated out-of-hospital cardiac arrest (n=20), or heart transplant for advanced heart failure (n=12), 1.8%/y, 3-fold higher than HCM mortality. Five- and 10-year survival (considering only HCM deaths) was high (97% and 94%, respectively), virtually identical to that reported in middle-aged adult HCM patients (98% and 94%, P=0.23). In a large hospital-based cohort of young HCM patients, representing an age group considered at greatest risk, low mortality rates can be achieved with the application of contemporary cardiovascular treatment strategies, largely because of reliable identification of high-risk patients who benefited from implantable cardioverter-defibrillators for sudden death prevention, thereby creating the opportunity for extended longevity and good quality of life. © 2015 American Heart Association, Inc.

  13. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  14. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  15. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  16. Stigma and Discrimination in HIV/AIDS; The greatest Challenge to ...

    African Journals Online (AJOL)

    The greatest challenge to the efforts of the various agencies and governments in the care, support and treatment of people living with HIV/AIDS, appears to be stigma and discrimination. Stigma and discrimination has to be addressed through public education, legislation to protect people living with HIV/AIDS and also by ...

  17. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  18. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  19. Contemporary engineering economics

    CERN Document Server

    Park, Chan S

    2011-01-01

    Contemporary Engineering Economics, 5/e, is intended for undergraduate engineering students taking introductory engineering economics while appealing to the full range of engineering disciplines for which this course is often required: industrial, civil, mechanical, electrical, computer, aerospace, chemical, and manufacturing engineering, as well as engineering technology. This edition has been thoroughly revised and updated while continuing to adopt a contemporary approach to the subject, and teaching, of engineering economics. This text aims not only to build a sound and comprehensive coverage of engineering economics, but also to address key educational challenges, such as student difficulty in developing the analytical skills required to make informed financial decisions.

  20. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  1. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  2. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  3. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  5. Contemporary nuclear medicine diagnostics of neuroendocrine tumors

    Directory of Open Access Journals (Sweden)

    Todorović-Tirnanić Mila

    2015-01-01

    Full Text Available The new positron emission tomography (PET/CT methods for neuroendocrine tumors detection are presented and compared with classic, conventional methods. Conventional methods use a gamma scintillation camera for patients with neuroendocrine tumor imaging, after intravenous injection of one of the following radiopharmaceuticals: 1 somatostatin analogues labeled with indium-111 (111In-pentetreotide or technetium-99m (99mTc-EDDA/HYNIC-TOC; 2 noradrenaline analogue labeled with iodine-131 or -123 (131I/123I-MIBG; or 3 99mTc(V-DMSA. Contemporary methods use PET/CT equipment for patients with neuroendocrine tumor imaging, after intravenous injection of pharmaceuticals labeled with positron emitters [fluorine-18 (18F, galium-68 (68Ga, or carbon-11 (11C]: 1 glucose analogue (18FDG; 2 somatostatin analogue (68Ga-DOTATOC/68Ga-DOTATATE/68Ga-DOTANOC; 3 aminoacid precursors of bioamines: [a dopamine precursor 18F-DOPA (6-18F-dihydroxyphenylalanine, b serotonin precursor 11C-5HTP (11C-5-hydroxytryptophan]; or 4 dopamine analogue 18F-DA (6-18F-fluorodopamine. Conventional and contemporary (PET/ CT somatostatin receptor detection showed identical high specificity (92%, but conventional had very low sensitivity (52% compared to PET/CT (97%. It means that almost every second neuroendocrine tumor detected by contemporary method cannot be discovered using conventional (classic method. In metastatic pheochromocytoma detection contemporary (PET/ CT methods (18F-DOPA and 18F-DA have higher sensitivity than conventional (131I/123I-MIBG. In medullary thyroid carcinoma diagnostics contemporary method (18F-DOPA is more sensitive than conventional 99mTc(V-DMSA method, and is similar to 18FDG, computed tomography and magnetic resonance. In carcinoid detection contemporary method (18F-DOPA shows similar results with contemporary somatostatin receptor detection, while for gastroenteropancreatic neuroendocrine tumors it is worse. To conclude, contemporary (PET/CT methods for

  6. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Was ocean acidification responsible for history's greatest extinction?

    Science.gov (United States)

    Schultz, Colin

    2011-11-01

    Two hundred fifty million years ago, the world suffered the greatest recorded extinction of all time. More than 90% of marine animals and a majority of terrestrial species disappeared, yet the cause of the Permian-Triassic boundary (PTB) dieoff remains unknown. Various theories abound, with most focusing on rampant Siberian volcanism and its potential consequences: global warming, carbon dioxide poisoning, ocean acidification, or the severe drawdown of oceanic dissolved oxygen levels, also known as anoxia. To narrow the range of possible causes, Montenegro et al. ran climate simulations for PTB using the University of Victoria Earth System Climate Model, a carbon cycle-climate coupled general circulation model.

  8. Coping and acceptance: the greatest challenge for veterans with intestinal stomas.

    Science.gov (United States)

    Krouse, Robert S; Grant, Marcia; Rawl, Susan M; Mohler, M Jane; Baldwin, Carol M; Coons, Stephen Joel; McCorkle, Ruth; Schmidt, C Max; Ko, Clifford Y

    2009-03-01

    Intestinal stomas (ostomies) create challenges for veterans. The goal of this qualitative analysis was to understand better patients' perspectives regarding their greatest challenge. Ostomates at three Veterans Affairs locations were surveyed using the modified City of Hope Quality of Life-Ostomy questionnaire that contained an open-ended request for respondents to describe their greatest challenge. The response rate was 51% (239 of 467); 68% (163 of 239) completed the open-ended item. Content analysis was performed by an experienced qualitative research team. Coping and acceptance were the most commonly addressed themes. The most frequently expressed issues and advice were related to a need for positive thinking and insight regarding adjustment over time. Coping strategies included the use of humor, recognition of positive changes resulting from the stoma, and normalization of life with an ostomy. Coping and acceptance are common themes described by veterans with an intestinal stoma. Health-care providers can assist veterans by utilizing ostomate self-management strategies, experience, and advice.

  9. [Contemporary threat of influenza virus infection].

    Science.gov (United States)

    Płusa, Tadeusz

    2010-01-01

    Swine-origine H1N1 influenza virus (S-OIV) caused a great mobilization of health medical service over the world. Now it is well known that a vaccine against novel virus is expected as a key point in that battle. In the situation when recommended treatment with neuraminidase inhibitors is not sufficient to control influenza A/H1N1 viral infection the quick and precisely diagnostic procedures should be applied to save and protect our patients.

  10. Perspectives on contemporary mysticism.

    Science.gov (United States)

    Thayer, N S

    1979-07-01

    Contemporary mysticism is in continuity with religious mysticism of all ages. Mysticism, like all religion, has an ideological and an experiential dimension. Traditional Freudian theory is inadequate for understanding either the ideological or the cognitive aspect, because it does not adequately account for either the cognitive process or the self-conscious "I." Categories of both ego psychology and the social scientific approach to religion illuminate contemporary mysticism in ways unavailable to the traditional Freudian psychoanalytic approach. The epistemological implications of the mystical attitude are considered, in both the religious and the scientific enterprises.

  11. The greatest hydroelectric power plant in the world. Itaipu Hydroelectric Power Plant

    International Nuclear Information System (INIS)

    Andonov - Chento, Ilija

    2004-01-01

    Details to demonstrate the size and engineering achievements of one of the world's greatest hydroelectric power plant are given. Principal technical features of construction and operation of the Itaipu Dam are tabulated and discussed

  12. RADIOACTIVE MATERIALS SENSORS

    International Nuclear Information System (INIS)

    Mayo, Robert M.; Stephens, Daniel L.

    2009-01-01

    Providing technical means to detect, prevent, and reverse the threat of potential illicit use of radiological or nuclear materials is among the greatest challenges facing contemporary science and technology. In this short article, we provide brief description and overview of the state-of-the-art in sensor development for the detection of radioactive materials, as well as an identification of the technical needs and challenges faced by the detection community. We begin with a discussion of gamma-ray and neutron detectors and spectrometers, followed by a description of imaging sensors, active interrogation, and materials development, before closing with a brief discussion of the unique challenges posed in fielding sensor systems.

  13. Discussing Global Issues through Contemporary Art

    Science.gov (United States)

    Mead, Sarah M.; Ellerbrock, Cheryl R.; Cruz, Bárbara C.

    2017-01-01

    Contemporary global issues can be examined through the lens of modern photographic art. In an effort to prepare global-ready graduates, this article explores the pressing problems of environmental degradation, urbanization, and homelessness through the work of three contemporary artists. Illustrative works, suggested approaches, and curriculum…

  14. Additive threats from pathogens, climate and land-use change for global amphibian diversity

    DEFF Research Database (Denmark)

    Hof, Christian; Bastos Araujo, Miguel; Jetz, Walter

    2011-01-01

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change...... to be found in Africa, parts of northern South America and the Andes. Regions with the highest projected impact of land-use and climate change coincide, but there is little spatial overlap with regions highly threatened by the fungal disease. Overall, the areas harbouring the richest amphibian faunas...... and spread of the pathogenic fungal disease chytridiomycosis. Here we assess the spatial distribution and interactions of these primary threats in relation to the global distribution of amphibian species. We show that the greatest proportions of species negatively affected by climate change are projected...

  15. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  16. The National Youth Service Corps Programme and Growing Security Threat in Nigeria

    Directory of Open Access Journals (Sweden)

    Chukwuemeka Okafor

    2014-06-01

    Full Text Available The National Youth Service Corps (NYSC was established in 1973 after the Nigerian civil war to involve Nigerian university graduates below the age of thirty in nation building. Gradually, the scheme was opened-up for polytechnic graduates.  The article presents the objectives and deployment policy of the programme. It shows that the early phase of the programme recorded the problems of corruption, ghost corps members, accommodation, language barriers as well as hostile culture. However, the contemporary Nigerian society has been overtaken by the destructive wind of insecurity. The article reveals that the various waves of political violence in the country, including Boko Haram terrorism, hostage crises, and geographical threats have turned into a collection of overwhelming menace to the programme, thereby leading to massive agitation for itabrogation. The article recommends for multiple series of reforms in order to protect the lives of many Nigerian graduates that are building the nation through this admirable development programme.

  17. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  18. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  19. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  20. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  1. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  2. Spain's greatest and most recent mine disaster.

    Science.gov (United States)

    Guerrero, Flor Ma; Lozano, Macarena; Rueda-Cantuche, José M

    2008-03-01

    On 25 April 1998, the mineral waste retaining wall at the Swedish-owned pyrite mine at Aznalcóllar (Seville, Spain) burst, causing the most harmful environmental and socio-economic disaster in the history of the River Guadiamar basin. The damage was so great that the regional government decided in May 1998 to finance a comprehensive, multidisciplinary research initiative with the objective of eradicating or at least minimising all of the negative social, economic and environmental impacts. This paper utilises a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis to identify eight strategic measures aimed at providing policymakers with key guidelines on implementing a sustainable development model, in a broad sense. Empirical evidence, though, reveals that, to date, major efforts to tackle the negative impacts have centred on environmental concerns and that the socio-economic consequences have not been completely mitigated.

  3. Randomness in Contemporary Graphic Art

    OpenAIRE

    Zavřelová, Veronika

    2016-01-01

    Veronika Zavřelová Bachelor thesis Charles University in Prague, Faculty of Education, Department of Art Education Randomness in contemporary graphic art imaginative picture card game ANNOTATION This (bachelor) thesis concerns itself with a connection between verbal and visual character system within the topic of Randomness in contemporary graphic art - imaginative picture card game. The thesis is mainly based on the practical part - exclusively created card game Piktim. The card game uses as...

  4. LINK BETWEEN SUSTAINABLE DEVELOPMENT AND GLOBALIZATION OF CONTEMPORARY ECONOMY

    Directory of Open Access Journals (Sweden)

    Adriana Grigorescu

    2014-11-01

    Full Text Available Sustainable development requires a fundamental change in lifestyle. A fully break detachment by the past requires a major reorientation of public and private behavior and mentality. The challenge lies in linking economic growth with social issues and positioning the environmental degradation. The process of globalization is connected also with environmental degradation, which is now extended as a concept of threat and security, considered individually and in connection. It has already started recognizing new global threats as well as from non -state groups and individuals. The security is being defined to include, among others, the wars between and within states, international organizations of organized crime, nuclear weapons development, poverty, viral diseases, climatic events and environmental degradation. The concerns about the global market and the global environment protection will become more related, through their mutual dependency. The relationship of global economy and environment, from a market perspective, means stimulating economic growth, a process that generates higher revenues, funds and wealth, on one hand and political will to improve environmental conservation and protection, on the other hand. But it could be seen that the developed countries have made the greatest progress in environmental protection, and even so the poor quality of the environment continues to deteriorate. In this context it is important to consider the opinion of experts on the interaction between globalization and sustainable development. The paper aims to present the views of experts from the Regional Agency for Environmental Protection (South Muntenia. The study is an empirical research based on a questionnaire applied to a sample of over 300 subjects. The research aims to set out the existence of the link between sustainable development and globalization, to identify the main advantages and disadvantages of globalization and to prioritize the main

  5. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  6. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  7. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  8. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  9. Development, use and maintenance of the design basis threat. Implementing guide

    International Nuclear Information System (INIS)

    2009-01-01

    threat to those assets. As described in this publication, an understanding of the threat can lead to a detailed description of potential adversaries (the design basis threat), which, in turn, is the basis of an appropriately designed physical protection system. This direct link gives confidence that protection would be effective against an adversary attack. International experience in using a design basis threat to protect assets of high consequence is largely based on the protection of nuclear material and facilities. Furthermore, the nuclear security documents defining and recommending that physical protection be based upon the threat - The Physical Protection Objectives and Fundamental Principles (GOV/2001/41/ Attachment), the Recommendations on the Physical Protection of Nuclear Facilities and Nuclear Material (INFCIRC/225/Rev. 4 (corrected)), and the Convention on Physical Protection of Nuclear Facilities and Nuclear Material as Amended (INFCIRC/274) (adopted on 8 July 2005; (GOV/2005/57)) - do so exclusively for the protection of nuclear material and facilities. Given the historical background, and its continuing contemporary relevance, it has been necessary to draw on that nuclear protection experience in developing this publication. However, the general approach can also be applied to protecting other assets that require a high degree of confidence in the effectiveness of their protection, such as high-activity radioactive material. Specialists from France, Germany, Japan, the Russian Federation, Spain, the United Kingdom, and the United States of America assisted the IAEA in preparing this publication. A draft was presented to an open-ended technical meeting in December 2006, and subsequently circulated for comment to all Member States. This publication is consistent with The Physical Protection Objectives and Fundamental Principles; the Convention on Physical Protection of Nuclear Facilities and Nuclear Material as Amended; and the Recommendations on the

  10. Renovating the Pyramid of Needs: Contemporary Extensions Built Upon Ancient Foundations.

    Science.gov (United States)

    Kenrick, Douglas T; Griskevicius, Vladas; Neuberg, Steven L; Schaller, Mark

    2010-05-01

    Maslow's pyramid of human needs, proposed in 1943, has been one of the most cognitively contagious ideas in the behavioral sciences. Anticipating later evolutionary views of human motivation and cognition, Maslow viewed human motives as based in innate and universal predispositions. We revisit the idea of a motivational hierarchy in light of theoretical developments at the interface of evolutionary biology, anthropology, and psychology. After considering motives at three different levels of analysis, we argue that the basic foundational structure of the pyramid is worth preserving, but that it should be buttressed with a few architectural extensions. By adding a contemporary design feature, connections between fundamental motives and immediate situational threats and opportunities should be highlighted. By incorporating a classical element, these connections can be strengthened by anchoring the hierarchy of human motives more firmly in the bedrock of modern evolutionary theory. We propose a renovated hierarchy of fundamental motives that serves as both an integrative framework and a generative foundation for future empirical research. © The Author(s) 2010.

  11. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  12. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  13. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  14. Contemporary African philosophy: emergent issues and challenges ...

    African Journals Online (AJOL)

    ... all philosophies remain context-dependent and cultureoriented. A contrary view ignores the proper nature of philosophy. A new phenomenon confronts currently confronts all comers to contemporary African philosophy: an expansive vision of African philosophical discourse. Contemporary African philosophers attempt to ...

  15. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  16. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    Science.gov (United States)

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Countermeasure Availability, and Ease of Detection. Reproducibility of scoring data was assessed by examining the standard deviations (SD) of mean scores. Our results were unexpected. Several familiar biothreat diseases such as anthrax and tularemia were judged, by our experts, to be less threatening than many others owing to a number of factors including ease of detection, lack of communicability, and the ready availability of countermeasures. Conversely, several toxins were judged by experts to have very high potential as threat agents owing, in part, to their reliability, virulence, and a lack of available countermeasures. Agreement among experts, as determined by lower SD about a mean score, was greater for more familiar threats. Our study was designed to provide a concise and east-to-apply set of criteria that could be used by NATO nations to evaluate emerging infectious disease threats with respect to their weaponization potential. Our results were unexpected. We believe that a lack of appropriate weighting factors may explain these results and suggest that future studies weigh each of the 12 proposed criteria based on the intended use of the assessment data and other situational factors. We believe that the greatest value of our study lies in a codification of the attributes of a biological weapon. © Association of Military Surgeons of the United States 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  17. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  18. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  19. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  20. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  1. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  2. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  3. Hot Under the Collar: Lessons from the 2003 Heatwave in France and the Security Implications for Coping with Environmental Threats in the EU

    Directory of Open Access Journals (Sweden)

    Paul J. Stephenson

    2009-08-01

    Full Text Available In the sweltering temperatures of August 2003 there were over 15,000 fatalities in France, the majority among the elderly. The heatwave (canicule was the greatest natural catastrophe in Europe for 50 years. Political mismanagement contributed to the death toll and government initially to blame medical services. However, other politico-cultural, societal and psychological factors may have contributed to the failure to protect the most vulnerable citizens. This article identifies 20 obstacles (“pathogens” to ensuring effective response in the face of environmental or weather-related threats, distinguishing between state-institutional and individual-community barriers, most of which have a cultural dimension. These factors require greater consideration by policy-makers to improve preparedness for environmental threats in the EU. The case raises questions about crisis management and how best to reduce risk for elderly populations, illustrating the limits of the state in offering social protection through institutionalised solidarity mechanisms, and recognises calls to strengthen community-capacity.

  4. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  5. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  6. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  7. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  8. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  9. Massive the Higgs boson and the greatest hunt in science

    CERN Document Server

    Sample, Ian

    2013-01-01

    Now fully updated -- this is the dramatic and gripping account of the greatest scientific discovery of our time. In the early 1960s, three groups of physicists, working independently in different countries, stumbled upon an idea that would change physics and fuel the imagination of scientists for decades. That idea was the Higgs boson -- to find it would be to finally understand the origins of mass -- the last building block of life itself. Now, almost 50 years later, that particle has finally been discovered.

  10. Contemporary Famine Analysis

    DEFF Research Database (Denmark)

    Rubin, Olivier

    to the newer economic approaches based on Amartya Sen. While all approaches contribute with important insights on famine dynamics, they also struggle to capture the political dimension of contemporary famines. The Brief develops a political approach capable of addressing this important but messy political...

  11. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  12. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  13. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  14. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  15. Penicillin: the medicine with the greatest impact on therapeutic outcomes.

    Science.gov (United States)

    Kardos, Nelson; Demain, Arnold L

    2011-11-01

    The principal point of this paper is that the discovery of penicillin and the development of the supporting technologies in microbiology and chemical engineering leading to its commercial scale production represent it as the medicine with the greatest impact on therapeutic outcomes. Our nomination of penicillin for the top therapeutic molecule rests on two lines of evidence concerning the impact of this event: (1) the magnitude of the therapeutic outcomes resulting from the clinical application of penicillin and the subsequent widespread use of antibiotics and (2) the technologies developed for production of penicillin, including both microbial strain selection and improvement plus chemical engineering methods responsible for successful submerged fermentation production. These became the basis for production of all subsequent antibiotics in use today. These same technologies became the model for the development and production of new types of bioproducts (i.e., anticancer agents, monoclonal antibodies, and industrial enzymes). The clinical impact of penicillin was large and immediate. By ushering in the widespread clinical use of antibiotics, penicillin was responsible for enabling the control of many infectious diseases that had previously burdened mankind, with subsequent impact on global population demographics. Moreover, the large cumulative public effect of the many new antibiotics and new bioproducts that were developed and commercialized on the basis of the science and technology after penicillin demonstrates that penicillin had the greatest therapeutic impact event of all times. © Springer-Verlag 2011

  16. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  17. School Counselors: A Review of Contemporary Issues

    Science.gov (United States)

    Bain, Steve F.

    2012-01-01

    This article seeks to review the topic of school counselors and the contemporary issues surrounding this profession. An introduction to the profession and overview of its history provides a comprehensive basis on which to understand today's school counseling profession. An examination of contemporary themes of school counseling will include job…

  18. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  19. The Contemporary Consultant

    DEFF Research Database (Denmark)

    Olson, Thomas; Poulfelt, Flemming; Greiner, Larry

    This book complements The handbook of Management Consulting: The Contemporary Consultant: Insights from Leading Experts, 1e but can also be studied separately. The book consists of 20 cases including Harvard and Stanford cases. The cases present the broad range of topics that are pertinent to cur...... current management issues facing consulting firms. These cases, together with the handbook, will prepare consultants and other business managers for a successful future in a highly competitive consulting environment.......This book complements The handbook of Management Consulting: The Contemporary Consultant: Insights from Leading Experts, 1e but can also be studied separately. The book consists of 20 cases including Harvard and Stanford cases. The cases present the broad range of topics that are pertinent...... to current management consulting. Each of the four parts of the text presents a cogent introduction by the editors, delineating topics that are critical for today's consultants to understand. The cases represent major practice areas of consulting and afford new insights into change processes and other...

  20. The Force Awakens: The Individualistic and Contemporary Heroine

    Directory of Open Access Journals (Sweden)

    Payal Doctor

    2017-12-01

    Full Text Available Star Wars Episode VII: The Force Awakens is not the hero’s journey as George Lucas previously conceptualized it. Instead, the story line of The Force Awakens leads me to believe that it creates a new iteration of the hero myth. It follows the contemporary heroine’s journey while conforming to the essential construct of the hero monomyth. First, the contemporary heroine’s journey focuses primarily on the greater good and secondarily on her own personal journey, which is the converse of the traditional hero’s journey. Second, the contemporary heroine’s self is awakened and called to adventure in a different way than the traditional hero. Third, the traditional hero receives guidance on his journey, while the contemporary heroine pushes ahead alone, striving to save her society from despair.

  1. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    Science.gov (United States)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  2. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  3. CONTEMPORARY TEACHING AIDS IN TEACHING MATHEMATICS

    OpenAIRE

    Sead Rešić; Eldina Atić

    2014-01-01

    In this research, the application of contemporary teaching aids in Mathematics teaching in elementary school was analyzed from the aspect of teachers, students and parents. The application of contemporary teaching aids in Mathematics teaching was analyzed through a sample of 100 students, and attitudes about the aids were examined from the points of view of students, teachers and parents. In this research, descriptive method, questionnaire and test were used. Results of the resear...

  4. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  5. School Issues Under [Section] 504 and the ADA: The Latest and Greatest.

    Science.gov (United States)

    Aleman, Steven R.

    This paper highlights recent guidance and rulings from the Office of Civil Rights (OCR) of interest to administrators, advocates, and attorneys. It is a companion piece to Student Issues on SectionNB504/ADA: The Latest and Greatest. Compliance with SectionNB504 and the Americans with Disabilities Act (ADA) continues to involve debate and dialog on…

  6. UNLEARNED LESSONS OF CONTEMPORARY HISTORY

    Directory of Open Access Journals (Sweden)

    А Н Данилов

    2017-12-01

    Full Text Available The article considers the complex geopolitical situation in the global world at the end of the second decade of the 21st century as determined by the consequences of the collapse of the Soviet Union and by the new world order. The author seeks to answer the questions who will define the current geopolitical situation, whose aims it will reflect, what will become the basis of new geopolitical realities, the basis of moral solidarity of humankind, and the spiritual basis of future civilizations. The new challenges give rise to a desperate struggle for different scenarios for building a happy life. Moreover, it is not clear which ideal of the future world will be widely supported as a development guideline. The recognition as such of the standard of living and development of the strongest ones becomes a real threat to the new civilization for it leads to the loss of national interests of sovereign states, and to the loss of an independent future. Today, there is an active search for new theories and concepts that will adequately explain con-temporary global processes. In this thematic context, the author identifies main lessons not learned by the world political elites. The first lesson: new states are not born in an empty place, their common history is a great advantage ensuring prospects for the further development of interstate cooperation. The second lesson: the widespread falsification of history has a negative impact on national, cultural and social-group identity in transforming societies. The third lesson: after the collapse of the Soviet Union, the post-war balance of power was destroyed together with the system of checks and balances in world politics (a bipolar model of the world. The fourth lesson: under radical social transformations, the moral system of the population devaluates with numerous crisis consequences.

  7. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  8. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  9. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  10. Tradition and Renewal in Contemporary Orthodox Theology

    Directory of Open Access Journals (Sweden)

    Marios Begzos

    2014-11-01

    Full Text Available This text presents the challenges that the modern world poses for the Orthodox Church. In every historical period, the Church has struggled with internal and external problems. While preserving its traditions and historical foundations, the theology of the Orthodox Church struggles with contemporary problems by showing the current, contemporary teaching about God, man and the world.

  11. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  12. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  13. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  14. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  15. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  16. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  17. FedWeb Greatest Hits: Presenting the New Test Collection for Federated Web Search

    NARCIS (Netherlands)

    Demeester, Thomas; Trieschnigg, Rudolf Berend; Zhou, Ke; Nguyen, Dong-Phuong; Hiemstra, Djoerd

    This paper presents 'FedWeb Greatest Hits', a large new test collection for research in web information retrieval. As a combination and extension of the datasets used in the TREC Federated Web Search Track, this collection opens up new research possibilities on federated web search challenges, as

  18. Contemporary management of subtrochanteric fractures.

    Science.gov (United States)

    Joglekar, Siddharth B; Lindvall, Eric M; Martirosian, Armen

    2015-01-01

    Cephalomedullary interlocking nails that allow for trochanteric entry and minimally invasive fixation have revolutionized the contemporary management of subtrochanteric fractures with improved union rates and decreased incidence of fixation failure. The most successful alternative to intramedullary fixation remains the angled blade plate. Despite biomechanical superiority of contemporary intramedullary implants to previous intramedullary devices, the importance of achieving and maintaining satisfactory fracture reduction prior to and during hardware insertion cannot be overemphasized. In comminuted and more challenging fractures, additional techniques, such as limited open reduction with clamps and/or cables, can allow for canal restoration and more anatomic reductions prior to and/or during nail insertion. Published by Elsevier Inc.

  19. Development, Use and Maintenance of the Design Basis Threat. Implementing Guide (Arabic Edition)

    International Nuclear Information System (INIS)

    2009-01-01

    threat to those assets. As described in this publication, an understanding of the threat can lead to a detailed description of potential adversaries (the design basis threat), which, in turn, is the basis of an appropriately designed physical protection system. This direct link gives confidence that protection would be effective against an adversary attack. International experience in using a design basis threat to protect assets of high consequence is largely based on the protection of nuclear material and facilities. Furthermore, the nuclear security documents defining and recommending that physical protection be based upon the threat. The Physical Protection Objectives and Fundamental Principles, the Recommendations on the Physical Protection of Nuclear Facilities and Nuclear Material, and the Convention on Physical Protection of Nuclear Facilities and Nuclear Material as Amended - do so exclusively for the protection of nuclear material and facilities. Given the historical background, and its continuing contemporary relevance, it has been necessary to draw on that nuclear protection experience in developing this publication. However, the general approach can also be applied to protecting other assets that require a high degree of confidence in the effectiveness of their protection, such as high-activity radioactive material. Specialists from France, Germany, Japan, the Russian Federation, Spain, the United Kingdom, and the United States of America assisted the IAEA in preparing this publication. A draft was presented to an open-ended technical meeting in December 2006, and subsequently circulated for comment to all Member States. This publication is consistent with The Physical Protection Objectives and Fundamental Principles; the Convention on Physical Protection of Nuclear Facilities and Nuclear Material as Amended; and the Recommendations on the Physical Protection of Nuclear Facilities and Nuclear Material.

  20. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  1. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  2. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  3. The greatest challenges reported by long-term colorectal cancer survivors with stomas.

    Science.gov (United States)

    McMullen, Carmit K; Hornbrook, Mark C; Grant, Marcia; Baldwin, Carol M; Wendel, Christopher S; Mohler, M Jane; Altschuler, Andrea; Ramirez, Michelle; Krouse, Robert S

    2008-04-01

    This paper presents a qualitative analysis of the greatest challenges reported by long-term colorectal cancer survivors with ostomies. Surveys that included an open-ended question about challenges of living with an ostomy were administered at three Kaiser Permanente regions: Northern California, Northwest, and Hawaii. The study was coordinated at the Southern Arizona Veterans Affairs Health Care System in Tucson. The City of Hope Quality of Life Model for Ostomy Patients provided a framework for the study's design, measures, data collection, and data analysis. The study's findings may be generalized broadly to community settings across the United States. Results replicate those of previous research among veterans, California members of the United Ostomy Association, Koreans with ostomies, and colorectal cancer survivors with ostomies residing in the United Kingdom. The greatest challenges reported by 178 colorectal cancer survivors with ostomies confirmed the Institute of Medicine's findings that survivorship is a distinct, chronic phase of cancer care and that cancer's effects are broad and pervasive. The challenges reported by study participants should inform the design, testing and integration of targeted education, early interventions, and ongoing support services for colorectal cancer patients with ostomies.

  4. Contemporary models of the atomic nucleus

    CERN Document Server

    Nemirovskii, P E

    2013-01-01

    Contemporary Models of the Atomic Nucleus discusses nuclear structure and properties, expounding contemporary theoretical concepts of the low-energy nuclear processes underlying in nuclear models. This book focuses on subjects such as the optical nuclear model, unified or collective model, and deuteron stripping reaction. Other topics discussed include the basic nuclear properties; shell model; theoretical analysis of the shell model; and radiative transitions and alpha-decay. The deuteron theory and the liquid drop nuclear model with its application to fission theory are also mentioned, but o

  5. New sounds, new stories : narrativity in contemporary music

    NARCIS (Netherlands)

    Meelberg, Vincent

    2006-01-01

    In this dissertation, I study the relation between narrativity and contemporary composed music. The purpose of this study is twofold. Firstly, in so doing, I am able to articulate what musical narrativity is in a precise manner. Since many contemporary musical works question or problematize the

  6. The Economic Situation in Contemporary Africa: Comment on ...

    African Journals Online (AJOL)

    The Economic Situation in Contemporary Africa: Comment on Questions Posed by Lansana Keita. P Bond, DM Dembele. Abstract. The economic situation in contemporary Africa is highly problematic, creating populations that are in general much discontented with matters as they now stand. Africa's populations are now ...

  7. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  8. Contemporary Occupational Carcinogen Exposure and Bladder Cancer: A Systematic Review and Meta-analysis.

    Science.gov (United States)

    Cumberbatch, Marcus G K; Cox, Angela; Teare, Dawn; Catto, James W F

    2015-12-01

    Bladder cancer (BC) is a common disease. Despite manufacturing and legislative changes to workplace hygiene, many BCs still arise through occupational carcinogen exposure. To profile contemporary risks of occupational BC. A systematic review using PubMed, Medline, Embase, and Web of Science was performed in October 2012 (initial review) and May 2014 (final review) and was updated in June 2015. We identified 263 eligible articles. We excluded reports in which BC or occupation were not the main focus, and those with insufficient case, risk, or confidence interval data. We selected the most recent data from populations with multiple reports. Reports were selected by 2 of us independently. We combined odds ratios and risk ratios (RRs) to provide pooled RRs, using maximally adjusted RRs in a random effects model. Heterogeneity and publication bias were assessed using I2 and Begg and Egger tests. Risk estimates were annotated by occupational class using Nordisk Yrkesklassificering, or Nordic Occupational Classification, and International Standard Classifications of Occupations (NYK and ISCO-1958) Codes. Occupations were profiled by BC incidence and mortality risk over time. After data collection, we detected a sex difference in these profiles and recorded this as a secondary outcome. Meta-analysis revealed increased BC incidence in 42 of 61 occupational classes and increased BC-specific mortality in 16 of 40 occupational classes. Reduced incidence and mortality were seen in 6 of 61 and 2 of 40 classes, respectively. Risk varied with sex and was greatest in men (standardized incidence ratio, 1.03 [95% CI, 1.02-1.03]; P men and 1.27 (95% CI, 1.12-1.43) for women. In contrast, mortality risk declined for both sexes from the 1960s to the 1990s. The overall risk of BC mortality was also greater for men (standardized mortality ratio [SMR], 1.32 [95% CI, 1.18-1.48]) than for women (SMR, 1.14 [95% CI, 0.80-1.63]). Limitations include possible publication bias, that reports

  9. Using expert opinion surveys to rank threats to endangered species: a case study with sea turtles.

    Science.gov (United States)

    Donlan, C Josh; Wingfield, Dana K; Crowder, Larry B; Wilcox, Chris

    2010-12-01

    Little is known about how specific anthropogenic hazards affect the biology of organisms. Quantifying the effect of regional hazards is particularly challenging for species such as sea turtles because they are migratory, difficult to study, long lived, and face multiple anthropogenic threats. Expert elicitation, a technique used to synthesize opinions of experts while assessing uncertainty around those views, has been in use for several decades in the social science and risk assessment sectors. We conducted an internet-based survey to quantify expert opinion on the relative magnitude of anthropogenic hazards to sea turtle populations at the regional level. Fisheries bycatch and coastal development were most often ranked as the top hazards to sea turtle species in a geographic region. Nest predation and direct take followed as the second and third greatest threats, respectively. Survey results suggest most experts believe sea turtles are threatened by multiple factors, including substantial at-sea threats such as fisheries bycatch. Resources invested by the sea turtle community, however, appear biased toward terrestrial-based impacts. Results from the survey are useful for conservation planning because they provide estimates of relative impacts of hazards on sea turtles and a measure of consensus on the magnitude of those impacts among researchers and practitioners. Our survey results also revealed patterns of expert bias, which we controlled for in our analysis. Respondents with no experience with respect to a sea turtle species tended to rank hazards affecting that sea turtle species higher than respondents with experience. A more-striking pattern was with hazard-based expertise: the more experience a respondent had with a specific hazard, the higher the respondent scored the impact of that hazard on sea turtle populations. Bias-controlled expert opinion surveys focused on threatened species and their hazards can help guide and expedite species recovery plans.

  10. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  11. Contemporary management of frontal sinus mucoceles: a meta-analysis.

    Science.gov (United States)

    Courson, Andy M; Stankiewicz, James A; Lal, Devyani

    2014-02-01

    To analyze trends in the surgical management of frontal and fronto-ethmoid mucoceles through meta-analysis. Meta-analysis and case series. A systematic literature review on surgical management of frontal and fronto-ethmoid mucoceles was conducted. Studies were divided into historical (1975-2001) and contemporary (2002-2012) groups. A meta-analysis of these studies was performed. The historical and contemporary cohorts were compared (surgical approach, recurrence, and complications). To study evolution in surgical management, a senior surgeon's experience over 28 years was analyzed separately. Thirty-one studies were included for meta-analysis. The historical cohort included 425 mucoceles from 11 studies. The contemporary cohort included 542 mucoceles from 20 studies. More endoscopic techniques were used in the contemporary versus historical cohort (53.9% vs. 24.7%; P = contemporary). In the historical cohort, higher recurrence was noted in the external group (P = 0.03). Results from endoscopic and open approaches are comparable. Although endoscopic techniques are being increasingly adopted, comparison with our series shows that more cases could potentially be treated endoscopically. Frequent use of open approaches may reflect efficacy, or perhaps lack of expertise and equipment required for endoscopic management. Most contemporary authors favor endoscopic management, limiting open approaches for specific indications (unfavorable anatomy, lateral disease, and scarring). N/A. Copyright © 2013 The American Laryngological, Rhinological and Otological Society, Inc.

  12. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  13. The Traditional in Contemporary Curricula of Preschool Education

    Directory of Open Access Journals (Sweden)

    Kopas-Vukašinović Emina

    2016-02-01

    Full Text Available Contemporary curricula of preschool education are the result of the improvement of pedagogical and didactic theories. They imply a technical plan with which it is possible to achieve measurable objectives of preschool education. The curriculum is also defined as a tool for quality and equal education for all. It represents a reflection of the time, society and culture in which it exists, but also a model for future society and education. Thus an important research question arises as to what extent we recognize traditional ideas about learning and the development of a preschool child in contemporary preschool programs. Are traditional ideas about educating young children unjustly neglected or do we recognize them in contemporary pedagogical theory even today, at the same time forgetting about the past and declaring them innovations? This paper deals with the starting points for the development of a curriculum. The goal of the research was to determine to what extent can the starting points for the development of preschool children, which have existed in the first preschool programs in Serbia in the late 19th century, be recognized in contemporary preschool programs. A descriptive method was applied as well as a procedure for content analysis of program documents. Research results confirm that the elements of the first preschool programs, which remain relevant until today, can be recognized in contemporary preschool programs. They are related to target orientations, principles and functions of preschool education. However, these ideas are defined as contemporary tendencies, and the fact that they existed in preschool programs that were developed a long time ago is unjustly ignored.

  14. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  15. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  16. Teen Artists: Impact of a Contemporary Art Museum

    Science.gov (United States)

    Erickson, Mary; Hales, Laura

    2014-01-01

    This study describes the effects of a yearlong, multivisit teen program in a contemporary art museum on adolescents' reflections about art. Our purpose was to discover whether this program, focused on experiences with contemporary art and artists with its metacognitive approach, affected students' thinking about their own artmaking. The…

  17. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  18. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  19. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  20. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  1. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  2. Sociological analysis of contemporary Turkish political elites

    OpenAIRE

    D. Ali Arslan

    2007-01-01

    This study was designed to find general characteristics of Contemporary Turkish political Elites since 1995 up to date. Social background characteristics were employed to realise the purposes. Documentary and historical research techniques were used during the study. As a result of examining the Contemporary Turkish political elites (since 1995 up to 2005) these major findings were discovered: the large majority of the Turkish parliamentary elites were well educated, male, middle aged, marrie...

  3. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  4. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  5. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  6. Metaphors in the Wisdom Literature of the Hebrew Bible and Contemporary Art

    Directory of Open Access Journals (Sweden)

    Bálint Károly Zabán

    2016-08-01

    Full Text Available Biblical wisdom literature is a treasure-trove of powerful metaphors. This article presents a sample of these metaphors and their significant impact on contemporary artwork. The impact is characterized by both appropriation and adaptation, similitude and analogy, respectively. The highlighted metaphors are not merely catalogued but, more or less, analyzed with regard to relevant contemporary artwork. This augments the importance of contemporary biblical literacy analysis and uses it as one of the tools by which it is possible to gauge the impact and interaction, in this case, of the metaphor-world of the wisdom tradition on contemporary art. More importantly, however, this study underscores the relevance of these metaphors for biblical exegesis, hermeneutics, and theology. The analysis of the reception of these metaphors in contemporary artworks undergirds and informs the process of interpretation. The reception of these metaphors in their contemporary art contexts is best understood within the framework of imagery and imagistic language. Metaphor, as a subset of imagery and imagistic language, is foundational for the examined wisdom books, Proverbs, Job, and Qoheleth, and for the relevant contemporary artwork, alike. Moreover, metaphor also constitutes a bridge between the ancient and contemporary context. With this backdrop in mind, this article argues for the necessity of exploring the connections between these wisdom books, metaphor studies, and contemporary artwork.

  7. Masses of galaxies and the greatest redshifts of quasars

    Energy Technology Data Exchange (ETDEWEB)

    Hills, J G [Illinois Univ., Urbana (USA)

    1977-04-01

    The outer parts of a typical galaxy follows an R/sup -2/ density distribution which results in the collapse time of its protogalaxy being proportional to its mass. Since quasars probably occur in the nuclei of galaxies which can only form after the collapse of their parent galaxies, their greatest observed redshift, Zsub(max), is largely determined by the mass, Msub(t), of a typical protogalaxy. The observed Zsub(max) of quasars indicates that Msub(t) = 1 x 10/sup 12/ solar masses. This mass is consistent with the masses of galaxies found in recent dynamical studies. It indicates that most of the mass in a typical galaxy is in the halo lying beyond the familiar optically-bright core, but the mass of a standard galaxy is still only 0.3 of that required for galaxies alone to close the universe.

  8. Book Review: Instagram and contemporary image, Lev Manovich

    Directory of Open Access Journals (Sweden)

    Carla Barrio Romera

    2018-05-01

    Full Text Available Book Review: Instagram and contemporary image, Lev Manovich, California Institute for Telecommunication and Information & The Graduate Center, City University of New York (CUNY, Cultural Analytics Lab, 2017, http://manovich.net/index.php/projects/instagram-and-contemporary-image, Attribution-NonCommercial-NoDerivatives 4.0 International Creative Commons license, 148 págs.

  9. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  10. Heutiges Russisch (Contemporary Russian)

    Science.gov (United States)

    Russisch, 1976

    1976-01-01

    For the purpose of supplying information on actual contemporary Russian usage, this article excerpts sections on noun usage and variations of the genitive ending in the masculine singular from "Stilistik der russischen Sprache" (Russian Language Style) by D. Rosental and M. Telenkowa. (Text is in German.) (FB)

  11. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  12. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  13. The Dead Walk

    Directory of Open Access Journals (Sweden)

    Bill Phillips

    2014-02-01

    Full Text Available Monsters have always enjoyed a significant presence in the human imagination, and religion was instrumental in replacing the physical horror they engendered with that of a moral threat. Zombies, however, are amoral – their motivation purely instinctive and arbitrary, yet they are, perhaps, the most loathed of all contemporary monsters. One explanation for this lies in the theory of the uncanny valley, proposed by robotics engineer Masahiro Mori. According to the theory, we reserve our greatest fears for those things which seem most human, yet are not – such as dead bodies. Such a reaction is most likely a survival mechanism to protect us from danger and disease – a mechanism even more essential when the dead rise up and walk. From their beginnings zombies have reflected western societies’ greatest fears – be they of revolutionary Haitians, women, or communists. In recent years the rise in the popularity of the zombie in films, books and television series reflects our fears for the planet, the economy, and of death itself

  14. Contemporary cryptography

    CERN Document Server

    Oppliger, Rolf

    2011-01-01

    Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you an in-depth understanding of essential tools and applications to help you with your daily work. The second edition has been reorganized and expanded, providing mathematical fundamentals and important cryptography principles in the appropriate appendixes, rather than summarize

  15. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  16. Contemporary management of pericardial diseases.

    Science.gov (United States)

    Imazio, Massimo

    2012-05-01

    Pericardial diseases are relatively common in clinical practice, either as isolated disease or as manifestation of a systemic disorder. The aim of the present study is to review more recent updates on their contemporary management. The cause of pericardial diseases is varied according to the epidemiologic background, patient population, and clinical setting. Most cases remain idiopathic, and empiric anti-inflammatory therapy should be considered as first-line therapy in most cases with the possible adjunct of colchicine in the setting of inflammatory pericardial diseases, especially relapsing or not responding to first-line drugs. A triage has been proposed to select high-risk cases requiring admission and specific cause search. The prognosis of pericardial diseases is essentially determined by the cause. The most feared complication is constriction, the risk of which is higher in bacterial forms, intermediate for postpericardiotomy syndromes and systemic inflammatory diseases, low for viral and idiopathic cases. Chronic constriction has a definite surgical therapy, whereas transient cases should be recognized and may be reversible with empirical anti-inflammatory therapy. Contemporary management of pericardial diseases is largely empirical, although first clinical trials and new studies on diagnostic modalities and prognosis of pericardial diseases are bringing the contemporary management of pericardial diseases along a more evidence-based road. Integrated cardiovascular imaging is required for optimal management of the patient with suspected pericardial disease.

  17. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  18. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  19. Contemporary theories of democracy

    Directory of Open Access Journals (Sweden)

    Mladenović Ivan

    2008-01-01

    Full Text Available The aim of this paper is two-fold: first, to analyze several contemporary theories of democracy, and secondly, to propose a theoretical framework for further investigations based on analyzed theories. The following four theories will be analyzed: pluralism, social choice theory, deliberative democracy and participatory democracy.

  20. PHYSIQUE AND BODY COMPOSITION OF GIRLS PRACTISING CONTEMPORARY DANCE

    Directory of Open Access Journals (Sweden)

    Przednowek Karolina H.

    2017-09-01

    Full Text Available Introduction. Physique and body composition are often explored in sport-related research. This is due to the fact that morphological features can be useful for determining a person’s predispositions for practising a given type of physical activity. Dance, as any other sports discipline, has an impact on the physique and motor skills of those who practise it. Most research concerning the physique and body composition of dancers conducted so far has focused on persons practising ballet or competitive ballroom dancing. Investigating these issues in contemporary dancers is a new field of study. The aim of the current study was to examine the physique and body composition of girls aged 14-17 years practising contemporary dance. Material and methods. The study involved 23 girls who trained contemporary dance twice a week for 2 hours. The participants of the study had been training since the age of six. Basic anthropometric measurements were performed. Body composition was analysed based on parameters measured using a Tanita body composition analyser. Conclusions. The analysis found that girls training contemporary dance were characterised by a leptosomatic physique. BMI values in both younger and older contemporary dancers indicated that their weight was normal. Compared to girls who did not practise any particular type of sport, contemporary dancers had a lower weight, a lower body water percentage, and a lower body fat percentage. The dancers were also characterised by a greater circumference of the waist, hips, arm, and chest compared to untrained peers.

  1. Abusing text in the Roman and contemporary worlds

    Directory of Open Access Journals (Sweden)

    Francesca Middleton

    2016-03-01

    Full Text Available In this comparison of portraits of authorial anxiety, I focus on contemporary attitudes to fan fiction and on discussions of authors in Imperial Rome (notably Galen and Martial to consider the assumptions of textuality that frame imagined textual abuse. Revealed are parallel discourses for different concerns—for the reader as a potentially ill-educated consumer and the text as an object in the ancient world; in the contemporary world, for the author's personal violation and the text as an agent within readerly experience. I discuss how fan fiction's lack of commercial publication is used to distinguish it from other contemporary literature within this framework. Fan fiction's noncommercial publication can thus be appreciated as a marginalizing act in itself.

  2. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  3. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  4. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  5. The Institute for Southern Contemporary Art (ISCA

    Directory of Open Access Journals (Sweden)

    João Enxuto

    2016-12-01

    Full Text Available João Enxuto and Erica Love are artists and writers living in New York City. Their writing has appeared in Art in America, Mousse Contemporary Art Magazine, Wired, and X-TRA Contemporary Art Quarterly. They have given talks and exhibited work at the Centre Pompidou, Whitney Museum of Art, the New Museum, Anthology Film Archives, Walker Art Center, Yossi Milo Gallery, Carriage Trade, Louisiana Museum in Denmark, ArtCenter/South Florida, and the Tamayo Museum in Mexico City.

  6. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  7. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  8. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  9. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  10. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  11. Neoliberalism as the "Connective Tissue" of Contemporary Capitalism

    Directory of Open Access Journals (Sweden)

    Giulio Moini

    2016-09-01

    Full Text Available What can we understand better about contemporary economic, social, political and cultural processes using the category of neoliberalism? What can it add to an understanding of the present existing forms of social organization? The article tries to answer these main questions in theoretical terms considering the arguments of those who claim to have stopped using the concept and of those who, on the contrary, sus-tain its theoretical value. Neoliberalism is considered as the "connective tissue" of contemporary capitalism, which is able to shape historically significant links between processes, ideas and practices re-garding not only different sub-social systems (political, economic, cultural, etc., but also diverse scales of action (from global to local scale and vice versa. For this "ontological" reason the concept of neoliberalism seems to show an epistemological relevance, which rests on the capacity of this concept to disclose the interconnections not only between different phenomena, but also between each of them and a more general fabric of contemporary society. This regards especially functional relationships between the ontic and ontological dimensions of neoliberalism and contemporary capitalism. For this purpose the concept of neoliberalism as a "connective tissue" shows potential analytical advantages

  12. Nigerian values and contemporary popular music: a new look ...

    African Journals Online (AJOL)

    Log in or Register to get access to full text downloads. ... Nigerian contemporary pop music is playing an increasingly pivotal role in shaping the continent's music ... Keywords: Nigerian values, Music industry, Contemporary popular music, Youths and society. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  13. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  14. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  15. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  16. The future historian: Reflections on the archives of contemporary sciences.

    Science.gov (United States)

    de Chadarevian, Soraya

    2016-02-01

    Historians working on recent science work close to where the archives are created or become accessible. Based on this experience, the essay presents a reflection on the archives of contemporary life sciences. It addresses three questions: firstly, what is special about the archival situation of contemporary sciences? Secondly, which sources do contemporary historians use and what opportunities and challenges do they offer? And finally, what potential changes to the archives of contemporary sciences are we witnessing? The essay draws a distinction between, on the one side, the history of science when the actors are still alive-a situation that presents a particular set of issues in respect to the available sources-and, on the other side, questions relating specifically to the life sciences at the turn of the millennium--a period which will eventually not be considered as 'contemporary' any more. It reviews changes in scientific practice, historiographical trends and archival practices and considers the place of paper records, digital sources, material artefacts and oral sources in the archives of contemporary sciences. It argues that the commercialisation and privatisation of science may prove a bigger problem for the future historian than the shift to the digital medium. It concludes by welcoming the closer interactions between scientists, historians, curators and archivists prompted by recent developments. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  18. Contemporary Journal of African Studies

    African Journals Online (AJOL)

    Contemporary Journal of African Studies. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 3, No 1 (2015) >. Log in or Register to get access to full text downloads.

  19. The problem of language in contemporary African philosophy: some ...

    African Journals Online (AJOL)

    A critical discussion of the contentious problem of language in contemporary African philosophy is attempted in this paper. The problem centres on whether or not African languages can be used in 'doing' contemporary African philosophy, where 'doing' means teaching, writing and researching. It also revolves around the ...

  20. Morality and exchange in the Mumbai contemporary art world

    NARCIS (Netherlands)

    Sooudi, O.K.; Velthuis, O.; Baia Curioni, S.

    2015-01-01

    The Indian contemporary art market developed dramatically over the 1990s and 2000s. More buyers and increased prices for, as well as new attention on, Indian contemporary art, both domestically and abroad, also entailed the maturation of local art scenes, especially in Mumbai and Delhi, as new

  1. The Contemporary Women's Movement and Women's Education in India.

    Science.gov (United States)

    Patel, Ila

    1998-01-01

    Examines how the contemporary women's movement in India (1975-present) has addressed the issue of women's education. Highlights contributions of the 19th-century social-reformist movement and the nationalist movement. Details the role of the contemporary women's movement in redefining knowledge and the curriculum. Concludes with challenges facing…

  2. Constructing the contemporary via digital cultural heritage

    DEFF Research Database (Denmark)

    Andreasen, Torsten Arni Caleb

    2015-01-01

    The present article questions the construction of 'the contemporary' in digital cultural heritage archives as specific strategic articulations between past and present with regard to the future. A historical exploration of the discourse of cultural heritage presents three strategic axes supposedly...... the possibility of ascribing inherent epistemological, existential, empirical and geopolitical force to a given technological archival order. - See more at: http://twentyfour.fibreculturejournal.org/2015/06/04/fcj-174-constructing-the-contemporary-via-digital-cultural-heritage/#sthash.sNhW8uuA.dpuf...

  3. New Uses of Traditional Healing in Contemporary Irish Literature

    Directory of Open Access Journals (Sweden)

    Patricia A. Lynch

    2013-03-01

    Full Text Available This is a comparative study in two ways.  After a summary of the historical and cultural research into traditional healing which is relevant to this article, then some comments about the general usage of such themes in contemporary Irish literature, the article moves on to examine the role and function of traditional healing as a motif in four specific literary texts.  These are: two Irish plays, Brian Friel’s Faith Healer, and Jim Nolan’s Blackwater Angel, and two pieces of Irish fiction, P.J. Curtis’ novel The Lightning Tree and Claire Keegan’s short story “The Night of the Quicken Trees”.  Strong similarities are found on many fronts between the texts, especially in the acceptance of healing and the mystery associated with it.  However, differences also occur, depending on the artistic choices of the authors, the gender and community emphasis used, and the relative importance of healing in the context of the work.  Women healers seem to be more rooted and less tragic than their male counterparts, but all healers are seen paradoxically as both an asset and a potential threat to society. When these texts are compared with research into historical and cultural aspects of Irish folk medicine, they clearly draw on tradition for their plot elements, but only in the fiction and plays can the full dramatic potential of these life and death situations be explored.

  4. Issues and Problems in Malaysian Contemporary Visual Arts

    Directory of Open Access Journals (Sweden)

    Mohamad Faizuan Mat

    2016-06-01

    Full Text Available In Malaysia, there is a question in term of intellectualism activities in the context of visual epistemology. Therefore, this paper revealed the problems that linger in the Malaysian contemporary visual art scene. In fact, Malaysian contemporary artists appear to have insufficient intellectualism values and less discourse activities. The lacks of scholars in the field of visual arts create a gap in the visual arts scene in Malaysia. The question of this study was to uncover the main problems in Malaysian visual arts that led to the problem of art intellectual development. In addition, this paper presents the awareness of the valuable contributions in the intellectual development that able to enhance the communication in the art object.Keywords: art knowledge; art object; contemporary art; interpretation; perception;

  5. Organisational culture: A contemporary management perspective

    Directory of Open Access Journals (Sweden)

    Richard Weeks

    2010-12-01

    Full Text Available Purpose: The purpose of this paper is to analyse the concept "organisational culture from a traditional and a more contemporary management perspective. Problem investigated: The concept organizational culture has assumed a very prominent place within the management literature and has been analysed from diverse multidisciplinary perspectives. Central to the importance attributed to the concept is the fact that it acts as a perceptual and behavioural determinant, which implies that it will have a significant impact on all human related institutional activities and thus the interest in the concept and its management. Researchers and management practitioners have come to assume that while the concept is difficult to manage in practice, it is possible to determine the prevailing culture of an institution, identify what is termed to be a desired culture for an institution and then analyse the cultural gap that exists. Based on the analysis conducted, it is further frequently assumed that the transition from the prevailing to a desired culture can be managed. A more contemporary management perspective, based on complexity theory, would appear to challenge the assumption of being able to actively manage the organisation's culture transformation process to ensure that a desired culture is manifest within the institution. The traditional and more contemporary approaches for dealing with the concept "organisational culture" are the focus of discussion and analysis in this paper. Methodology: A multidisciplinary literature review and analysis is undertaken to gain an insight of traditional and contemporary management theory and practice, as it relates to the concept "organisational culture" and its management. Findings: An important conclusion drawn from the study is that traditional paradigms of organisational culture management, that evolved within a more mechanistic manufacturing economy, is no longer effective for dealing with the unpredictable and

  6. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  7. The usage of African languages in three selected contemporary ...

    African Journals Online (AJOL)

    The word 'contemporary' refers to approximately the last ten years and 'German' to novels written in the German language, i.e. novels from Switzerland (for example) are also included. The nature, quantity and function of utterances from three selected contemporary German novels will be presented, in order to show how ...

  8. Contemporary Methods of Social Introduction: Is the Stigmatisation justified?

    Directory of Open Access Journals (Sweden)

    Lisa M. Steffek

    2009-12-01

    Full Text Available Historically, individuals in search of a romantic partner have expanded their pool of alternatives by meeting others through their personal social networks. In the last few decades, however, a growing singles population, coupled with advances in technology, has promoted the utilisation and modernization of contemporary marriage market intermediaries (MMIs, including online dating sites, social networking sites, and professional matchmaking services. Importantly, these contemporary MMIs depart from more normative methods for meeting others, making their use ripe for social stigmatization, as evidenced by myriad portrayals in the popular media. The purpose of the present research was to provide an empirical exploration of the validity of the layperson stigma towards users of contemporary MMIs by assessing the extent to which users and nonusers of these various services differ on key individual characteristics relevant to relationship initiation and progression. Specifically, we surveyed 96 individuals, all of whom were attending a singles‘ happy hour, and compared users and nonusers of contemporary MMIs on several important characteristics. Although users reported going on more dates and perceived greater attractiveness in others at the event, no differences were observed in personality (i.e., the Big 5 or adult attachment classification (i.e., secure vs. insecure. Altogether, our findings suggest that users of contemporary MMIs are not socially undesirable people (or at least any more undesirable than nonusers.

  9. THE THEORY OF CIVILIZATIONS THROUGH THE LENS OF CONTEMPORARY HUMANITIES

    Directory of Open Access Journals (Sweden)

    T. V. Danylova

    2016-06-01

    Full Text Available Purpose. This paper invites reflections on the further development of civilizational theory through the lens of contemporary humanities. It argues that philosophy is one of the key dimensions of the integral theory of civilizations. The purpose is to promote dialogue-rich interdisciplinary civilizational approach with philosophical understanding of human essence at its core. Methodology. The author has used comparative historical analysis, along with hermeneutical methodology and interdisciplinary approach. Theoretical basis and results. Faced with the challenges of our time, researchers are turning to the civilizational approach, according to which world history appears to us as a colourful spectrum of the options for the development of humanity. At the present stage of scientific development the integral theory of civilizations seems to be the most productive tool for the interpretation of the events taking place in our world. Origianlity. The problem of human being is a key factor in understanding the dynamics of civilizational process and designing a promising theory of civilizations. Philosophy should occupy an important place in the development of a new theory of civilizations: philosophy is the spiritual quintessence of every epoch, every cultural and civilizational community. In particular, a new theory has to take into account both classic and contemporary investigations in the field of philosophical anthropology and theory of values. The increasing threat posed by the clash of civilizations can become a swan song of humanity. For the preservation and further development of the world civilization, there is no other choice but to elaborate the strategies, mechanisms for consultation and dialogue, cooperation and partnership of civilizations and states. That is why the urgent task is to create the certain philosophical position that will contribute to mutual understanding. Conclusions. It is important to involve philosophers in the

  10. “IDENTITY” IN CONTEMPORARY SOCIOLOGICAL THEORY

    Directory of Open Access Journals (Sweden)

    N. L. Polyakova

    2016-01-01

    Full Text Available The problem of identity has come to the fore of contemporary societies in the conditions when the institutional structures of these societies their ascriptive statuses have become looser when modernity is “liquid”, “soft”. Varions conceptualizations of identity are becoming a basic part of contemporary sociological theory. The paper aims to reveal the key problems that sociology faces when striving to work out a theory of identity. The paper takes as its starting point the classic notion of identity. This notion was shaped by Erik Erikson on the basis of his dynamic psychology. The paper proves that the contemporary identity is connected with the process of individualization in modern societies. Numerous and varied studies of contemporary identity can be divided into three large groups according to three methodological approaches: constructivist, postmodern and interactionist. The paper compares the major theories based on these approaches and reveals their theoretical and methodological problems. The paper shows that the constructivist approach is based on the notion of reflexivity which is viewed as a mechanism of identity formation by an individual. Identity is a reflexive project which is being realized in a conscious manner. The postmodern theories of identity reveal the fragmentation incompleteness of ego-identitity and it’s narcissic decay. They also reveal the inability of the individual to solve the problem of continuity and unity of her (his own personality. Identity as a notion is replaced by the notion of identification which reduces identity to varions modes of repsentation. The interactionist methodology conld open up the way to tackle, the problem of individual’s unity and continuity as the main problem of human existence. This is the condition of the individual’s psychic and social health. 

  11. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  12. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  13. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  14. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  15. Implementation of Traditional Malay Design Values in Contemporary Malay Houses

    Directory of Open Access Journals (Sweden)

    Elham Hosseini

    2016-05-01

    Full Text Available Traditional houses are the most essential architectural experience that is in harmony with the people's culture, beliefs, environment and lifestyles. The development of design values in contemporary architecture by tracking traditional design values in architecture paves the way for arguments concerning the implementation of authentic Malay traditional house design values in contemporary Malay houses. In addition, it is hypothesized that the Malay traditional houses theoretically provide a constructive innovative framework for the design performance of the contemporary Malay house. In this research, data was compiled through field observation and documentary review. The evidence revealed that Malay traditional houses convey a concrete message of richness encompassing architectural design values and theoretical propositions. The credibility of the results was improved and confirmed by a confluence of evidence via a confirmation process. The findings suggested that there is a rich source of subjective support, lending proof to the premise of the research investigation. The research has highlighted the significance of traditional architectural design values towards innovative design in the architecture of contemporary Malay houses as a workable pattern for use in the design of contemporary architecture.

  16. Contemporary Trends in Radiation Oncology Resident Research

    International Nuclear Information System (INIS)

    Verma, Vivek; Burt, Lindsay; Gimotty, Phyllis A.; Ojerholm, Eric

    2016-01-01

    Purpose: To test the hypothesis that recent resident research productivity might be different than a decade ago, and to provide contemporary information about resident scholarly activity. Methods and Materials: We compiled a list of radiation oncology residents from the 2 most recent graduating classes (June 2014 and 2015) using the Association of Residents in Radiation Oncology annual directories. We queried the PubMed database for each resident's first-authored publications from postgraduate years (PGY) 2 through 5, plus a 3-month period after residency completion. We abstracted corresponding historical data for 2002 to 2007 from the benchmark publication by Morgan and colleagues (Int J Radiat Oncol Biol Phys 2009;74:1567-1572). We tested the null hypothesis that these 2 samples had the same distribution for number of publications using the Wilcoxon rank-sum test. We explored the association of demographic factors and publication number using multivariable zero-inflated Poisson regression. Results: There were 334 residents publishing 659 eligible first-author publications during residency (range 0-17; interquartile range 0-3; mean 2.0; median 1). The contemporary and historical distributions were significantly different (P<.001); contemporary publication rates were higher. Publications accrued late in residency (27% in PGY-4, 59% in PGY-5), and most were original research (75%). In the historical cohort, half of all articles were published in 3 journals; in contrast, the top half of contemporary publications were spread over 10 journals—most commonly International Journal of Radiation Oncology • Biology • Physics (17%), Practical Radiation Oncology (7%), and Radiation Oncology (4%). Male gender, non-PhD status, and larger residency size were associated with higher number of publications in the multivariable analysis. Conclusion: We observed an increase in first-author publications during training compared with historical data from the mid-2000s. These

  17. Contemporary Trends in Radiation Oncology Resident Research

    Energy Technology Data Exchange (ETDEWEB)

    Verma, Vivek [Department of Radiation Oncology, University of Nebraska, Omaha, Nebraska (United States); Burt, Lindsay [Department of Radiation Oncology, University of Utah, Salt Lake City, Utah (United States); Gimotty, Phyllis A. [Department of Biostatistics and Epidemiology, University of Pennsylvania, Philadelphia, Pennsylvania (United States); Ojerholm, Eric, E-mail: eric.ojerholm@uphs.upenn.edu [Department of Radiation Oncology, University of Pennsylvania, Philadelphia, Pennsylvania (United States)

    2016-11-15

    Purpose: To test the hypothesis that recent resident research productivity might be different than a decade ago, and to provide contemporary information about resident scholarly activity. Methods and Materials: We compiled a list of radiation oncology residents from the 2 most recent graduating classes (June 2014 and 2015) using the Association of Residents in Radiation Oncology annual directories. We queried the PubMed database for each resident's first-authored publications from postgraduate years (PGY) 2 through 5, plus a 3-month period after residency completion. We abstracted corresponding historical data for 2002 to 2007 from the benchmark publication by Morgan and colleagues (Int J Radiat Oncol Biol Phys 2009;74:1567-1572). We tested the null hypothesis that these 2 samples had the same distribution for number of publications using the Wilcoxon rank-sum test. We explored the association of demographic factors and publication number using multivariable zero-inflated Poisson regression. Results: There were 334 residents publishing 659 eligible first-author publications during residency (range 0-17; interquartile range 0-3; mean 2.0; median 1). The contemporary and historical distributions were significantly different (P<.001); contemporary publication rates were higher. Publications accrued late in residency (27% in PGY-4, 59% in PGY-5), and most were original research (75%). In the historical cohort, half of all articles were published in 3 journals; in contrast, the top half of contemporary publications were spread over 10 journals—most commonly International Journal of Radiation Oncology • Biology • Physics (17%), Practical Radiation Oncology (7%), and Radiation Oncology (4%). Male gender, non-PhD status, and larger residency size were associated with higher number of publications in the multivariable analysis. Conclusion: We observed an increase in first-author publications during training compared with historical data from the mid-2000s. These

  18. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  19. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  20. Asymptotics for the greatest zeros of solutions of a particular O.D.E.

    Directory of Open Access Journals (Sweden)

    Silvia Noschese

    1994-05-01

    Full Text Available This paper deals with the Liouville-Stekeloff method for approximating solutions of homogeneous linear ODE and a general result due to Tricomi which provides estimates for the zeros of functions by means of the knowledge of an asymptotic representation. From the classical tools we deduce information about the asymptotics of the greatest zeros of a class of solutions of a particular ODE, including the classical Hermite polynomials.

  1. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  2. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  3. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  4. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  5. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  6. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  7. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  8. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  9. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  10. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  11. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  12. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  13. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  14. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  15. The curator/patron: Foundations and contemporary art

    Directory of Open Access Journals (Sweden)

    Rebecca Coates

    2008-12-01

    Full Text Available This article addresses the role of private foundations in commissioning site-specific ephemeral art works: contemporary art projects of a temporary nature that are realised outside of public institutions. Though small in number, I argue that the private individuals creating and managing private foundations of this nature demonstrate a new form of patronage, creating in the process a new role of ‘curator/patron’. Equally, this process of realisation reflects the changing needs of contemporary art practice. Work of this scale and ambition would increasingly not be possible without the vision, perseverance and funding of these kinds of foundation. In Australia, this trend is demonstrated by two foundations: Kaldor Art Projects, and their commissioning of works by artists such as Christo and Jeanne-Claude, Gilbert & George and Jeff Koons; and the more recently formed Sherman Contemporary Art Foundation, whose first project was with Chinese artist Ai Weiwei. In this article, these examples are placed within the broader international context of foundation models such as Artangel, UK, Fondazione Nicola Trussardi, Milan, and The Public Art Fund, New York.

  16. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  17. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  18. Contemporary Management of Vesicoureteral Reflux.

    Science.gov (United States)

    Hajiyev, Perviz; Burgu, Berk

    2017-04-01

    Vesicoureteral reflux (VUR) remains the most interesting topic of pediatric urology due to the dynamic nature of recent controversial publications. Starting from the need for a diagnosis to the necessity and effectiveness of treatment in preventing scars, VUR remains in the mist. Although recent strong evidence helped as fog lights in this blurriness, more data are required for achieving crystal clearance. This article aims to summarize and discuss the current state of the evidence regarding VUR management. To provide a comprehensive synthesis of the main evidence in the literature on the current and contemporary management of VUR in children; to discuss conservative management with continuous antibiotic prophylaxis (CAP), especially its effectiveness and safety; and to review the current evidence regarding contemporary surgical techniques. We conducted a nonsystematic review of the literature using the recent guidelines and PubMed database regarding surveillance, CAP, endoscopic, open, laparoscopic, and robot-assisted ureteral surgical treatment. Despite the striking results of previous studies revealing the ineffectiveness of CAP, more recent studies and their two fresh meta-analyses revealed a positive role for CAP in the contemporary management of VUR. One of the most interesting findings is the redundant rising of endoscopic correction and its final settlement to real indicated cases. Patient individualization in the contemporary management of VUR seems to be the keyword. The evidence in the literature showed a safe and effective use of laparoscopic and robot-assisted laparoscopic reimplantations. The goal of VUR treatment is to prevent the occurrence of febrile urinary tract infections and formation of scars in the renal parenchyma. The approach should be risk adapted and individualized according to current knowledge. Individual risk is influenced by the presentation age, sex, history of pyelonephritis and renal damage, grade of reflux, bladder bowel

  19. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  20. Social Engagements with Contemporary Art: Connecting Theory with Practice

    Science.gov (United States)

    Leake, Maria D.

    2014-01-01

    In this article, Leake is arguing for the relevance of contemporary art as a way to bridge the gap between theory and practice in the spaces of art education. Graeme Sullivan develops a similar argument in his "Studies" article, "The Art of Research." Where Leake looks to possibilities for contemporary art as it is presented in…

  1. Apocalittici e dannati

    Directory of Open Access Journals (Sweden)

    Rasini, Vallori

    2012-12-01

    Full Text Available At present, it is justified to talk about Apocalypse or even “Apocalypses”, in the plural form. The current situation - with the ecological crisis on one side, and the atomic threat on the other side - needs serious, deep, reflection. Günther Anders, one of the greatest German thinkers of the contemporary age, has devoted his attention precisely to this theme. He considers man to be inevitably slipping towards total destruction, both of humanity and of the world. At the basis of this idea there is the predicament of a man who has lost his humanity. He considers machines as an ideal and technology as the perfect form of existence. He feels inadequate and outdated, and abdicates his dignity and his responsibility towards himself and the world.

  2. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  3. The dream in contemporary psychiatry.

    Science.gov (United States)

    Reiser, M F

    2001-03-01

    This article offers selective reviews of cogent sectors of research regarding the dream in contemporary psychiatry. First, the author discusses relatively recent research (1953-1999) on the neurobiology and clinical psychophysiology of dreaming sleep; second, he reviews experimental cognitive neuroscientific studies of perception, emotion, and memory and the putative interrelationships among them in generating dream imagery; and third, he interprets psychoanalytic studies (1900-1999) on related aspects of dreams and the dream process. Exploration for interrelationships among information from these three areas entails discussion of the mind/brain problem. These considerations illuminate some of the logical and interpretive dilemmas that enter into debates about Freud's theory of the dream. The author proposes a preliminary psychobiologic concept of the dream process and discusses, in light of the foregoing considerations, the importance of collaborative research for developing a realistic perspective concerning the proper place of the dream in contemporary psychiatry.

  4. [Ethical dilemmas of contemporary psychiatry].

    Science.gov (United States)

    Filaković, Pavo; Pozgain, Ivan

    2008-01-01

    Ethics in the contemporary psychiatry, as well as in medicine in general, is based on the two core ethical traditions: deontological and theological. Good ethical decision takes into the consideration both traditions, and is preceded with ethical dilemmas to provide the best possible care to the patients in that moment. In the article are presented most recent research results of the literature about ethical dilemmas in psychiatry. Ethical dilemmas in everyday practice as well as compliance with the patients, psychiatric consultations, informed consent, treatment of personality disorders, pharmacological investigations, forensic psychiatry, forced hospitalisation, promotion of mental health, and dealing with the stigma of the mental diseases are showed in the article. The authors emphasize the necessity of constant questioning of ethical dilemmas in the contemporary psychiatry, because of the special status of psychiatry as a potentially risky field in practice, and because of intensive pharmacological investigations in psychiatric patients.

  5. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, Joseph William; Jobstvogt, N.; Böhnke-Henrichs, A.

    2016-01-01

    The ecosystem services concept (ES) is becoming a cornerstone of contemporary sustainability thought. Challenges with this concept and its applications are well documented, but have not yet been systematically assessed alongside strengths and external factors that influence uptake. Such an assess...

  6. Strengths, Weaknesses, Opportunities and Threats

    NARCIS (Netherlands)

    Bull, J.W.; Jobstvogt, N.; Böhnke-Henrichs, A.; Mascarenhas, A.; Sitas, N.; Baulcomb, C.; Lambini, C.K.; Rawlins, M.; Baral, H.; Zähringer, J.; Carter-Silk, E.; Balzan, M.V.; Kenter, J.O.; Häyhä, T.; Petz, K.; Koss, R.

    2016-01-01

    The ecosystem services concept (ES) is becoming a cornerstone of contemporary sustainability thought. Challenges with this concept and its applications are well documented, but have not yet been systematically assessed alongside strengths and external factors that influence uptake. Such an

  7. Planting contemporary practice theory in the garden of information science

    NARCIS (Netherlands)

    Huizing, A.; Cavanagh, M.

    2011-01-01

    Introduction. The purpose of this paper is to introduce to information science in a coherent fashion the core premises of contemporary practice theory, and thus to engage the information research community in further debate and discussion. Method. Contemporary practice-based approaches are

  8. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  9. Filial Piety (xiao 孝 for the Contemporary and Global World

    Directory of Open Access Journals (Sweden)

    Loreta POŠKAITĖ

    2014-05-01

    Full Text Available The relationships between children and parents seem to be one of the most urgent issues in the contemporary world, spanning from the United States and European countries to East Asian societies, as a consequence of the transformation of traditional family ethics, values and institutions brought about by the processes of modernization and globalization. The present paper aims to reveal the ways and problems of the application of xiao 孝 (filial piety ethics in the contemporary Western and Chinese societies, as reflected in the works by a number of famous Western Protestant missionaries, religious philosophers, sinologists and present-day Lithuanian Sinology students, and counterbalance their views with the insights of contemporary Chinese sociologists. The place of xiao in the contemporary inter-cultural dialogue will be discussed from the point of view of dialogue between religions, theory and practice, Western and Chinese culture, traditional and modern societies and values.

  10. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  11. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  12. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  13. Haptic sense and the politicization of contemporary image

    Directory of Open Access Journals (Sweden)

    Tarcisio Torres Silva

    2017-08-01

    Full Text Available In this paper, it is intended to propose a theoretical approach to the political effects of the sense of touch/haptic in order to understand to what extent the intensification of contemporary haptic experience contributes to create proximity and engagement among individuals overloaded by too much visual information offered by multiple media. At the end, it is mentioned the work of Brazilian artist Rodrigo Braga to exemplify the contemporary political use of haptic sense.

  14. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  15. Image acts and visual communities: everyday nationalism in contemporary Turkey

    NARCIS (Netherlands)

    Kuryel, A.

    2015-01-01

    In the dissertation entitled "Image Acts and Visual Communities: Contemporary Nationalism in Turkey", I investigate the image politics of nationalist practices in everyday life by focusing on contemporary Turkey and tracking the way images of the nation travel through a variety of fields. I depart

  16. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  17. Contemporary Theories and International Lawmaking

    NARCIS (Netherlands)

    Venzke, I.; Brölmann, C.; Radi, Y.

    2016-01-01

    Many contemporary theories approach international law-making with a shift in emphasis from the sources of law towards the communicative practices in which a plethora of actors use, claim and speak international law. The contribution proceeds by sketching the move from sources to communicative

  18. Embodiment and aging in contemporary physiotherapy.

    Science.gov (United States)

    Hay, Melissa E; Connelly, Denise M; Kinsella, Elizabeth Anne

    2016-05-01

    Contemporary discourses in the health sciences vary in their treatment of aging bodies and the mind-body relationship, yet our understanding of aging experiences and health care practices can be limited by an overreliance on biomedical or social constructionist approaches alone. This paper offers a conceptual exploration of embodiment as an innovative approach to enhance our understandings of aging bodies and health in physiotherapy practice. Embodiment attends to body and mind, nature and culture, structure and agency, while appreciating differences in aging bodies and health in aging. Conclusions consider embodiment in the practice and disciplinary discourse of contemporary physiotherapy, specifically, considering the ways embodied perspectives can support therapists in their health care practice and relationships with people with aging bodies.

  19. Tectonic thinking in contemporary industrialized architecture

    DEFF Research Database (Denmark)

    Beim, Anne

    2013-01-01

    a creative force in building constructions, structural features and architectural design (construing) – helps to identify and refine technology transfer in contemporary industrialized building construction’. Through various references from the construction industry, business theory and architectural practice......This paper argues for a new critical approach to the ways architectural design strategies are developing. Contemporary construction industry appears to evolve into highly specialized and optimized processes driven by industrialized manufacturing, therefore the role of the architect...... and the understanding of the architectural design process ought to be revised. The paper is based on the following underlying hypothesis: ‘Tectonic thinking – defined as a central attention towards the nature, the properties, and the application of building materials (construction) and how this attention forms...

  20. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  1. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  2. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  3. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  4. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  5. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  6. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  7. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  8. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  9. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  10. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... self’. I scrutinise the staging techniques and the codes of appearance that bodies have to comply with in order to be deemed ‘authentic’ on the shows. To define them and place them in the history of the idea of ‘bodily authenticity’, I complement my study with an outline of how ‘authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  11. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  12. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  13. Severe burn injuries caused by bioethanol-design fireplaces-an overview on recreational fire threats.

    Science.gov (United States)

    Kraemer, Robert; Knobloch, Karsten; Lorenzen, Johan; Breuing, Karl H; Koennecker, Soeren; Rennekampff, Hans-Oliver; Vogt, Peter M

    2011-01-01

    Commercially available bioethanol-fueled fireplaces have become increasingly popular additions for interior home decoration in Europe and more recently in the United States. These fireplaces are advertised as smokeless, ecologically friendly, and do not require professional installation, formal gas lines, or venting. Although manufacturers and businesses promote their safety, recent presentations of injuries have alerted the authors to the relevant danger bioethanol fireplaces can pose for the incautious user. Are bioethanol fireplaces going to become the future threat in domestic burn accidents beside common barbeque burns? A Medline literature search on barbeque and domestic fireplace accidents was performed to compare and stratify the injury patterns reported and to identify a risk profile for contemporary bioethanol-fueled fireplaces. To exemplify, two representative clinical cases of severe burn accidents caused by bioethanol-fueled fireplaces, both treated in the burn unit of the authors, are being presented. Design fireplaces are being recognized as an increasing source of fuel and fire-related danger in the home. This risk may be underestimated by the uninformed customer, resulting in severe burn injuries. Because bioethanol-fueled fireplaces have become more commonplace, they may overtake barbecue-related injury as the most common domestic burn injury.

  14. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    Science.gov (United States)

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  15. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  16. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  17. The space between us: stereotype threat and distance in interracial contexts.

    Science.gov (United States)

    Goff, Phillip Atiba; Steele, Claude M; Davies, Paul G

    2008-01-01

    Four studies investigate the role that stereotype threat plays in producing racial distancing behavior in an anticipated conversation paradigm. It was hypothesized that the threat of appearing racist may have the ironic effect of causing Whites to distance themselves from Black conversation partners. In Study 1, participants distanced themselves more from Black partners under conditions of threat, and this distance correlated with the activation of a "White racist" stereotype. In Study 2, it was demonstrated that Whites' interracial distancing behavior was not predicted by explicit or implicit prejudice. Study 3 provides evidence that conceiving of interracial interactions as opportunities to learn may attenuate the negative consequences of threat for Whites. Study 4 found that Whites have conscious access to their experience of stereotype threat and that this awareness may mediate the relationship between threat and distance. These results are discussed within a broader discourse of racial distancing and the possibility that certain identity threats may be as important as prejudice in determining the outcomes of interracial interactions. Copyright 2008 APA, all rights reserved.

  18. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  19. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  20. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  1. Queering gender in contemporary female Bildung narrative

    Directory of Open Access Journals (Sweden)

    Šnircová Soňa

    2015-09-01

    Full Text Available The paper explores, in the context of feminist discussions about the Bildungsroman, a contemporary British novel that offers shocking images of female coming of age at the turn of the millennium. Queering gender and introducing male elements into the heroine’s process of maturation, the analysed novel appears to raise questions about the continuous relevance of the feminist distinction between male and female version of the genre. The paper however argues that although significantly rewriting both female Bildung and pornographic narratives, Helen Walsh’s Brass can still be read as a variation of the female Bildungsroman and an example of its contemporary developments.

  2. Contemporary intellectual property law and policy

    CERN Document Server

    MacQueen, Hector; Laurie, Graeme; Brown, Abbe

    2011-01-01

    Contemporary Intellectual Property: Law and Policy offers a unique perspective on intellectual property law, unrivalled amongst IP textbooks available today. Beyond providing an up-to-date account of intellectual property law, the text examines the complex policies that inform and guide modern IP law at the domestic (including Scottish), European and international levels, giving the reader a true insight into the discipline and the shape of things to come. The focus is on contemporary challenges to intellectual property law and policy and the reader is encouraged to engage critically both with the text and the subject matter. Carefully developed to ensure that the complexities of the subject are addressed in a clear and approachable manner, the extensive use of practical examples, exercises and visual aids throughout the text enliven the subject and stimulate the reader.

  3. Contemporary intellectual property law and policy

    CERN Document Server

    Waelde, Charlotte; Kheria, Smita; Cornwell, Jane

    2016-01-01

    Contemporary Intellectual Property: Law and Policy offers a unique perspective on intellectual property law. It goes beyond an up-to-date account of the law and examines the complex policies that inform and guide modern intellectual property law at the domestic (including Scottish), European and international levels, giving the reader a true insight into the discipline and the shape of things to come. The focus is on contemporary challenges to intellectual property law and policy and the reader is encouraged to engage critically both with the text and the subject matter. Carefully developed to ensure that the complexities of the subject are addressed in a clear and approachable manner, the extensive use of practical examples, exercises and visual aids throughout the text enliven the subject and stimulate the reader.

  4. Social Media - DoD’s Greatest Information Sharing Tool or Weakest Security Link?

    Science.gov (United States)

    2010-04-15

    or position of the Department of the Army, Department of Defense, or the U.S. Government. SOCIAL MEDIA – DOD’S GREATEST INFORMATION SHARING TOOL...appropriateness and effectiveness of these policies in securing the information network. 15. SUBJECT TERMS Social media , information...TYPE Civilian Research Paper 3. DATES COVERED (From - To) August 2009-April 2010 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Social Media

  5. Age differences in the underlying mechanisms of stereotype threat effects.

    Science.gov (United States)

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  7. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  8. Towards Contemporary Play: Sociocultural Theory and the Digital-Consumerist Context

    Science.gov (United States)

    Edwards, Susan

    2014-01-01

    This article introduces the notion of "contemporary" play in relation to existing ideas about children's play, learning and development from a sociocultural perspective. The need to think about the nature of contemporary play is considered in response to arguments suggesting that the quality of children's play has declined in…

  9. Interview with Contemporary Armenian Writer and Translator Diana Hambardzumyan

    Directory of Open Access Journals (Sweden)

    Beatrice Tottossy

    2016-12-01

    Full Text Available A conversation with Diana Hambardzumyan, a contemporary Armenian writer, translator and lecturer in English Literature at the University of Yerevan, foregrounds a series of significant features of contemporary Armenian literature and the country’s key social and cultural issues. She interconnects current events with the literary memory, highlighting and confirming the Armenian writers’ need to maintain their traditional role as representatives of the cultural will of their people.

  10. Contemporary Cambodian: The Social Institutions.

    Science.gov (United States)

    Kheang, Lim Hack; And Others

    "Contemporary Cambodian" consists of seven parts: the "Grammatical Sketch," the "Introduction," four intermediate modules, and a Cambodian-English glossary containing all the words in the series. After completing the "Introduction," a student can study the intermediate modules in any order, since each serves as a partial review of the others. This…

  11. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  12. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal; Pernici, B; Gulla, J.A.

    2007-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not

  13. Manic Defences in Contemporary Society. The Psychocultural Approach.

    Science.gov (United States)

    Rudan, Dusko; Jakovljevic, Miro; Marcinko, Darko

    2016-12-01

    The article discusses the impact of contemporary culture on the individual's personality. We used the "psychocultural" approach whose key feature is the amalgamation of theories and methods belonging to psychodynamic and psychosocial studies, as well as those used in the field of media and cultural studies. The idea of a potentially therapeutic effect of culture (therapy culture) can already been seen in Freud's and Lacan's texts, and it is often used in critical analyses of contemporary corporate culture, which is more or less developed in some parts of the world. In their criticisms, many contemporary authors emphasize that modern societies have a tendency towards the weakening of basic commitment, or lack thereof, to a social equivalent of Winnicott's concept of environmental provisions as an inalienable democratic right essential for human emotional and mental progress or emotional well-being. The article describes frequent resorting to the so-called manic defences that defensively distort, deny and obscure the awareness that a human being is not the omnipotent source of life, but instead depends on other human beings, and often tries to compensate for loss through various activities. The article describes excessive shopping as an activity that often serves as an attempt to find what was lost, i.e. to fill an emotional void. This solution (resorting to manic defences) is encouraged by contemporary culture, especially through promotional material (e.g. advertising). The main theses of this article are supported by quotations and data from world literature.

  14. Contemporary evolution strategies

    CERN Document Server

    Bäck, Thomas; Krause, Peter

    2013-01-01

    Evolution strategies have more than 50 years of history in the field of evolutionary computation. Since the early 1990s, many algorithmic variations of evolution strategies have been developed, characterized by the fact that they use the so-called derandomization concept for strategy parameter adaptation. Most importantly, the covariance matrix adaptation strategy (CMA-ES) and its successors are the key representatives of this group of contemporary evolution strategies. This book provides an overview of the key algorithm developments between 1990 and 2012, including brief descriptions of the a

  15. Globalizing Contemporary War

    OpenAIRE

    Melissa Zisler

    2009-01-01

    There are a plethora of social problems present throughout theworld in which America has deemed a type of ‘war.’ Some of theseunconventional wars include: The War on Poverty presented in 1964; The War on Drugs announced in 1971; The War on Cancer commencing in1971; The War Against Illiteracy beginning in the 1970s; and afterSeptember 11, 2001 The War on Terror was announced (Raz, 2008).These contemporary ‘wars’ have transformed the meaning of the word‘war.’ Labeling these missions ‘wars,’ pre...

  16. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  17. The challenges and factors of political socialization of the contemporary youth

    Directory of Open Access Journals (Sweden)

    N М Belgarokova

    2009-09-01

    Full Text Available The article provides the analysis of the conditions and results of the processes of political culture development and political socialization of the contemporary youth in the frame of sociological research. The analysis of the conflicting influences of the agents of political socialization (family, system of education, mass media, the difficult circumstances and the challenging economic status of the contemporary Russian youth as well as the macropolitical environment in the country provides an opportunity to arrive at the conclusion concerning the socialization crisis of youth in contemporary Russia.

  18. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    Science.gov (United States)

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  19. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  20. Phishing - A Growing Threat to E-Commerce

    OpenAIRE

    Banday, M. Tariq; Qadri, Jameel A.

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyl...

  1. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Directory of Open Access Journals (Sweden)

    Marta Coll

    Full Text Available The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular

  2. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Science.gov (United States)

    Coll, Marta; Piroddi, Chiara; Steenbeek, Jeroen; Kaschner, Kristin; Ben Rais Lasram, Frida; Aguzzi, Jacopo; Ballesteros, Enric; Bianchi, Carlo Nike; Corbera, Jordi; Dailianis, Thanos; Danovaro, Roberto; Estrada, Marta; Froglia, Carlo; Galil, Bella S; Gasol, Josep M; Gertwagen, Ruthy; Gil, João; Guilhaumon, François; Kesner-Reyes, Kathleen; Kitsos, Miltiadis-Spyridon; Koukouras, Athanasios; Lampadariou, Nikolaos; Laxamana, Elijah; López-Fé de la Cuadra, Carlos M; Lotze, Heike K; Martin, Daniel; Mouillot, David; Oro, Daniel; Raicevich, Sasa; Rius-Barile, Josephine; Saiz-Salinas, Jose Ignacio; San Vicente, Carles; Somot, Samuel; Templado, José; Turon, Xavier; Vafidis, Dimitris; Villanueva, Roger; Voultsiadou, Eleni

    2010-08-02

    The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular, the Strait of

  3. Exciting fear in adolescence: Does pubertal development alter threat processing?

    Directory of Open Access Journals (Sweden)

    Jeffrey M. Spielberg

    2014-04-01

    Full Text Available Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala, but also regions associated with reward pursuit (i.e., nucleus accumbens. These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues—which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences.

  4. Exciting fear in adolescence: does pubertal development alter threat processing?

    Science.gov (United States)

    Spielberg, Jeffrey M; Olino, Thomas M; Forbes, Erika E; Dahl, Ronald E

    2014-04-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues--which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  5. Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2016-09-01

    Full Text Available Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft. 

  6. A comparison of threats, vulnerabilities and management approaches in global seagrass bioregions

    International Nuclear Information System (INIS)

    Grech, Alana; Chartrand-Miller, Katie; McKenzie, Len; Rasheed, Michael; Taylor, Helen; Coles, Rob; Erftemeijer, Paul; Fonseca, Mark

    2012-01-01

    Global seagrass habitats are threatened by multiple anthropogenic factors. Effective management of seagrasses requires information on the relative impacts of threats; however, this information is rarely available. Our goal was to use the knowledge of experts to assess the relative impacts of anthropogenic activities in six global seagrass bioregions. The activities that threaten seagrasses were identified at an international seagrass workshop and followed with a web-based survey to collect seagrass vulnerability information. There was a global consensus that urban/industrial runoff, urban/port infrastructure development, agricultural runoff and dredging had the greatest impact on seagrasses, though the order of relative impacts varied by bioregion. These activities are largely terrestrially based, highlighting the need for marine planning initiatives to be co-ordinated with adjacent watershed planning. Sea level rise and increases in the severity of cyclones were ranked highest relative to other climate change related activities, but overall the five climate change activities were ranked low and experts were uncertain of their effects on seagrasses. The experts’ preferred mechanism of delivering management outcomes were processes such as policy development, planning and consultation rather than prescriptive management tools. Our approach to collecting expert opinion provides the required data to prioritize seagrass management actions at bioregional scales. (letter)

  7. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  8. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  9. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    Science.gov (United States)

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Research on new information service model of the contemporary library

    International Nuclear Information System (INIS)

    Xin Pingping; Lu Yan

    2010-01-01

    According to the development of the internet and multimedia technology, the information service models in the contemporary library become both of the traditional and digital information service. The libraries in each country do their best to make the voluminous information and the complex technology be High-integrated in the background management, and also make the front interface be more and more convenient to the users. The essential characteristics of the information service of the contemporary library are all-in-one and humanness. In this article, we will describe several new hot information service models of the contemporary library in detail, such as individualized service, reference service, reference service and strategic information service. (authors)

  11. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  12. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  13. The cyber threat landscape: Challenges and future research directions

    Science.gov (United States)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  14. Book Review: Medische Antropologie. | Atobrah | Contemporary ...

    African Journals Online (AJOL)

    Contemporary Journal of African Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 2, No 1 (2014) >. Log in or Register to get access to full text downloads.

  15. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  16. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  17. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  18. Cultural adaptations to the differential threats posed by hot versus cold climates.

    Science.gov (United States)

    Murray, Damian R

    2013-10-01

    Hot and cold climates have posed differential threats to human survival throughout history. Cold temperatures can pose direct threats to survival in themselves, whereas hot temperatures may pose threats indirectly through higher prevalence of infectious disease. These differential threats yield convergent predictions for the relationship between more demanding climates and freedom of expression, but divergent predictions for freedom from discrimination.

  19. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  20. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  1. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  2. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  3. Threat driven modeling framework using petri nets for e-learning system.

    Science.gov (United States)

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  4. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    Science.gov (United States)

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  5. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  6. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    Science.gov (United States)

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  7. Contemporary Argentine Cinema during Neoliberalism

    Science.gov (United States)

    Rocha, Carolina

    2009-01-01

    In this article I analyze contemporary Argentine cinematic production assessing the impact of Law 24,377 that was implemented in 1995 and that provided much-needed funds for national productions. By looking at film production and consumption, the emergence of young filmmakers and the performance of both commercial films and those belonging to the…

  8. Woman's Quest in Contemporary Fiction.

    Science.gov (United States)

    Semeiks, Jonna Gormely

    Depending primarily on Joseph Campbell's treatment of the quest or hero myth, this paper provides analyses of recent women's fiction in terms of contemporary women's quests for personal identity and freedom. Following discussions of a proposed definition of myth, its connotations, and its use as a literary device and as a tool for critical…

  9. Strategic threat management: an exploration of nursing strategies in the pediatric intensive care unit.

    Science.gov (United States)

    Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina

    2015-03-01

    Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  10. Attentional bias towards health-threat information in chronic fatigue syndrome.

    Science.gov (United States)

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  11. Applying contemporary statistical techniques

    CERN Document Server

    Wilcox, Rand R

    2003-01-01

    Applying Contemporary Statistical Techniques explains why traditional statistical methods are often inadequate or outdated when applied to modern problems. Wilcox demonstrates how new and more powerful techniques address these problems far more effectively, making these modern robust methods understandable, practical, and easily accessible.* Assumes no previous training in statistics * Explains how and why modern statistical methods provide more accurate results than conventional methods* Covers the latest developments on multiple comparisons * Includes recent advanc

  12. Interactive Contemporary Art : Participation in Practice

    NARCIS (Netherlands)

    Brown, K.J.

    2014-01-01

    Audience participation has polarized the critical debate surrounding contemporary art's social, moral and aesthetic potential. This incisive collection of essays sheds new light on the political, ethical and artistic capacity of participatory works and tests the most recent theoretical approaches to

  13. Contemporary protease inhibitors and cardiovascular risk

    DEFF Research Database (Denmark)

    Lundgren, Jens; Mocroft, Amanda; Ryom, Lene

    2018-01-01

    PURPOSE OF REVIEW: To review the evidence linking use of HIV protease inhibitors with excess risk of cardiovascular disease (CVD) in HIV+ populations. RECENT FINDINGS: For the two contemporary most frequently used protease inhibitors, darunavir and atazanavir [both pharmacologically boosted...

  14. Challenges in contemporary academic neurosurgery.

    Science.gov (United States)

    Black, Peter M

    2006-03-01

    Traditionally, the ideal academic neurosurgeon has been a "quadruple threat," with excellence in clinical work, teaching, research, and administration. This tradition was best exemplified in Harvey Cushing, who developed the field of neurosurgery 90 years ago. This paradigm will probably have to change as academic neurosurgeons face major challenges. In patient care, these include increasing regulatory control, increasing malpractice costs, consolidation of expensive care in academic centers, and decreasing reimbursement; in resident teaching, work hour limitations and a changing resident culture; in research, the increasing dominance of basic scientists in governmental funding decisions and decreased involvement of neurosurgeons in scientific review committees; and in administration, problems of relationships in the workplace, patient safety, and employment compliance in an increasingly bureaucratic system. To meet these challenges, the new academic neurosurgeon will probably not be a quadruple threat personally but will be part of a quadruple threat in a department and institution. Neurosurgeons in such a setting will have to work with hospital, medical school, and national and international groups to address malpractice, reimbursement, subspecialization, and training problems; find supplemental sources of income through grants, development funds, and hospital support; lead in the development of multidisciplinary centers for neuroscience, brain tumor, spine, and other initiatives; and focus on training leaders for hospital, regional, and national groups to reconfigure neurosurgery. Collaboration, flexibility, and leadership will be characteristic of the academic neurosurgeon in this new era.

  15. The Sublime, Ugliness and Contemporary Art: A Kantian Perspective

    Directory of Open Access Journals (Sweden)

    Mojca Kuplen

    2015-06-01

    Full Text Available The aim of this paper is twofold. First, to explain the distinction between Kant’s notions of the sublime and ugliness, and to answer an important question that has been left unnoticed in contemporary studies, namely why it is the case that even though both sublime and ugliness are contrapurposive for the power of judgment, occasioning the feeling of displeasure, yet that after all we should feel pleasure in the former, while not in the latter. Second, to apply my interpretation of the sublime and ugliness to contemporary art, and to resolve certain issues that have been raised in accounting for the possibility of artistic sublimity. I argue that an experience of a genuine artistic sublimity is an uncommon occurrence. I propose that the value of contemporary art can be best explained by referring to Kant’s notion of ugliness and his theory of aesthetic ideas.

  16. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  17. A simple strategy to reduce stereotype threat for orthopedic residents.

    Science.gov (United States)

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  18. Investigation of a Markov Model for Computer System Security Threats

    Directory of Open Access Journals (Sweden)

    Alexey A. A. Magazev

    2017-01-01

    Full Text Available In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. In the framework of this model the functioning of the computer system is considered as a sequence of failures and recovery actions which appear as results of information security threats acting on the system. We provide a detailed description of the model: the explicit analytical formulas for the probabilities of computer system states at any arbitrary moment of time are derived, some limiting cases are discussed, and the long-run dynamics of the system is analysed. The dependence of the security state probability (i.e. the state for which threats are absent on the probabilities of threats is separately investigated. In particular, it is shown that this dependence is qualitatively different for odd and even moments of time. For instance, in the case of one threat the security state probability demonstrates non-monotonic dependence on the probability of threat at even moments of time; this function admits at least one local minimum in its domain of definition. It is believed that the mentioned feature is important because it allows to locate the most dangerous areas of threats where the security state probability can be lower then the permissible level. Finally, we introduce an important characteristic of the model, called the relaxation time, by means of which we construct the permitting domain of the security parameters. Also the prospects of the received results application to the problem of finding the optimal values of the security parameters is discussed.

  19. Investment and Project Economics: Contemporary Lessons for ...

    African Journals Online (AJOL)

    Toshiba

    contemporary challenge to sensitize and synergize instructional, ... project financial outcomes as underscored in this work. ... Balance of payments. .... Problem diagnosis/solutions. **. *** .... Money, Work, Sex, Kids, and Life's Other Challenges.

  20. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    OpenAIRE

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01

    This chapter explores stereotype threat in organizational contexts. Building on the understanding that stereotype threat involves concerns about confirming a negative stereotype about one’s group, we begin by elucidating the scope of potential stereotype threat effects in organizations. We first examine the ubiquity of evaluations in organizations, which are at the heart of stereotype threat. Next we specify the potential psychological consequences of stereotype threat on targeted individua...

  1. Revisioning fat lesbian subjects in contemporary lesbian periodicals.

    Science.gov (United States)

    Snider, Stefanie

    2010-01-01

    It is difficult to find a visual representation of any fat individual, let alone a queer woman, that is not denigrating and oppressive in conventional media outlets and contemporary visual culture. But even as the negative imagery of fat individuals has expanded over the past forty years in mainstream distribution channels, fat-positive imagery has come to the fore within many feminist and lesbian publications during this same time frame. This article looks at the strategies of representation taken by three contemporary United States lesbian feminist periodicals in visualizing fat and lesbian women within their pages since the 1980s.

  2. Inferring the nature of anthropogenic threats from long-term abundance records.

    Science.gov (United States)

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  3. An introduction to contemporary work psychology

    NARCIS (Netherlands)

    Peeters, M.C.W.; Jonge, de J.; Taris, Toon W.

    2014-01-01

    This is the first comprehensive overview of work psychology, with coverage of classic models, current theories, and contemporary issues affecting the 21st-century worker. Examines the positive aspects of work–motivation, performance, creativity, and engagement—instead of focusing only on adverse

  4. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  5. Assessing the Practicality and Relevance of Adventist Educational Philosophy in a Contemporary Education Paradigm

    Science.gov (United States)

    Jackman, W. Marc

    2014-01-01

    This article examines the key tenets of contemporary education philosophy and compares it to the principles of the Adventist educational philosophy. The intent is to determine whether Adventist educational philosophy aligns with the demands of contemporary education. In this vein, 10 key principles of contemporary education are first described.…

  6. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    Science.gov (United States)

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  7. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    interests. These threats were separate from traditional regional or state-centered threats, and included such diverse issues as terrorism, mass migrations ...organizations as examples of TOC; the Sinaloa Cartel, the Yakuza, the Camorra. This conceptual framework leads to the conclusion that the best way to deal

  8. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider...

  9. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  10. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Directory of Open Access Journals (Sweden)

    Lindberg Nina

    2012-12-01

    Full Text Available Abstract Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic.

  11. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Science.gov (United States)

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  12. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Directory of Open Access Journals (Sweden)

    Bettina J Casad

    2016-01-01

    Full Text Available Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  13. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Science.gov (United States)

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681

  14. Hot or cold: is communicating anger or threats more effective in negotiation?

    Science.gov (United States)

    Sinaceur, Marwan; Van Kleef, Gerben A; Neale, Margaret A; Adam, Hajo; Haag, Christophe

    2011-09-01

    Is communicating anger or threats more effective in eliciting concessions in negotiation? Recent research has emphasized the effectiveness of anger communication, an emotional strategy. In this article, we argue that anger communication conveys an implied threat, and we document that issuing threats is a more effective negotiation strategy than communicating anger. In 3 computer-mediated negotiation experiments, participants received either angry or threatening messages from a simulated counterpart. Experiment 1 showed that perceptions of threat mediated the effect of anger (vs. a control) on concessions. Experiment 2 showed that (a) threat communication elicited greater concessions than anger communication and (b) poise (being confident and in control of one's own feelings and decisions) ascribed to the counterpart mediated the positive effect of threat compared to anger on concessions. Experiment 3 replicated this positive effect of threat over anger when recipients had an attractive alternative to a negotiated agreement. These findings qualify previous research on anger communication in negotiation. Implications for the understanding of emotion and negotiation are discussed. PsycINFO Database Record (c) 2011 APA, all rights reserved

  15. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.

    Science.gov (United States)

    Casad, Bettina J; Bryant, William J

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  16. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    OpenAIRE

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, ste...

  17. Self-Models and Relationship Threat

    Directory of Open Access Journals (Sweden)

    Máire B. Ford

    2015-07-01

    Full Text Available This study investigated a key claim of risk regulation theory, namely, that psychological internalizing of a relationship threat will serve as a mediator of the link between self-models (self-esteem and attachment anxiety and relationship responses (moving closer to a partner vs. distancing from a partner. Participants (N = 101 received feedback that threatened their current romantic relationship (or no feedback and then completed measures of internal–external focus, relationship closeness–distancing, and acceptance–rejection of the feedback. Results showed that participants with negative self-models responded to the relationship threat by becoming more internally focused and by distancing from their partners, whereas those with positive self-models became more externally focused and moved closer to their partners. Mediation analyses indicated that the link between self-models and relationship closeness–distancing was partially explained by internal focus.

  18. Physical threat and self-evaluative emotions in smoking cessation

    NARCIS (Netherlands)

    Dijkstra, A; Den Dijker, L

    Negative self-evaluative emotions (e.g., feeling dissatisfied with oneself, feeling stupid) are considered to indicate a threat to the self that can be caused by an external physical threat (e.g., smoking). A sample of 363 smokers was tested twice, with an interval of 8 months. Prospective analyses

  19. Divorce by consent in Roman law and contemporary law

    Directory of Open Access Journals (Sweden)

    Ignjatović Marija

    2013-01-01

    Full Text Available The subject matter of this paper is divorce by mutual consent in Roman law and contemporary law. In the first part of this article, the authors analyzes the key tenets of consensual divorce in Roman law, with specific reference to the impact of Christian religious teaching on the concepts of marriage and divorce as well as on the Roman rulers' constitutions, which marked the beginning of the process of restricting the right to divorce. In the central part of the paper, the authors examines the regulation on the consensual divorce in some contemporary legal systems. In addition, the authors provides a substantial analysis of the normative framework on the termination of marriage in the positive Serbian legislation. In the final part of the paper, the authors provides a comparative analysis and underscores the observed similarities and differenced in the regulation of the institute of consensual divorce in Roman law and in the contemporary legislation.

  20. Jewish Writers in Contemporary Germany: The Dead Author Speaks

    Directory of Open Access Journals (Sweden)

    Sander L. Gilman

    1989-08-01

    Full Text Available The question I wish to address in this essay is really quite simple: Given the fact that there are "Jews" who seem to play a major role in contemporary German "Kultur" (at least that narrower definition of culture, meaning the production of cultural artifacts, such as books—a field which, at least for Englemann, was one of the certain indicators of a Jewish component in prewar German culture—what happened to these "Jews" (or at least the category of the "Jewish writer" in postwar discussions of culture? Or more simply: who lulled the remaining Jews in contemporary German culture and why? Why is it not possible to speak about "German-Jews" in the contemporary criticism about German culture? And, more to the point, what is the impact of this denial on those who (quite often ambivalently see (or have been forced to see themselves as "Germans" and "Jews," but not as both simultaneously.

  1. Identifying species threat hotspots from global supply chains.

    Science.gov (United States)

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  2. Planning a radar system for protection from the airborne threat

    International Nuclear Information System (INIS)

    Greneker, E.F.; McGee, M.C.

    1986-01-01

    A planning methodology for developing a radar system to protect nuclear materials facilities from the airborne threat is presented. Planning for physical security to counter the airborne threat is becoming even more important because hostile acts by terrorists are increasing and airborne platforms that can be used to bypass physical barriers are readily available. The comprehensive system planning process includes threat and facility surveys, defense hardening, analysis of detection and early warning requirements, optimization of sensor mix and placement, and system implementation considerations

  3. The effects of takeover threats of shareholders and firm value

    OpenAIRE

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  4. Contemporary Romanian Art in the United States1

    Directory of Open Access Journals (Sweden)

    Altman Dana

    2014-08-01

    Full Text Available The article discusses the recent international interest in contemporary Romanian art and its growth in market share, with a focus on the United States. The theme is followed thorough in numerous museum exhibitions, increased collector following, art fair presence, gallery representation and auction activity initially in Europe and the United States. The phenomenon is discussed both in the context of the larger international movement conducive to the contemporary art price bubble, and in that of the local socio-economic changes. My chief interest lies in the factors leading up to the entry of post 1989 Romanian art in the global arena as a manifestation of market forces in the field. The analysis follows its grass roots local emergence through non-profit institutions, individual artists, small publications, low budget galleries, as well as the lack of contribution (with few notable exceptions of state institutions, while pointing out the national context of increasing deregulation of social support systems resulting in lack of focus on cultural manifestations. The conclusion is that the recent ascent of contemporary Romanian art (and coincidentally, the award winning contemporary Romanian cinematography is a fortuitous convergence of various factors, among which, increased international mobility and sharing. At the same time, it is also the result of the evolution of various individual artists that pursued a form of art rooted in Romanian artistic tradition but with a focus on the symbolic figurative. The result is a personal semiotics of raising the mundane to extraordinary levels that reconfigured the anxiety of entering a new system into an unmistakable and lasting visual language.

  5. The Phenomenon of Ukrainian Poverty in the Context of Threats to National Security

    Directory of Open Access Journals (Sweden)

    Hrinenko Аndrei Yu.

    2018-03-01

    Full Text Available Poverty is one of the unresolved problems among the socio-economic components in Ukraine. According to recent researches, the majority of the population of our country is beyond the limit of poverty. Experts from both Ukraine and the international organizations, including the UN, have different estimates of extent of poverty in Ukraine, citing different methods of calculation. However, whatever estimates be given to this social phenomenon, all experts agree on one thing: poverty in Ukraine is aggravated and covers the wider population of the country. The phenomenon of Ukrainian poverty is that for more than a quarter of a century inequality in the income of the population is growing, the price of labor is falling, and, paradoxically, the Government contributes to the growth of poverty by its regulation and deregulation of the economy, financial and social spheres. Therefore, the greatest threat to conducting reforms, ensuring the economic growth, to the entire national economy today, is the exorbitant poverty, which not only provides for the increase in labor migration, but leads to the total emigration of skilled workers, who are highly valued by employers of the near and far abroad countries. And yet, despite the significant economic potential, available resources, Ukraine remains one of the poorest countries in Europe.

  6. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  7. Contradictions and conflicts of the contemporary Russian education

    Directory of Open Access Journals (Sweden)

    M M Akulich

    2016-12-01

    Full Text Available The article considers the contradictions and conflicts of the contemporary Russian education focusing on the opportunities for conflict management. The research is based on the institutional and system approaches, in particular on the sociological conceptions of social conflict and social cohesion. The author conducted a historical and sociological analysis of social conflicts and social cohesion in the educational sphere, and such conflicts seem to be the result of the contradictions inherent in this social institution. The article identifies basic types of conflicts in the Russian education, and the ways of resolving them by the subjects of the educational system for such conflicts are manageable, especially within the interaction of educational system and society. To verify the proposed typology of conflicts in the contemporary Russian education the author conducted an empirical study to develop a system of practical measures that will help to improve the quality of learning of pupils and students, and will have a positive impact on the functioning and development of the contemporary Russian society. Thus, the article may be useful to sociologists, teachers, educational managers and readers interested in the specifics of social conflicts and the ways for resolving conflict situations.

  8. Organisms as natural purposes: the contemporary evolutionary perspective.

    Science.gov (United States)

    Walsh, D M

    2006-12-01

    Kant's conception of organisms as natural purposes raises a challenge to the adequacy of mechanistic explanation in biology. Certain features of organisms appear to be inexplicable by appeal to mechanical law alone. Some biological phenomena, it seems, can only be accounted for teleologically. Contemporary evolutionary biology has by and large ignored this challenge. It is widely held that Darwin's theory of natural selection gives us an adequate, wholly mechanical account of the nature of organisms. In contemporary biology, the category of the organism plays virtually no explanatory role. Contemporary evolutionary biology is a science of sub-organismal entities-replicators. I argue that recent advances in developmental biology demonstrate the inadequacy of sub-organismal mechanism. The category of the organism, construed as a 'natural purpose' should play an ineliminable role in explaining ontogenetic development and adaptive evolution. According to Kant the natural purposiveness of organisms cannot be demonstrated to be an objective principle in nature, nor can purposiveness figure in genuine explain. I attempt to argue, by appeal to recent work on self-organization, that the purposiveness of organisms is a natural phenomenon, and, by appeal to the apparatus of invariance explanation, that biological purposiveness provides genuine, ineliminable biological explanations.

  9. The Influence of Social Threat on Pain, Aggression, and Empathy in Women.

    Science.gov (United States)

    Karos, Kai; Meulders, Ann; Goubert, Liesbet; Vlaeyen, Johan W S

    2018-03-01

    Only one published study has investigated the effect of a threatening social context on the perception and expression of pain, showing that social threat leads to increased pain reports but reduced nonverbal pain expression. The current study aimed to replicate and extend these findings to further explore the effects of a threatening social context. Healthy, female participants (N = 71) received 10 electrocutaneous stimuli delivered by a confederate. They were led to believe that the confederate was requested to administer 10 painful stimuli (control group) or that the confederate deliberately chose to deliver 10 painful stimuli when given the choice to deliver between 1 to 10 painful stimuli (social threat group). Self-reported pain intensity, unpleasantness, threat value of pain, and painful facial expression were assessed. Additionally, empathy and aggression toward the confederate were investigated. Social threat did not affect painful facial expression or self-reported pain intensity, but led to increased aggression toward the confederate. Moreover, perceived social threat predicted the threat value of pain and reduced empathy toward the confederate. We were not able to replicate the previously reported dissociation between pain reports and pain expression as a result of social threat. However, social threat was associated with an increased threat value of pain, increased aggression, and reduced empathy. A threatening social context affects how threatening pain is perceived and has interpersonal consequences such as increased aggression and reduced empathy, thereby creating a double burden on the individual suffering from pain. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  10. Heutiges Russisch (2) (Contemporary Russian [2])

    Science.gov (United States)

    Russisch, 1976

    1976-01-01

    Considers contemporary Russian usage with regard to variations in the genitive, accusative and nominative inflections and the synonymity of full and shortened adjective forms. Material is excerpted from "Stilistik der russischen Sprache" (Russian Language Style) by D. Rosental and M. Telenkowa. (Text is in German.) (FB)

  11. Contemporary Theories and International Law-Making

    NARCIS (Netherlands)

    Venzke, I.

    2013-01-01

    Many contemporary theories approach international law-making with a shift in emphasis from the sources of law towards the communicative practices in which a plethora of actors use, claim and speak international law. Whereas earlier approaches would look at the sources as the singular moment of

  12. The effects of physical threat on team processes during complex task performance

    NARCIS (Netherlands)

    Kamphuis, W.; Gaillard, A.W.K.; Vogelaar, A.L.W.

    2011-01-01

    Teams have become the norm for operating in dangerous and complex situations. To investigate how physical threat affects team performance, 27 threeperson teams engaged in a complex planning and problem-solving task, either under physical threat or under normal conditions. Threat consisted of the

  13. Implementation of Traditional Malay Design Values in Contemporary Malay Houses

    OpenAIRE

    Elham Hosseini; Gurupiah Mursib; Raja Nafida Raja Shahminan

    2016-01-01

    Traditional houses are the most essential architectural experience that is in harmony with the people's culture, beliefs, environment and lifestyles. The development of design values in contemporary architecture by tracking traditional design values in architecture paves the way for arguments concerning the implementation of authentic Malay traditional house design values in contemporary Malay houses. In addition, it is hypothesized that the Malay traditional houses theoretically provide a co...

  14. Religion and spirituality in contemporary dreams

    Directory of Open Access Journals (Sweden)

    Werner Nell

    2012-02-01

    Full Text Available This article examines the spiritual value and role of dreams in the lives of South African Christians, based on the findings of a qualitative research project in which semistructured interviews were used to examine the dream-related beliefs and practices of contemporary Christians. The findings indicated that dreams are still considered to be of distinct religious value and importance by a significant number of the Christian participants who took part in the study. Specifically, the participants reported that their dreams often serve as source of spiritual inspiration, insight and guidance, as well as feedback on decisions and ways of living. It was also indicated that dreams sometimes constituted an important natural resource in coming to terms with bereavement. In response to this, the article closes with a call for a re-evaluation of the position and value of dreams in contemporary Christianity, and offers several practical suggestions for working with dreams in a spiritual context.

  15. Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators.

    Science.gov (United States)

    Pennington, Charlotte R; Heim, Derek; Levy, Andrew R; Larkin, Derek T

    2016-01-01

    This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms.

  16. Endogenous Pain Modulation Induced by Extrinsic and Intrinsic Psychological Threat in Healthy Individuals.

    Science.gov (United States)

    Gibson, William; Moss, Penny; Cheng, Tak Ho; Garnier, Alexandre; Wright, Anthony; Wand, Benedict M

    2018-03-01

    Many factors interact to influence threat perception and the subsequent experience of pain. This study investigated the effect of observing pain (extrinsic threat) and intrinsic threat of pain to oneself on pressure pain threshold (PPT). Forty socially connected pairs of healthy volunteers were threat-primed and randomly allocated to experimental or control roles. An experimental pain modulation paradigm was applied, with non-nociceptive threat cues used as conditioning stimuli. In substudy 1, the extrinsic threat to the experimental participant was observation of the control partner in pain. The control participant underwent hand immersion in noxious and non-noxious water baths in randomized order. Change in the observing participant's PPT from baseline to mid- and postimmersion was calculated. A significant interaction was found for PPT between conditions and test time (F 2,78  = 24.9, P Extrinsic and intrinsic threat of pain, in the absence of any afferent input therefore influences pain modulation. This may need to be considered in studies that use noxious afferent input with populations who show dysfunctional pain modulation. The effect on endogenous analgesia of observing another's pain and of threat of pain to oneself was investigated. Extrinsic as well as intrinsic threat cues, in the absence of any afferent input, increased pain thresholds, suggesting that mere threat of pain may initiate analgesic effects in traditional noxious experimental paradigms. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  17. CONTEMPORARY TRENDS IN GEOGRAPHICAL EDUCATION

    Directory of Open Access Journals (Sweden)

    M. Wasileva

    2017-01-01

    Full Text Available The geography includes rich, diverse and comprehensive themes that give us an understanding of our changing environment and interconnected world. It includes the study of the physical environment and resources; cultures, economies and societies; people and places; and global development and civic participation. As a subject, geography is particularly valuable because it provides information for exploring contemporary issues from a different perspective. This geographical information affects us all at work and in our daily lives and helps us make informed decisions that shape our future. All these facts result in a wide discussion on many topical issues in contemporary geography didactics. Subjects of research are the new geography and economics curriculum as well as construction of modern learning process. The paper presents briefly some of the current trends and key issues of geodidactics. As central notions we consider and analyze the training/educational goals, geography curriculum, target groups and environment of geography training, training methods as well as the information sources used in geography education. We adhere that all the above-mentioned finds its reflection in planning, analysis and assessment of education and thus in its quality and effectiveness.

  18. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  19. Vigilant attention to threat, sleep patterns, and anxiety in peripubertal youth.

    Science.gov (United States)

    Ricketts, Emily J; Price, Rebecca B; Siegle, Greg J; Silk, Jennifer S; Forbes, Erika E; Ladouceur, Cecile D; Harvey, Allison G; Ryan, Neal D; Dahl, Ronald E; McMakin, Dana L

    2018-05-02

    Vigilant attention to threat is commonly observed in anxiety, undergoes developmental changes in early adolescence, and has been proposed to interfere with sleep initiation and maintenance. We present one of the first studies to use objective measures to examine associations between vigilant attention to threat and difficulties initiating and maintaining sleep in an early adolescent anxious sample. We also explore the moderating role of development (age, puberty) and sex. Participants were 66 peripubertal youth (ages 9-14) with a primary anxiety disorder and 24 healthy control subjects. A dot-probe task was used to assess attentional bias to fearful relative to neutral face stimuli. Eye-tracking indexed selective attentional bias to threat, and reaction time bias indexed action readiness to threat. Sleep was assessed via actigraphy (e.g. sleep onset delay, wake after sleep onset, etc.), parent report (Children's Sleep Habits Questionnaire), and child report (Sleep Self-Report). The Pediatric Anxiety Rating Scale assessed anxiety severity. Eye-tracking initial threat fixation bias (β = .33, p = .001) and threat dwell time bias (β = .22, p = .041) were positively associated with sleep onset latency. Reaction time bias was positively associated with wake after sleep onset (β = .24, p = .026) and parent-reported sleep disturbance (β = .25, p = .019). Anxiety (severity, diagnosis) was not associated with these outcomes. Sex (β = -.32, p = .036) moderated the relation between initial threat fixation bias and sleep onset latency, with a positive association for males (p = .005), but not for females (p = .289). Age and pubertal status did not moderate effects. Vigilant attention to threat is related to longer sleep onset and reduced sleep maintenance. These associations are not stronger in early adolescents with anxiety. Implications for early intervention or prevention that targets vigilant attention to threat to impact sleep disturbance, and

  20. The historiography of contemporary science, technology, and medicine writing recent science

    CERN Document Server

    Söderqvist, Thomas

    2006-01-01

    As historians of science increasingly turn to work on recent (post 1945) science, the historiographical and methodological problems associated with the history of contemporary science are debated with growing frequency and urgency. Bringing together authorities on the history, historiography and methodology of recent and contemporary science, this book reviews the problems facing historians of technology, contemporary science and medicine, and explores new ways forward. With contributions from key researchers in the field, the text covers topics that will be of ever increasing interest to historians of post-war science, including the difficulties of accessing and using secret archival material, the interactions between archivists, historians and scientists, and the politics of evidence and historical accounts.

  1. Girls can play ball: Stereotype threat reduces variability in a motor skill.

    Science.gov (United States)

    Huber, Meghan E; Brown, Adam J; Sternad, Dagmar

    2016-09-01

    The majority of research on stereotype threat shows what is expected: threat debilitates performance. However, facilitation is also possible, although seldom reported. This study investigated how stereotype threat influences novice females when performing the sensorimotor task of bouncing a ball to a target. We tested the predictions of two prevailing accounts for debilitation and facilitation due to sterotype threat effects: working memory and mere effort. Experimental results showed that variability in performance decreased more in stigmatized females than in control females, consistent with the prediction of the mere effort account, but inconsistent with the working memory account. These findings suggest that stereotype threat effects may be predicated upon the correctness of the dominant motor behavior, rather than on a novice-expert distinction or task difficulty. Further, a comprehensive understanding should incorporate the fact that stereotype threat can facilitate, as well as debilitate, performance. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  3. Heutiges Russisch (Schluss) (Contemporary Russian [Conclusion])

    Science.gov (United States)

    Russisch, 1976

    1976-01-01

    Considers two aspects of contemporary Russian language usage: (1) synonymity of prepositions, and (2) semantic and stylistic differences arising when certain verbs govern nouns in different cases. Material is excerpted from "Stilistik der russischen Sprache" (Russian Language Style) by Rosental and M. Telenkowa. (Text is in German.) (FB)

  4. In search of the 'Wild Contemporary'

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    further back to touch upon the legacy of Marinetti/Futurism and Le Corbusier). These ideas and visions, which at their time was considered extreme and far-fetched, are used as ‘prisms' for setting up the imaginary visioning of contemporary and future challenges to mobility within and between cities...

  5. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  6. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  7. Toddlers’ Duration of Attention towards Putative Threat

    Science.gov (United States)

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  8. The Cognitive Hookman: Using Contemporary Legends in the ESL/EFL Classroom.

    Science.gov (United States)

    Layzer, Carolyn

    This paper discusses the use of contemporary legends in the teaching of language and culture, specifically in English-as-a-second-language. Contemporary legends are a type of folk narrative, but unlike folk tales, they are believed to be true. They usually concern ordinary people who are known to the narrator, occur in familiar settings, and are…

  9. THERMAL PERFORMANCE OF CONTEMPORARY HOUSE IN THE CITY OF DHAKA

    Directory of Open Access Journals (Sweden)

    Rumana Rashid

    2008-01-01

    Full Text Available A contemporary house located within a dense area of Dhaka, the capital city of Bangladesh was selected to evaluate its thermal performance. The study was based on the field measurements conducted during selected days in the summer period. The field survey was conducted using one set of thermal data logger installed in the selected house to record the air temperature and relative humidity of both indoor and outdoor spaces. The research result concluded that the contemporary house experienced much higher temperature during night and early morning. The indoor air temperature during the daytime was equal to the outdoor or sometime higher illustrating that it was overheating. On the other hand, previous study on traditional house within the same area showed that indoor air temperature was lower than outdoor air temperature, something that the contemporary house failed to achieve.

  10. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    Science.gov (United States)

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  11. Science priorities for reducing the threat of invasive species

    Science.gov (United States)

    E. A. Chornesky; A. M. Bartuska; G. H. Aplet; J. Cummings-Carlson; F. W. Davis; J. Eskow; D. R. Gordon; K. W. Gottschalk; R. A. Haack; A. J. Hansen; R. N. Mack; F. J. Rahel; M. A. Shannon; L. A. Wainger; T. B. Wigley

    2005-01-01

    Invasive species pose a major, yet poorly addressed, threat to sustainable forestry. Here we set forth an interdisciplinary science strategy of research, development, and applications to reduce this threat. To spur action by public and private entities that too often are slow, reluctant, or unable to act, we recommend (a) better integrating invasive species into...

  12. The Contemporary Significance of the Holocaust for Australian Psychiatry.

    Science.gov (United States)

    Robertson, Michael; Light, Edwina; Lipworth, Wendy; Walter, Garry

    2016-01-01

    In this paper we survey briefly the components of the Holocaust directly relevant to the psychiatric profession and identify the main themes of relevance to contemporary psychiatry. The ‘euthanasia’ program; the persecution of lesbian, gay, bisexual, transgender, and intersex (LGBTI) citizens; and the complex relationship between the psychiatric profession and Nazi state are the main themes to emerge from this survey. We then compare this period with key themes in the history of Australian psychiatry and link these themes to some of the contemporary ethical challenges the profession faces.

  13. Final report from the NKS NordThreat seminar in Asker

    Energy Technology Data Exchange (ETDEWEB)

    Eikelmann, I M.H.; Selnaes, OE G [eds.; Norwegian Radiation Protection Authority (Norway)

    2009-11-15

    Changes in the international security environment have lead to an increased attention towards the need to revise various threat assessments in the Nordic countries. Together with recent events such as incidents at Nordic nuclear power plants, orphan sources and accidents involving nuclear powered vessels, this has given a good opportunity for an exchange of information and opinions. The NKS-B NordThreat seminar took place at Sem gjestegaard in Asker outside Oslo, Norway on 30 - 31 October 2008. Main topics in the seminar were: 1) National threat assessments 2) Potential hazards 3) Experience from previous incidents 4) Public perception of nuclear and radiological threats and information challenges 5) Challenges for future preparedness. There were about 40 participants at the seminar. These were mainly members of the NKS organisations, invited speakers and representatives from various Norwegian emergency preparedness organisations. (author)

  14. JPRS Report, Soviet Union, The Working Class & The Contemporary World.

    Science.gov (United States)

    1987-10-15

    Beatles and Rolling Stones groups, the astronaut J. Glenn, Dzh. (sic) Eisenhower and J. Kennedy, M.L. King and the screen actor M. Brando. At the ...JPRS-UWC-87-002 15 October 1987 FOREIGN BROADCAST INFORMATION SERVICE JPRS Report— Soviet Union THE WORKING CLASS & THE CONTEMPORARY WORLD...MmmKmoN STATEMENT A 19980714 146 mcWAUTtmBPBVmi Soviet Union The Working Class & The Contemporary World No 3, May-June 1987 JPRS-UWC-87-002

  15. Tales of the unexpected: Integrating career shocks in the contemporary careers literature

    NARCIS (Netherlands)

    Akkermans, J.; Seibert, S.E.; Mol, S.T.

    2018-01-01

    Orientation – This paper addresses the interplay between individual agency and contextual factors in contemporary career development processes. In light of the prominence of the former in the contemporary scholarly debate, we present a case for a more comprehensive approach by heeding the latter as

  16. Tales of the unexpected : Integrating career shocks in the contemporary careers literature

    NARCIS (Netherlands)

    Akkermans, Jos; Seibert, Scott E.; Mol, Stefan T.

    2018-01-01

    Orientation: This article addresses the interplay between individual agency and contextual factors in contemporary career development processes. In light of the prominence of the former in the contemporary scholarly debate, we present a case for a more comprehensive approach by heeding the latter as

  17. The conditions for attaining the greatest degree of system stability with strict generator excitation control

    Energy Technology Data Exchange (ETDEWEB)

    Gruzdev, I.A.; Ekimova, M.M.; Truspekova, G.A.

    1982-01-01

    Expressions are derived for an idealized model of a complex electric power system; these expressions define the greatest level of stability of an electric power system and the optimum combination of stabilization factors with automatic excitation control in a single power system. The possibility of increasing the level of stability of an electric power system with simultaneous strict automatic excitation control of the synychronous generators in several power systems is analyzed.

  18. Modulation of the startle reflex by heat pain: does threat play a role?

    Science.gov (United States)

    Horn-Hofmann, C; Lautenbacher, S

    2015-02-01

    Previous studies have indicated that the startle reflex is potentiated by phasic, but not by tonic, heat pain, although the latter is seen as more strongly associated with emotional responses and more similar to clinical pain. The threat value of pain might be a decisive variable, which is not influenced alone by stimulus duration. This study aimed at comparing startle responses to tonic heat pain stimulation with varying degrees of threat. We hypothesized that the expectation of unpredictable temperature increases would evoke higher threat and thereby potentiate startle compared with the expectation of constant stimulation. Healthy, pain-free subjects (n = 40) underwent painful stimulation in two conditions (low/high threat) in balanced order. The only difference between the two conditions was that in the high-threat condition 50% of the trials were announced to include a short further noxious temperature increase at the end. Startle tones were presented prior to this temperature increase still in the phase of anticipation. We observed startle potentiation in the high-threat compared with the low-threat condition, but only in those participants who took part first in the high-threat condition. Habituation could not account for these findings, as we detected no significant decline of startle responses in the course of both conditions. Our results suggest that subjective threat might indeed be decisive for the action of pain on startle; the threat level appears not only influenced by actual expectations but also by previous experiences with pain as threatening or not. © 2014 European Pain Federation - EFIC®

  19. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  20. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for

  1. A Comparative Study of Entrance in Traditional and Contemporary Houses of Iran

    Directory of Open Access Journals (Sweden)

    Ramin Dehbandi

    2017-12-01

    Full Text Available In contemporary houses in Iran, because of changes in the methods of designing and building houses, importance of entrance reduced to such level that now in contemporary houses entrance is just a door. Entrance correlates indoor safe space of house and outdoors. It`s importance lays in controlling entry, exit, territory and hierarchy. Since house owners were satisfied with traditional form of entrance, it is a good idea to learn from them in designing new entrances. The purpose of this research is to find a way for designing appropriate entrances for Iranian contemporary houses. To do this at first 40 traditional houses and 40 contemporary houses in Isfahan and Kashan were selected. These two cities are from margin of desert and the origin of traditional houses of Iran. Analysis showed that blockage of visual and phonic relation, creating a space between outdoor public space and indoor private space, creating access patterns to internal spaces and traits that separate in and out were the most significant properties of traditional entrances. All these traits are ignored in contemporary entrances. Suggestions made for design include creating public meeting space in yard and creating a separate entrance space for each house in apartments.

  2. The neurobiology of safety and threat learning in infancy.

    Science.gov (United States)

    Debiec, Jacek; Sullivan, Regina M

    2017-09-01

    What an animal needs to learn to survive is altered dramatically as they change from dependence on the parent for protection to independence and reliance on self-defense. This transition occurs in most altricial animals, but our understanding of the behavioral neurobiology has mostly relied on the infant rat. The transformation from dependence to independence occurs over three weeks in pups and is accompanied by complex changes in responses to both natural and learned threats and the supporting neural circuitry. Overall, in early life, the threat system is quiescent and learning is biased towards acquiring attachment related behaviors to support attachment to the caregiver and proximity seeking. Caregiver-associated cues learned in infancy have the ability to provide a sense of safety throughout lifetime. This attachment/safety system is activated by learning involving presumably pleasurable stimuli (food, warmth) but also painful stimuli (tailpinch, moderate shock). At about the midway point to independence, pups begin to have access to the adult-like amygdala-dependent threat system and amygdala-dependent responses to natural dangers such as predator odors. However, pups have the ability to switch between the infant and adult-like system, which is controlled by maternal presence and modification of stress hormones. Specifically, if the pup is alone, it will learn fear but if with the mother it will learn attachment (10-15days of age). As pups begin to approach weaning, pups lose access to the attachment system and rely only on the amygdala-dependent threat system. However, pups learning system is complex and exhibits flexibility that enables the mother to override the control of the attachment circuit, since newborn pups may acquire threat responses from the mother expressing fear in their presence. Together, these data suggest that the development of pups' threat learning system is not only dependent upon maturation of the amygdala, but it is also exquisitely

  3. The Origins of Contemporary Ukrainian Nationalism

    OpenAIRE

    Сергей Сергеевич Жильцов

    2014-01-01

    The article idedicated to formation and development of Ukrainian nationalism after Ukraine’s independence. The author analyzes fundamental reasons of raise of influence of Ukrainian nationalism. Theoretical foundations of contemporary Ukrainian nationalism are analyzed. In addition, the author evaluates the possible role of nationalism in the future development of Ukraine.

  4. Contemporary management of advanced laryngeal cancer.

    Science.gov (United States)

    Britt, Christopher J; Gourin, Christine G

    2017-10-01

    The treatment of advanced laryngeal cancer has undergone a paradigm shift in recent years, with an increase in chemoradiation for organ preservation and a decrease in primary surgery. This review will summarize the contemporary management of advanced laryngeal cancer and discuss treatment-related toxicity and strategies to improve outcomes. NA.

  5. The threat in Iran and United States of America criminal law

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Mahdavi Sabet

    2017-06-01

    Full Text Available Iran criminal law and United States of America have considered the threat as a crime and have imposed the penalty for it. The threat importance is considered in where that from one side the persons and civilians in accordance with domestic laws and international documents are involved very important right entitled of "Freedom of speech" and the mentioned rights violation is associated with domestic and foreign criminal sanctions and on the other hand, the expression of some words or commit a certain attitude with them and in accordance with the same laws are prohibited and to be considered as the criminal threat. However, the laws of both countries have adopted different approaches regarding the circumstances realization of the mentioned crime and some of its examples, although in some criminal threat characteristics such as lack of necessity to apply the means are unlawful and have similarity in its intentionality. In order to detailed understanding of the similarities and differences of criminal threats in Iran and America laws, which leads to the identification of existing disadvantages and advantages and providing the strategies regarding the deficiencies of the current laws and trends, so we are investigating the structure and threat features in criminal law of both countries.

  6. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  7. The effect of stereotype threat on performance of a rhythmic motor skill.

    Science.gov (United States)

    Huber, Meghan E; Seitchik, Allison E; Brown, Adam J; Sternad, Dagmar; Harkins, Stephen G

    2015-04-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. This study tested the effect of stereotype threat on a rhythmic ball bouncing task, where previous analyses of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. (c) 2015 APA, all rights reserved.

  8. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  9. Early Warnings of Cyber Threats in Online Discussions

    OpenAIRE

    Sapienza, Anna; Bessi, Alessandro; Damodaran, Saranya; Shakarian, Paulo; Lerman, Kristina; Ferrara, Emilio

    2018-01-01

    We introduce a system for automatically generating warnings of imminent or current cyber-threats. Our system leverages the communication of malicious actors on the darkweb, as well as activity of cyber security experts on social media platforms like Twitter. In a time period between September, 2016 and January, 2017, our method generated 661 alerts of which about 84% were relevant to current or imminent cyber-threats. In the paper, we first illustrate the rationale and workflow of our system,...

  10. Prejudice towards Muslims in The Netherlands : Testing integrated threat theory

    NARCIS (Netherlands)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-01-01

    This study uses integrated threat theory to examine Dutch adolescents’ (N ¼ 1; 187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators

  11. Towards Building Science Teachers’ Understandings of Contemporary Science Practices

    Directory of Open Access Journals (Sweden)

    Greg Lancaster

    2017-03-01

    Full Text Available Faculties of Education and Science at Monash University have designed a Masters unit to assist pre-service and in-service science teachers in exploring the practices of contemporary science and examine how varied understandings can influence science communication. Teachers are encouraged to explore their current understandings of the Nature of Science (NoS and to contrast their views with those known to be widely held by society (Cobern & Loving, 1998. Teachers are challenged to provide insights into their thinking relating to the NoS. In order to build understandings of contemporary science practice each teacher shadows a research scientist and engages them in conversations intended to explore the scientists’ views of NoS and practice. Findings suggest that teachers were initially uncomfortable with the challenge to express ideas relating to their NoS and were also surprised how diverse the views of NoS can be among teachers, scientists and their peers, and that these views can directly impact ways of communicating contemporary science practice.

  12. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  13. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  14. The Millennial generation as an insider threat: high risk or overhyped?

    OpenAIRE

    Fisher, David J.

    2015-01-01

    Approved for public release; distribution is unlimited Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits ...

  15. Analyzing Cyber-Physical Threats on Robotic Platforms †

    Science.gov (United States)

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  16. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  17. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  18. Complement Clause Formation In Leteh | Ansah | Contemporary ...

    African Journals Online (AJOL)

    Contemporary Journal of African Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 2, No 1 (2014) >. Log in or Register to get access to full text downloads.

  19. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study.

    Science.gov (United States)

    Abdou, Cleopatra M; Fingerhut, Adam W; Jackson, James S; Wheaton, Felicia

    2016-02-01

    Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. Copyright © 2016. Published by Elsevier Inc.

  20. Friendship Characteristics, Threat Appraisals, and Varieties of Jealousy About Romantic Partners’ Friendships

    Directory of Open Access Journals (Sweden)

    Timothy R. Worley

    2014-12-01

    Full Text Available This study examined the role of friendship sex composition, friendship history, and threat appraisals in the experience of jealousy about a romantic partner’s involvement in extradyadic friendships. Using a survey, 201 individuals responded to scenarios describing a romantic partner’s involvement in a significant friendship outside the romantic dyad. A partner’s involvement in a cross-sex friendship was associated with greater perceptions of threat to both the existence and quality of the romantic relationship than was a partner’s involvement in a same-sex friendship. Further, the specific forms of jealousy experienced about partners’ friendships were dependent on the threat appraisals individuals associated with the friendships. Appraisals of relational existence threat mediated the influence of friendship characteristics (i.e., sex composition and history on sexual jealousy and companionship jealousy, while appraisals of relational quality threat mediated the influence of friendship characteristics on intimacy jealousy, power jealousy, and companionship jealousy. This study points toward the central role of threat appraisals in mediating associations between rival characteristics and various forms of jealousy about a partner’s friendships.

  1. The Origins of Contemporary Ukrainian Nationalism

    Directory of Open Access Journals (Sweden)

    Сергей Сергеевич Жильцов

    2014-12-01

    Full Text Available The article idedicated to formation and development of Ukrainian nationalism after Ukraine’s independence. The author analyzes fundamental reasons of raise of influence of Ukrainian nationalism. Theoretical foundations of contemporary Ukrainian nationalism are analyzed. In addition, the author evaluates the possible role of nationalism in the future development of Ukraine.

  2. Contemporary management of pyloric stenosis.

    Science.gov (United States)

    Jobson, Matthew; Hall, Nigel J

    2016-08-01

    Hypertrophic pyloric stenosis is a common surgical cause of vomiting in infants. Following appropriate fluid resuscitation, the mainstay of treatment is pyloromyotomy. This article reviews the aetiology and pathophysiology of hypertrophic pyloric stenosis, its clinical presentation, the role of imaging, the preoperative and postoperative management, current surgical approaches and non-surgical treatment options. Contemporary postoperative feeding regimens, outcomes and complications are also discussed. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  4. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  5. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  6. Film and Media as a Site for Memory in Contemporary Art

    Directory of Open Access Journals (Sweden)

    Martinez Rosario Domingo

    2017-12-01

    Full Text Available This article explores the relationship between film, contemporary art and cultural memory. It aims to set out an overview of the use of film and media in artworks dealing with memory, history and the past. In recent decades, film and media projections have become some of the most common mediums employed in art installations, multi-screen artworks, sculptures, multi-media art, as well as many other forms of contemporary art. In order to examine the links between film, contemporary art and memory, I will firstly take a brief look at cultural memory and, secondly, I will set out an overview of some pieces of art that utilize film and video to elucidate historical and mnemonic accounts. Thirdly, I will consider the specific features and challenges of film and media that make them an effective repository in art to represent memory. I will consider the work of artists like Tacita Dean, Krzysztof Wodiczko and Jane and Louise Wilson, whose art is heavily influenced and inspired by concepts of memory, history, nostalgia and melancholy. These artists provide examples of the use of film in art, and they have established contemporary art as a site for memory.

  7. The Threat Effect of Active Labor Market Programs: A Systematic Review

    DEFF Research Database (Denmark)

    Filges, Trine; Hansen, Anne Toft

    2017-01-01

    This paper is a systematic review of the threat effect of active labor market programs for unemployed individuals. The threat effect is the induced change in the hazard rate of leaving unemployment prior to program participation. Studies included in the review all estimated a threat effect...... a hazard rate of 1.27 for the pooled estimate. It has thus been concluded that active labor market programs constitute a significant threat effect......., with the participants in all cases being unemployed individuals in receipt of benefit of some kind during their tenure of unemployment. Seven of these studies have been included in a meta-analysis: The meta-analysis, which has been carried out using a random effects model to account for heterogeneity, indicated...

  8. Evolution of the perception of the threats to security in Spain

    Directory of Open Access Journals (Sweden)

    Rafael Grasa

    1993-07-01

    Full Text Available security was internal, in other words, subversion and opposition to the regime. Public opinion, however, revealed that characteristics very different to those in the context of the western block existed, such as a void perception of the soviet threat as opposed to a marked antiamericanism for its support of the regime.This legacy of threats weighed heavily during the transition together with the existence of a cleavage between the armed forces, the political actors and public opinion regarding the real necessity of intergration into NATO. In the eighties there exists a clear differentiation between the threats perceived by public opinion and those considered by the political elites. With regard to the former,serious threats to Spain do not exist. only certain concerns when the subject of security took on importance in the field of public opinion, such as during the referendum campaign over NATO in 1986 which was mixed with the scarce perception of the soviet threat, theconstant danger represented by the United States and the slight rise in those who believed in the Moroccan threat, and the impact of the Gulf War in 1991 and the consequent increase of the threat represented by the arab countries. For the political actors, the mainthreat contemplated was the protection of territorial integrity on a stage closer to the western Mediterranean instead of a global threat to the western block something only considered at a theoretical level with the strategic concept of Spanish defence within the framework of participation in NATO.From 1992 onwards with the Defence Directive, the threat concept is replaced by that of risk and which recovers the importance given over to North Africa. It is argued in the belief that security is indivisible and must be shared not only with the European members. A greater convergence is also initiated in the nineties between the political actors and public opinion with respect to considering what are the risks in a global

  9. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  10. Contemporary Transitional Justice

    DEFF Research Database (Denmark)

    Gissel, Line Engbo

    2017-01-01

    This article studies the contemporary expression of transitional justice, a field of practice through which global governance is exercised. It argues that transitional justice is being normalised, given the normative and empirical de-legitimisation of its premise of exceptionalism. The article...... theorises exceptionalism and normalcy in transitional justice and identifies three macro-level causes of normalisation: the legalisation, internationalisation, and professionalization of the field. This argument is illustrated by a study of Uganda’s trajectory of transitional justice since 1986. Across five...... phases of transitional justice, processes of legalisation, internationalisation, and professionalization have contributed to the gradual dismantling of the country’s exceptional justice. The case demonstrates, further, that normalization is a contested and incomplete process....

  11. Developing and Validating a Santa Ana Wildfire Threat Index

    Science.gov (United States)

    Capps, S. B.; Rolinski, T.; DAgostino, B.; Vanderburg, S.; Fovell, R. G.; Cao, Y.

    2014-12-01

    Santa Ana winds, common to southern California during the fall through spring, are a type of katabatic wind that originates from a direction generally ranging from 360°/0° to 100° and is usually accompanied by very low humidity. Since fuel conditions tend to be driest from late September through the middle of November, Santa Ana winds occurring during this period have the greatest potential to produce large, devastating fires when an ignition occurs. Such catastrophic fires occurred in 1993, 2003, 2007, and 2008. Because of the destructive nature of these fires, there has been a growing desire to categorize Santa Ana wind events in much the same way that tropical cyclones have been categorized. The Santa Ana Wildfire Threat index (SAWT) is an attempt to categorize such events with respect to fire activity, based on surface wind velocity, dew point depression, and forecasted fuel conditions. The index, a USDA Forest Service product, was developed by the Forest Service in collaboration with San Diego Gas and Electric Utility (SDG&E), the Department of Atmospheric and Oceanic Sciences at UCLA, The Desert Research Institute (DRI), and Vertum Partners. The methodology behind the SAWT index, along with the index itself will be presented in detail. Also, there will be a discussion on the construction of a 30-year climatology of the index, which includes various meteorological and fuel parameters. We will demonstrate the usefulness of the index as another decision support tool for fire agencies and first responders, and how it could assist the general public and private industry in the preparation of critical Santa Ana wind events.

  12. Assessment of wind erosion threat for soils in cadastral area of Hajske

    International Nuclear Information System (INIS)

    Muchova, Z.; Stredanska, A.

    2008-01-01

    This contribution illustrates the application of methods of erosion threat assessment in lan adaptation projects. Calculations of the soil erosion index of particular soil blocks are demonstrated for the cadastral area of Hajske. Two methods for assessment of erosion threat have been applied. First the assessment based on the ecological soil-quality units (ESQU) has been performed. Next, the Pasak method for a detailed analysis of the soil erosion threat was applied. Both of the mentioned approaches are recommended for the land adaption projects. Based on the results, the soil blocks have been ranked by their soil erosion threat. (authors)

  13. The Motivation Analysis Test: an historical and contemporary evaluation.

    Science.gov (United States)

    Bernard, Larry C; Walsh, R Patricia; Mills, Michael

    2005-04-01

    This is an historical review and contemporary empirical evaluation of the Motivation Analysis Test (MAT), one of the first tests to take a psychometric approach to the assessment of motivation. Reviews were quite positive, but the test is now over 50 years old. Nevertheless, it employs innovations in measurement not widely used in objective measurement then or now: (1) subtests with different formats, (2) disguised items, (3) speeded administration procedures, and (4) ipsative format and scoring procedures. These issues are discussed and a contemporary sample (N = 360) obtained to evaluate the Motivation Analysis Test in light of its innovative characteristics.

  14. BUILDING UP STATE STRATEGIC RESISTANCE AGAINST HYBRID THREATS

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2017-11-01

    Full Text Available Hybrid warfare, conducted in Ukraine since 2014, has become a new geopolitical phenomenon which threatens the Euro-Atlantic security that appeared after the collapse of the bipolar world. The paper discusses how the Russian Federation takes advantage of hybrid warfare to achieve its political objectives and to further its own interests. The paper also contains an assessment of the threat of hybrid warfare in Poland and determines what undertakings are necessary to effectively counter threats coming from Russia.

  15. Policing cyber hate, cyber threat and cyber terrorism

    OpenAIRE

    Chambers-Jones, C.

    2013-01-01

    In late August 2012 the Government Forum of Incident Response and Cyber security Teams (GFIRST) gathered in Atlanta to discuss cyber threats and how new realities are emerging and how new forms of regulation are needed. At the same time Policing cyber hate, cyber threat and cyber terrorism was published. This comprehensive book brings together a divergent problem and tackles each with a candid exploration. The book has ten chapters and covers aspects such as extortion via the internet, the ps...

  16. Teaching Medical Student Psychiatry Through Contemporary Music

    Science.gov (United States)

    Egan, William H.

    1977-01-01

    An audio technique uses contemporary music recordings to illustrate various personality disorders, including: schizoid, paranoid, compulsive, antisocial, and hysterical. The works of Bob Dylan, Paul Simon, Harry Chapin, the Beatles, Janis Ian, James Taylor, Tammy Wynette, and others are cited. (LBH)

  17. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  18. Girls Can Play Ball: Stereotype Threat Reduces Variability in a Motor Skill

    Science.gov (United States)

    Huber, Meghan E.; Brown, Adam J.; Sternad, Dagmar

    2016-01-01

    The majority of research on stereotype threat shows what is expected: threat debilitates performance. However, facilitation is also possible, although seldom reported. This study investigated how stereotype threat influences novice females when performing the sensorimotor task of bouncing a ball to target. We tested the predictions of two prevailing accounts for debilitation and facilitation due to ST effects: working memory and mere effort. Experimental results showed that variability in performance decreased more in stigmatized females than in control females, consistent with the prediction of the mere effort account, but inconsistent with the working memory account. These findings suggest that stereotype threat effects may be predicated upon the correctness of the dominant motor behavior rather than on a novice-expert distinction or task difficulty. Further, a comprehensive understanding should incorporate the fact that stereotype threat can facilitate, as well as debilitate, performance. PMID:27249638

  19. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment.

  20. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    International Nuclear Information System (INIS)

    Suh, Young A; Yim, Man-Sung

    2016-01-01

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment

  1. Antropology according to contemporary orthodox theologians

    Directory of Open Access Journals (Sweden)

    Krzysztof Leśniewski

    2014-11-01

    Full Text Available The article presents anthropological views of some very influential Orthodox theologians. The author starts his attempt from sketching a direct historical context of a rapid development of anthropology since19th century. He indicates that since the middle of 20th century one cannotice an increasing interest concerning on the understanding of human person, human freedom and human rights in social structures. Then he summarizes main points of the mystical anthropology of Vladimir Lossky. This very influential theologian, who concentrated mostly oncategory of person in apophatic and Trinitarian perspective on the basisof the patristic wisdom, has influenced many contemporary religious thinkers.Grounds of the anthropological reflection of Orthodox theologians were described in the second part of the article. Contemporary theologians have been trying to find answers for such questions as: “Who is a human being?”; “How to understand his or her freedom, rights, morality, life and existence?”; “What does compose the essence of his or her relationswith other human beings in the community of the Church and society”– taking into account the Divine Scripture, the teaching of the Churchand modern philosophical reflections.The third part of the article shows four examples of Greek theologians who significantly have contributed to the contemporary discussion on the mystery of human person. Each of them characterizes of a specific attempt towards looking for anthropological solutions from Christian point of view. The author labeled the main interest of each of them by a specific title: Panayiotis Nellas – a Christocentric exponent of patristic anthropology, Nikos Nissiotis – a courageous searcher of bases of dialogical anthropology, Christos Yannaras – a brilliant architect of relational ontology of person, Metropolitan John Zizioulas – a persistent builder of personalistic ecclesiological anthropology.

  2. Contemporary Drama in the English Class.

    Science.gov (United States)

    Siegfried, William

    1968-01-01

    Various approaches that teachers can use to help students interpret contemporary plays are presented in this discussion of teaching drama. Plays discussed include two from the Theater of Illusion ("Look Back in Anger,""A Raisin in the Sun"), two from the Theater of the Absurd ("Rhonoceros,""Rosencrantz and Guildenstern are Dead"), and two from…

  3. Cyber threats to health information systems: A systematic review.

    Science.gov (United States)

    Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott

    2016-01-01

    Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.

  4. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists ( M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  5. Fish species of greatest conservation need in wadeable Iowa streams: current status and effectiveness of Aquatic Gap Program distribution models

    Science.gov (United States)

    Sindt, Anthony R.; Pierce, Clay; Quist, Michael C.

    2012-01-01

    Effective conservation of fish species of greatest conservation need (SGCN) requires an understanding of species–habitat relationships and distributional trends. Thus, modeling the distribution of fish species across large spatial scales may be a valuable tool for conservation planning. Our goals were to evaluate the status of 10 fish SGCN in wadeable Iowa streams and to test the effectiveness of Iowa Aquatic Gap Analysis Project (IAGAP) species distribution models. We sampled fish assemblages from 86 wadeable stream segments in the Mississippi River drainage of Iowa during 2009 and 2010 to provide contemporary, independent fish species presence–absence data. The frequencies of occurrence in stream segments where species were historically documented varied from 0.0% for redfin shiner Lythrurus umbratilis to 100.0% for American brook lampreyLampetra appendix, with a mean of 53.0%, suggesting that the status of Iowa fish SGCN is highly variable. Cohen's kappa values and other model performance measures were calculated by comparing field-collected presence–absence data with IAGAP model–predicted presences and absences for 12 fish SGCN. Kappa values varied from 0.00 to 0.50, with a mean of 0.15. The models only predicted the occurrences of banded darterEtheostoma zonale, southern redbelly dace Phoxinus erythrogaster, and longnose daceRhinichthys cataractae more accurately than would be expected by chance. Overall, the accuracy of the twelve models was low, with a mean correct classification rate of 58.3%. Poor model performance probably reflects the difficulties associated with modeling the distribution of rare species and the inability of the large-scale habitat variables used in IAGAP models to explain the variation in fish species occurrences. Our results highlight the importance of quantifying the confidence in species distribution model predictions with an independent data set and the need for long-term monitoring to better understand the

  6. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  7. Threat, prejudice and the impact of the riots in England.

    Science.gov (United States)

    de Rooij, Eline A; Goodwin, Matthew J; Pickup, Mark

    2015-05-01

    This paper examines how a major outbreak of rioting in England in 2011 impacted on prejudice toward three minority groups in Britain: Muslims, Black British and East Europeans. We test whether the riots mobilized individuals by increasing feelings of realistic and symbolic threat and ultimately prejudice, or whether the riots galvanized those already concerned about minorities, thus strengthening the relationship between threat and prejudice. We conducted three national surveys - before, after and one year on from the riots - and show that after the riots individuals were more likely to perceive threats to society's security and culture, and by extension express increased prejudice toward Black British and East European minorities. We find little evidence of a galvanizing impact. One year later, threat and prejudice had returned to pre-riots levels; however, results from a survey experiment show that priming memories of the riots can raise levels of prejudice. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Contemporary Education for Public Administration

    Directory of Open Access Journals (Sweden)

    Ivan Koprić

    2007-01-01

    Full Text Available The paper examines the development of contemporary administrative education, as a crucial criterion without which it is not possible to achieve professionalism in public administration. While the term professionalism has a variety of meanings, today it is largely deemed that specific educational preparation is a foundation without which other elements of professionalism in public administration cannot be achieved. The level of professionalism, competence, education and knowledge thus become critical variables of administration reforms in transitional countries. Afterwards, the author examines the trends in the development of contemporary administrative education, pointing particularly to the importance of establishing a coherent, vertically passable system, i.e. a system which encompasses all levels of education – from secondary school education to doctoral studies. In this matter, one of the most important features in the development of administrative studies is their diversification, with simultaneous strengthening of the general administrative profile. Thus, the general administrative profile becomes modified, updated and extended by new teaching disciplines. In the final section of the paper, the author addresses the performance of administrative education in Croatia, pointing to its underdevelopment. Indeed, the author suggests that there are no sustainable results of reforms without the training of staff for administration.

  9. ESOTERIC IN CONTEMPORARY LITHUANIAN PROSE

    Directory of Open Access Journals (Sweden)

    Ieva Naikienė

    2018-04-01

    Full Text Available This article focuses on esotericism in contemporary Lithuanian prose. For the revelation of this topic, Donaldas Kajokas’ novel Ežeras ir kiti jį lydintys asmenys (The Lake and Other Escort Members, 2003 and Jurga Ivanauskaitė’s novel Placebas (Placebo, 2012 have been chosen. The analysed writings reveal the point of view of contemporary Lithuanian writers about esoteric beliefs. In this article, esotericism is related with persons’ feelings but is excluded from occult and parapsychology fields such as alchemy, cabbala, Tarot, etc. This work focuses on the idea that an individual, who has only a few senses, cannot reach actuality. On the other hand, the possibility of acquiring those senses is not rejected. In addition, obtaining those senses would help to reach higher, over-sensational worlds and in that way to discover personal correlation with forms of multiple personal identities. This article establishes an idea that awareness of higher worlds/spheres unlocks the possibilities of revealing the main core of human (as micro-cosmos and the Universe (as macro-cosmos. The possibility to perceive oneself as a micro-cosmos discloses not only personal identity, but also the value of Other’s entity and inevitable entities stratifying.

  10. Time motion and video analysis of classical ballet and contemporary dance performance.

    Science.gov (United States)

    Wyon, M A; Twitchett, E; Angioi, M; Clarke, F; Metsios, G; Koutedakis, Y

    2011-11-01

    Video analysis has become a useful tool in the preparation for sport performance and its use has highlighted the different physiological demands of seemingly similar sports and playing positions. The aim of the current study was to examine the performance differences between classical ballet and contemporary dance. In total 93 dance performances (48 ballet and 45 contemporary) were analysed for exercise intensity, changes in direction and specific discrete skills (e. g., jumps, lifts). Results revealed significant differences between the 2 dance forms for exercise intensity (pBallet was characterised by longer periods at rest (38 s x min(-1)) and high to very high exercise intensities (9 s x min(-1)), whilst contemporary dance featured more continuous moderate exercise intensities (27 s x min(-1)). These differences have implications on the energy systems utilised during performance with ballet potentially stressing the anaerobic system more than contemporary dance. The observed high rates in the discrete skills in ballet (5 jumps x min(-1); 2 lifts x min(-1)) can cause local muscular damage, particularly in relatively weaker individuals. In conclusion, classical ballet and contemporary dance performances are as significantly different in the underlying physical demands placed on their performers as the artistic aspects of the choreography. © Georg Thieme Verlag KG Stuttgart · New York.

  11. Stereotype threat and social function in opioid substitution therapy patients.

    Science.gov (United States)

    von Hippel, Courtney; Henry, Julie D; Terrett, Gill; Mercuri, Kimberly; McAlear, Karen; Rendell, Peter G

    2017-06-01

    People with a history of substance abuse are subject to widespread stigmatization. It seems likely that this societal disapproval will result in feelings of stereotype threat, or the belief that one is the target of demeaning stereotypes. If so, stereotype threat has the potential to contribute to functional difficulties including poor social outcomes. Eighty drug users on opioid substitution therapy and 84 demographically matched controls completed measures of mental health and social function. The opioid substitution therapy group were additionally asked to complete a measure that focused on their feelings of stereotype threat in relation to their drug use history. Bivariate correlations and hierarchical regression analyses were conducted to establish the magnitude and specificity of the relationship between stereotype threat and social functioning. Relative to controls, the opioid substitution therapy group reported higher levels of negative affect and schizotypy, and poorer social functioning, with all three of these indices significantly correlated with their feelings of stereotype threat. The results also showed that stereotype threat contributed significant unique variance to social functioning in the opioid substitution therapy group, even after taking into account other background, clinical, and mental health variables. Social functioning is an important aspect of recovery, yet these data indicate that people with a history of drug abuse who believe they are the target of stereotypical attitudes have poorer social functioning. This relationship holds after controlling for the impact of other variables on social functioning, including mental health. The theoretical and practical implications of these findings are discussed. Concerns about being stereotyped can shape the social experiences of opioid substitution therapy patients. Opioid substitution therapy patients who feel negatively stereotyped experience greater social function deficits, and this

  12. Fossil and Contemporary Fine Carbon Fractions at 12 Rural and Urban Sites in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Schichtel, B; Malm, W; Bench, G; Fallon, S; McDade, C; Chow, J

    2007-03-01

    Fine particulate matter collected at two urban, four near-urban, and six remote sites throughout the United States were analyzed for total carbon (TC) and radiocarbon ({sup 14}C). Samples were collected at most sites for both a summer and winter season. The radiocarbon was used to partition the TC into fossil and contemporary fractions. On average, contemporary carbon composed about half of the carbon at the urban, {approx}70-97% at near-urban, and 82-100% at remote sites. At Phoenix, Arizona, and Seattle, Washington, one monitor was located within the urban center and one outside to assess the urban excess over background concentrations. During the summer the urban and rural sites had similar contemporary carbon concentrations. However, during the winter the urban sites had more than twice the contemporary carbon measured at the neighboring sites, indicating anthropogenic contributions to the contemporary carbon. The urban fossil carbon was 4-20 times larger than the neighboring rural sites for both seasons. Organic (OC) and elemental carbon (EC) from TOR analysis were available. These and the radiocarbon data were used to estimate characteristic fossil and contemporary EC/TC ratios for the winter and summer seasons. These ratios were applied to carbon data from the Interagency Monitoring of Protected Visual Environments network to estimate the fraction of contemporary carbon at mostly rural sites throughout the United States. In addition, the ratios were used to develop a semiquantitative, lower bound estimate of secondary organic carbon (SOC) contribution to fossil and contemporary carbon. SOC accounted for more than one-third of the fossil and contemporary carbon.

  13. Smoking Out a Deadly Threat: Tobacco Use in the LGBT Community

    Science.gov (United States)

    ... Out a Deadly Threat: Tobacco Use in the LGBT Community Disparities in Lung Health Series "Smoking Out a Deadly Threat: Tobacco Use in the LGBT Community" is part of the American Lung Association's ...

  14. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  15. Enduring somatic threat perceptions and post-traumatic stress disorder symptoms in survivors of cardiac events.

    Science.gov (United States)

    Meli, Laura; Alcántara, Carmela; Sumner, Jennifer A; Swan, Brendan; Chang, Bernard P; Edmondson, Donald

    2017-04-01

    Post-traumatic stress disorder due to acute cardiovascular events may be uniquely defined by enduring perceptions of somatic threat. We tested whether post-traumatic stress disorder at 1 month post-acute coronary syndrome indeed required both high peritraumatic threat during the acute coronary syndrome and ongoing cardiac threat perceptions. We assessed peritraumatic threat during emergency department enrollment of 284 patients with a provisional acute coronary syndrome diagnosis and cardiac threat perceptions and post-traumatic stress disorder symptoms 1 month post-discharge. In a multiple regression model with adjustment for important covariates, emergency department threat perceptions were associated with higher 1 month post-traumatic stress disorder symptoms only among those with high levels of ongoing cardiac threat.

  16. The oceanic feeling and the Cosmic Self in contemporary artistic creation

    Directory of Open Access Journals (Sweden)

    Claudio Sapienza

    2013-02-01

    Full Text Available This inquire develops into the sphere of the contemporary art, through the example of ‘isolated’ artists – like Metson, Penone, Mendieta – and that of land artists.  They make go deep into the matter of archetypical relation man-nature, throwing light upon the ‘Ocean Feeling’ which give voice to ‘Self-Cosmic’, innate in everyone. This is a very complex and wide subject, reason why it must to imply historical references – like Platone, Dufrenne, Freud and Rolland – and valuable carefully studies by contemporary intellectuals – as Fachinelli and Mercurio. It make psychological, cultural and anthropological presupposed in evidence, which induce the man-artist to a not individualistic art, but extend and universal. This proves how contemporary art and psychology have common intuitions and objects, at all times.

  17. How to Recycle Ourselves through Art: Rubbish Inspirations in Contemporary Art

    Directory of Open Access Journals (Sweden)

    Fatma Aykanat

    2014-04-01

    Full Text Available This article will focus on the work of two contemporary artists; of Vik Muniz and Jeff Wall, to discuss the change of material and inspiration in contemporary art and the effects of this change. Both of those two artists take rubbish, human waste, masses of debris which have been thought to be the end-products, useless residue of human actions and civilization, and then they transform those so-called dead materials into original artistic products. In a way, they use those dead materials for an artistic rebirth. Through Muniz’s re-makings of famous art works through junk materials, or by way of Wall’s completely new interpretations of the already existing and useless trash provide both literary and symbolic recycle for the contemporary society.

  18. Addressing the Cyber-security and Cyber-terrorism Threats [video

    OpenAIRE

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  19. Women and computers: effects of stereotype threat on attribution of failure

    OpenAIRE

    Koch, Sabine C.; Müller, Stephanie M.; Sieverding, Monika

    2008-01-01

    This study investigated whether stereotype threat can influence women’s attributions of failure in a computer task. Male and female college-age students (n = 86, 16–21 years old) from Germany were asked to work on a computer task and were hinted beforehand that in this task, either (a) men usually perform better than women do (negative threat condition), or (b) women usually perform better than men do (positive condition), or (c) they received no threat or gender-related information (contr...

  20. [CONTEMPORARY MOLECULAR-GENETIC METHODS USED FOR ETIOLOGIC DIAGNOSTICS OF SEPSIS].

    Science.gov (United States)

    Gavrilov, S N; Skachkova, T S; Shipulina, O Yu; Savochkina, Yu A; Shipulin, G A; Maleev, V V

    2016-01-01

    Etiologic diagnostics of sepsis is one of the most difficult problems of contemporary medicine due to a wide variety of sepsis causative agents, many of which are components of normal human microflora. Disadvantages of contemporary "golden standard" of microbiologic diagnostics of sepsis etiology by seeding of blood for sterility are duration of cultivation, limitation in detection of non-cultivable forms of microorganisms, significant effect of preliminary empiric antibiotics therapy on results of the analysis. Methods of molecular diagnostics that are being actively developed and integrated during the last decade are deprived of these disadvantages. Main contemporary methods of molecular-biological diagnostics are examined in the review, actualdata on their diagnostic characteristic are provided. Special attention is given to methods of PCR-diagnostics, including novel Russian developments. Methods of nucleic acid hybridization and proteomic analysis are examined in comparative aspect. Evaluation of application and perspectives of development of methods of molecular diagnostics of sepsis is given.