WorldWideScience

Sample records for greatest environmental threat

  1. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  2. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  3. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    Science.gov (United States)

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  4. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    OpenAIRE

    Klonek, Florian E.; G?ntner, Amelie V.; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  5. Hot Under the Collar: Lessons from the 2003 Heatwave in France and the Security Implications for Coping with Environmental Threats in the EU

    Directory of Open Access Journals (Sweden)

    Paul J. Stephenson

    2009-08-01

    Full Text Available In the sweltering temperatures of August 2003 there were over 15,000 fatalities in France, the majority among the elderly. The heatwave (canicule was the greatest natural catastrophe in Europe for 50 years. Political mismanagement contributed to the death toll and government initially to blame medical services. However, other politico-cultural, societal and psychological factors may have contributed to the failure to protect the most vulnerable citizens. This article identifies 20 obstacles (“pathogens” to ensuring effective response in the face of environmental or weather-related threats, distinguishing between state-institutional and individual-community barriers, most of which have a cultural dimension. These factors require greater consideration by policy-makers to improve preparedness for environmental threats in the EU. The case raises questions about crisis management and how best to reduce risk for elderly populations, illustrating the limits of the state in offering social protection through institutionalised solidarity mechanisms, and recognises calls to strengthen community-capacity.

  6. Health and environmental threats associated with the destruction of chemical weapons.

    Science.gov (United States)

    Matousek, Jirí

    2006-09-01

    Still existing arsenals of chemical weapons (CW) pose not only security threats for possible use in hostilities by state actors or misuse by terrorists but also safety threats to humans and biota due to leakages and possible accidents. The Chemical Weapons Convention (CWC) commits the States Parties (SPs) to destroy CW using technologies taking into consideration human health and environmental protection. It does not allow methods, routinely used up to the 1970s, such as earth burial, open-pit burning, and sea dumping. Long-term health and environmental threats and some accidents that have already occurred in the known localities of the sea-dumped and earth-buried arsenals of Nazi-German armed forces in the Baltic Region and of Imperial Japanese forces in the Far East Region are analyzed according to the impact of major CW and ammunition types (i.e., sulfur mustard--HD, tabun--GA, arsenicals--DA, DC, DM, arsine oil, and chloroacetophenone--CN). Any possible operations and handling with CW envisaged by the CWC as well as their verification are summarized taking into account the health threat they pose. CW and toxic armament waste to be destroyed and applied technologies (both developed and under current use in operational CW destruction facilities [CWDF]) are reviewed as are systems of health safety and environmental protection of the destruction/demilitarization stems from the extraordinary high toxicity of supertoxic lethal agents in man and biota. Problems of currently used Russian and U.S. standards for maximum allowable workplace concentrations and general population limits and possibilities of their determination by available analytical instrumentation are discussed.

  7. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    OpenAIRE

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  8. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  9. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  10. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    NARCIS (Netherlands)

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation

  11. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  12. Spain's greatest and most recent mine disaster.

    Science.gov (United States)

    Guerrero, Flor Ma; Lozano, Macarena; Rueda-Cantuche, José M

    2008-03-01

    On 25 April 1998, the mineral waste retaining wall at the Swedish-owned pyrite mine at Aznalcóllar (Seville, Spain) burst, causing the most harmful environmental and socio-economic disaster in the history of the River Guadiamar basin. The damage was so great that the regional government decided in May 1998 to finance a comprehensive, multidisciplinary research initiative with the objective of eradicating or at least minimising all of the negative social, economic and environmental impacts. This paper utilises a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis to identify eight strategic measures aimed at providing policymakers with key guidelines on implementing a sustainable development model, in a broad sense. Empirical evidence, though, reveals that, to date, major efforts to tackle the negative impacts have centred on environmental concerns and that the socio-economic consequences have not been completely mitigated.

  13. Freedom's Greatest Threat, The Metaterrorist

    National Research Council Canada - National Science Library

    Jones, Gary

    1997-01-01

    The end of the Cold War ushered on to the world scene a new hybrid of terrorist. This new breed of criminal is called the metaterrorist, because his art of instilling terror goes beyond anything we have ever seen in the past...

  14. 2007 accomplishment report for the Eastern and Western forest environmental threat assessment centers

    Science.gov (United States)

    Danny C. Lee; Jerome S. Beatty

    2008-01-01

    As chance would have it, the Eastern Forest and Western Wildland Environmental Threat Assessment Centers were created the same year (2005) that the Forest Service celebrated its centennial anniversary as an agency of the U.S. Department of Agriculture. The historic birth of the Forest Service provides a nice backdrop to view our own more modest beginnings. Both events...

  15. The Greatest Mathematical Discovery?

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, David H.; Borwein, Jonathan M.

    2010-05-12

    What mathematical discovery more than 1500 years ago: (1) Is one of the greatest, if not the greatest, single discovery in the field of mathematics? (2) Involved three subtle ideas that eluded the greatest minds of antiquity, even geniuses such as Archimedes? (3) Was fiercely resisted in Europe for hundreds of years after its discovery? (4) Even today, in historical treatments of mathematics, is often dismissed with scant mention, or else is ascribed to the wrong source? Answer: Our modern system of positional decimal notation with zero, together with the basic arithmetic computational schemes, which were discovered in India about 500 CE.

  16. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  17. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  18. COST action TD1407: network on technology-critical elements (NOTICE)--from environmental processes to human health threats.

    Science.gov (United States)

    Cobelo-García, A; Filella, M; Croot, P; Frazzoli, C; Du Laing, G; Ospina-Alvarez, N; Rauch, S; Salaun, P; Schäfer, J; Zimmermann, S

    2015-10-01

    The current socio-economic, environmental and public health challenges that countries are facing clearly need common-defined strategies to inform and support our transition to a sustainable economy. Here, the technology-critical elements (which includes Ga, Ge, In, Te, Nb, Ta, Tl, the Platinum Group Elements and most of the rare-earth elements) are of great relevance in the development of emerging key technologies-including renewable energy, energy efficiency, electronics or the aerospace industry. In this context, the increasing use of technology-critical elements (TCEs) and associated environmental impacts (from mining to end-of-life waste products) is not restricted to a national level but covers most likely a global scale. Accordingly, the European COST Action TD1407: Network on Technology-Critical Elements (NOTICE)-from environmental processes to human health threats, has an overall objective for creating a network of scientists and practitioners interested in TCEs, from the evaluation of their environmental processes to understanding potential human health threats, with the aim of defining the current state of knowledge and gaps, proposing priority research lines/activities and acting as a platform for new collaborations and joint research projects. The Action is focused on three major scientific areas: (i) analytical chemistry, (ii) environmental biogeochemistry and (iii) human exposure and (eco)-toxicology.

  19. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  20. How Do Environmental Issues Contribute to Regional Instability? and Which Regions Will Pose the Greatest Threat to U.S. Security as a Result of Environmental Degredation?

    National Research Council Canada - National Science Library

    Schantz, Blair

    1998-01-01

    .... The primary objective of this research is to determine and define how environmental issues contribute to regional political, economic or physical instability and then apply this definition to the regions of the world...

  1. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  2. The Influence of Combat Experience on Psychologically Healthy Soldiers' Attentiveness to Environmental Threats.

    Science.gov (United States)

    Ranes, Bethany; Long, Chris P; Traynham, Stephanie; Hayes, Amanda

    2017-07-01

    In contrast to previous research that has primarily examined how psychological disorders (e.g., post-traumatic stress disorder [PTSD], anxiety) are affected by and affect individuals' threat perceptions, this study examines the relationship between combat experience and threat-monitoring in psychologically healthy Soldiers. Existing research has established how prolonged or intense experiences with war-related stressors can lead individuals to undergo an unconscious fear-conditioning process that affects the circuitry of the prefrontal cortex, hippocampus, amygdala, and anterior cingulate cortex regions of the brain. We predict that the intensity of one's combat experience positively influences Soldiers' attention to environmental threats. Participants included U. S. Army Soldiers with a score of 50 or below on the PTSD Checklist-Military Version. Participants completed the Combat Exposure Scale and the State-Trait Anxiety Inventory. The experimental prediction task we employed assesses the expectation of an intrusively loud white noise sound that occurred on three variable patterns in a pseudorandomized order. Each tone pattern was used 20 times over a total of 60 trials. The experimental prediction task included two neutral tones (700 and 1,300 Hz) that were presented in a repeated pattern along with a 100-dB burst of white noise (0.5-second duration). In each trial, one of three possible tone combinations was presented. To assess their attentiveness to threats, participants were asked to continuously rate their expectancy of the burst of white noise using a visual analogue scale (VAS) ranging from 0 to 100. VAS ratings were collected at controlled points throughout the task. None of the participants reported scores on any of the diagnostic surveys that met standards for clinical significance. A repeated-measures analysis of variance was conducted to assess the overall effect of the three prediction conditions on participants' VAS ratings. There was a significant

  3. The effect of education on the knowledge of environmental threats on health in students of elementary schools in Bushehr port

    Directory of Open Access Journals (Sweden)

    Maryam Ravanipour

    2006-02-01

    Full Text Available Background: More than one fourth of diseases around the world are caused by environmental threats. These threats have multifactorial effects on children's health. So, it needs collaboration between teachers, parents, students, and public health authorities to decrease them and improve health. Methods: A total of 18 primary schools were selected using random cluster sampling. After a need assessment analysis about environmental threads, the 3rd and 4th degree students of selected primary schools were invited to draw posters about air pollution, water sanitation, food contamination, natural disaster, solid waste pollution, and sea and beach pollution. Then, a booklet based on the initial need assessment about environmental threads was designed and used for a six weeks educational course. The students drew a second poster after the educational course taught by their teachers. The posters were scored for technical aspects and health concepts by independent examiners. Results: The mean score of students' knowledge about environmental threads increased after intervention (P<0.05. There was no difference between 4th graders and 5th graders, but girls showed a higher score than boys. Conclusion: In primary schools, booklet-based education was effective in promotion of the students' knowledge about environmental threads on health. Therefore, a booklet-based education, designed according to local need assessments, is recommended as a complementary education in primary schools.

  4. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  5. Potential future land use threats to California's protected areas

    Science.gov (United States)

    Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson

    2015-01-01

    Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.

  6. Level of environmental threat posed by horticultural trade in Cactaceae.

    Science.gov (United States)

    Novoa, Ana; Le Roux, Johannes J; Richardson, David M; Wilson, John R U

    2017-10-01

    Ornamental horticulture has been identified as an important threat to plant biodiversity and is a major pathway for plant invasions worldwide. In this context, the family Cactaceae is particularly challenging because it is considered the fifth most threatened large taxonomic group in the world; several species are among the most widespread and damaging invasive species; and Cactaceae is one of the most popular horticultural plant groups. Based on the Convention on International Trade in Endangered Species of Wild Flora and Fauna and the 11 largest online auction sites selling cacti, we documented the international cactus trade. To provide an in-depth look at the dynamics of the industry, we surveyed the businesses involved in the cactus trade in South Africa (a hotspot of cactus trade and invasions). We purchased seeds of every available species and used DNA barcoding to identify species to the genus level. Although <20% of this trade involved threatened species and <3% involved known invasive species, many species were identified by a common name. However, only 0.02% of the globally traded cacti were collected from wild populations. Despite a large commercial network, all South African imports (of which 15% and 1.5% were of species listed as threatened and invasive, respectively) came from the same source. With DNA barcoding, we identified 24% of the species to genus level. Based on our results, we believe that if trade restrictions are placed on the small proportion of cacti that are invasive and there is no major increase in harvesting of native populations, then the commercial trade in cactus poses a negligible environmental threat. However, there are currently no effective methods for easily identifying which cacti are traded, and both the illicit harvesting of cacti from the wild and the informal trade in invasive taxa pose on-going conservation challenges. © 2017 Society for Conservation Biology.

  7. Nature's Greatest Puzzles

    International Nuclear Information System (INIS)

    Quigg, Chris

    2005-01-01

    It is a pleasure to be part of the SLAC Summer Institute again, not simply because it is one of the great traditions in our field, but because this is a moment of great promise for particle physics. I look forward to exploring many opportunities with you over the course of our two weeks together. My first task in talking about Nature's Greatest Puzzles, the title of this year's Summer Institute, is to deconstruct the premise a little bit

  8. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  9. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  10. Victims’ Reactions to the Interpersonal Threat to Public Identity Posed by Copycats

    Directory of Open Access Journals (Sweden)

    Stephen Reysen

    2014-06-01

    Full Text Available Interpersonal threats to public identity consist of situations where another person intentionally attempts to illegitimately undermine one’s ability to display a valued and distinctive public identity. In three studies, we examined victims’ reactions to copycatting as an interpersonal threat to public identity to test each component of this definition. In Study, participants expressed the greatest degree of anger when the copying was illegitimate and intentional. In Study 2, participants expressed a greater degree of anger to copying of an important (vs. unimportant characteristic. In Study 3, we manipulated the number of identity characteristics copied. A structural model showed that as the number of copied characteristics increased, participants’ perception of the situation as illegitimate and the copying as intentional predicted a threat to one’s freedom, which in turn predicted felt reactance predicting an unfavorable impression and a desire to confront the copycat. Together, the results support the definition of interpersonal threats to public identity and copycatting as such a situation.

  11. Stereotype Threat Effects on Learning From a Cognitively Demanding Mathematics Lesson.

    Science.gov (United States)

    Lyons, Emily McLaughlin; Simms, Nina; Begolli, Kreshnik N; Richland, Lindsey E

    2018-03-01

    Stereotype threat-a situational context in which individuals are concerned about confirming a negative stereotype-is often shown to impact test performance, with one hypothesized mechanism being that cognitive resources are temporarily co-opted by intrusive thoughts and worries, leading individuals to underperform despite high content knowledge and ability (see Schmader & Beilock, ). We test here whether stereotype threat may also impact initial student learning and knowledge formation when experienced prior to instruction. Predominantly African American fifth-grade students provided either their race or the date before a videotaped, conceptually demanding mathematics lesson. Students who gave their race retained less learning over time, enjoyed the lesson less, reported a diminished desire to learn more, and were less likely to choose to engage in an optional math activity. The detrimental impact was greatest among students with high baseline cognitive resources. While stereotype threat has been well documented to harm test performance, the finding that effects extend to initial learning suggests that stereotype threat's contribution to achievement gaps may be greatly underestimated. Copyright © 2017 Cognitive Science Society, Inc.

  12. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  13. Computational Physics' Greatest Hits

    Science.gov (United States)

    Bug, Amy

    2011-03-01

    The digital computer, has worked its way so effectively into our profession that now, roughly 65 years after its invention, it is virtually impossible to find a field of experimental or theoretical physics unaided by computational innovation. It is tough to think of another device about which one can make that claim. In the session ``What is computational physics?'' speakers will distinguish computation within the field of computational physics from this ubiquitous importance across all subfields of physics. This talk will recap the invited session ``Great Advances...Past, Present and Future'' in which five dramatic areas of discovery (five of our ``greatest hits'') are chronicled: The physics of many-boson systems via Path Integral Monte Carlo, the thermodynamic behavior of a huge number of diverse systems via Monte Carlo Methods, the discovery of new pharmaceutical agents via molecular dynamics, predictive simulations of global climate change via detailed, cross-disciplinary earth system models, and an understanding of the formation of the first structures in our universe via galaxy formation simulations. The talk will also identify ``greatest hits'' in our field from the teaching and research perspectives of other members of DCOMP, including its Executive Committee.

  14. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  15. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  16. Polar marine ecosystems: major threats and future change

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, A. [British Antarctic Survey, Cambridge (United Kingdom); Harris, C.M. [Environmental Research and Assessment, Grantchester (United Kingdom)

    2003-07-01

    This review of polar marine ecosystems covers both the Arctic and Antarctic, identifying the major threats and, where possible, predicting their possible state(s) in 2025. Although the two polar regions are similar in their extreme photoperiod, low temperatures, and in being heavily influenced by snow and ice, in almost all other respects they are very different. The Arctic Ocean is a basin surrounded by continental landmasses close to, and influenced by, large populations and industrial activities. In contrast, the Southern Ocean is contiguous with all the other great oceans and surrounds a single land mass; Antarctica is remote from major centres of population and sources of pollution. Marine environments in both Polar Regions have been highly disturbed by fishing activity, but, in terms of pollution, some areas remain among the most pristine in the world. There are, however, both local and global pressures. Over the 2025 time horizon, the greatest concern for the Arctic is probably the ecological implications of climate change, particularly insofar as sea ice extent and duration are likely to be affected. Such changes are not expected to be as pronounced in the Southern Ocean over this time period, and concerns are related more to direct threats from harvesting of marine living resources, and the ability to manage these fisheries sustainably. In both Polar Regions, the capacity of marine ecosystems to withstand the cumulative impact of a number of pressures, including climate change, pollution and overexploitation, acting synergistically is of greatest concern. (author)

  17. Environmental Pollution: An Under-recognized Threat to Children's Health, Especially in Low- and Middle-Income Countries.

    Science.gov (United States)

    Suk, William A; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R; Sly, Leith; Sly, Peter D; Stein, Renato T; van den Berg, Martin; Zar, Heather; Landrigan, Philip J

    2016-03-01

    Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children's health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease.

  18. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  19. Will Climate Change, Genetic and Demographic Variation or Rat Predation Pose the Greatest Risk for Persistence of an Altitudinally Distributed Island Endemic?

    Directory of Open Access Journals (Sweden)

    Alison Shapcott

    2012-11-01

    Full Text Available Species endemic to mountains on oceanic islands are subject to a number of existing threats (in particular, invasive species along with the impacts of a rapidly changing climate. The Lord Howe Island endemic palm Hedyscepe canterburyana is restricted to two mountains above 300 m altitude. Predation by the introduced Black Rat (Rattus rattus is known to significantly reduce seedling recruitment. We examined the variation in Hedyscepe in terms of genetic variation, morphology, reproductive output and demographic structure, across an altitudinal gradient. We used demographic data to model population persistence under climate change predictions of upward range contraction incorporating long-term climatic records for Lord Howe Island. We also accounted for alternative levels of rat predation into the model to reflect management options for control. We found that Lord Howe Island is getting warmer and drier and quantified the degree of temperature change with altitude (0.9 °C per 100 m. For H. canterburyana, differences in development rates, population structure, reproductive output and population growth rate were identified between altitudes. In contrast, genetic variation was high and did not vary with altitude. There is no evidence of an upward range contraction as was predicted and recruitment was greatest at lower altitudes. Our models predicted slow population decline in the species and that the highest altitude populations are under greatest threat of extinction. Removal of rat predation would significantly enhance future persistence of this species.

  20. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  1. Environmental Pollution: An Under-recognized Threat to Children’s Health, Especially in Low- and Middle-Income Countries

    Science.gov (United States)

    Suk, William A.; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O.; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R.; Sly, Leith; Sly, Peter D.; Stein, Renato T.; van den Berg, Martin; Zar, Heather; Landrigan, Philip J.

    2016-01-01

    Summary Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children’s health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease. PMID:26930243

  2. Differentiating the threat of radiological/nuclear terrorism: Motivations and constraints

    Energy Technology Data Exchange (ETDEWEB)

    Post, J M [Elliott School of International Affairs, George Washington University, Washington, DC (United States)

    2001-07-01

    Full text: Reviewing the spectrum of terrorist groups in terms of motivation, incentives and constraints, for nearly all groups, nuclear terrorism could be highly counter-productive. The constraints are particularly severe for large-scale mass casualty terrorism for groups that are concerned with their constituents--social revolutionary and nationalist separatist terrorists--although discriminate low level attacks are possible. Right-wing extremists, including individuals who are members of the right-wing virtual community of hatred, represent a distinct danger for low level discriminate attacks against their targets. Religious fundamentalist terrorist groups represent a particular threat, because they are not trying to influence the West but to expel Western modernizing influences. Moreover, they believe that their acts of violence are given sacred significance. The severe constraints against catastrophic terrorism for most groups argues for continuing to protect against the greatest danger - conventional terrorism - and to devote significantly increased resources to monitoring more closely the groups at greatest risk for nuclear terrorism. (author)

  3. An In-Air Passive Acoustic Surveillance System for Urban Threats Detection and Classification

    NARCIS (Netherlands)

    Donisi, D.; Bonamente, M.; Capitanelli, A.; Radziulis, J.; Dąbrowski, R.; Hołubowicz, W.; Simon, G.; Perlepes, L.; Mylonas, G.; Chatzigiannakis, I.; Benders, F.P.A.; Beerens, S.P.

    2013-01-01

    Recent military operations in urban environments are changing the requirements imposed on sensing technologies. The final goal remains threat mapping within the area of operation, but the environmental constraints and the intrinsic nature of urban threats are radically novel. AUDIS (Acoustic Urban

  4. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    Science.gov (United States)

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and

  5. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  6. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    Science.gov (United States)

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  7. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  8. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  9. Nature's Greatest Puzzles

    Energy Technology Data Exchange (ETDEWEB)

    Quigg, Chris; /Fermilab

    2005-02-01

    It is a pleasure to be part of the SLAC Summer Institute again, not simply because it is one of the great traditions in our field, but because this is a moment of great promise for particle physics. I look forward to exploring many opportunities with you over the course of our two weeks together. My first task in talking about Nature's Greatest Puzzles, the title of this year's Summer Institute, is to deconstruct the premise a little bit.

  10. A Risk Management Approach to the "Insider Threat"

    Science.gov (United States)

    Bishop, Matt; Engle, Sophie; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

    Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, manydefine it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policyin a form that can be implemented on a computer system or network, createsgaps in enforcement. This paper defines "insider" precisely, in termsof thesegaps, andexploresan access-based modelfor analyzing threats that include those usually termed "insider threats." This model enables an organization to order its resources based on thebusinessvalue for that resource andof the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which usersareatthe greatestriskofacting inappropriately. We concludebyexamining how to merge this model with one of forensic logging and auditing.

  11. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  12. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. Understanding the threats posed by non-native species: public vs. conservation managers.

    Directory of Open Access Journals (Sweden)

    Rodolphe E Gozlan

    Full Text Available Public perception is a key factor influencing current conservation policy. Therefore, it is important to determine the influence of the public, end-users and scientists on the prioritisation of conservation issues and the direct implications for policy makers. Here, we assessed public attitudes and the perception of conservation managers to five non-native species in the UK, with these supplemented by those of an ecosystem user, freshwater anglers. We found that threat perception was not influenced by the volume of scientific research or by the actual threats posed by the specific non-native species. Media interest also reflected public perception and vice versa. Anglers were most concerned with perceived threats to their recreational activities but their concerns did not correspond to the greatest demonstrated ecological threat. The perception of conservation managers was an amalgamation of public and angler opinions but was mismatched to quantified ecological risks of the species. As this suggests that invasive species management in the UK is vulnerable to a knowledge gap, researchers must consider the intrinsic characteristics of their study species to determine whether raising public perception will be effective. The case study of the topmouth gudgeon Pseudorasbora parva reveals that media pressure and political debate has greater capacity to ignite policy changes and impact studies on non-native species than scientific evidence alone.

  14. NATO Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David

    2015-01-01

    The nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before considered. The programme of NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” has been focused on science and technology challenges associated with our need to improve the national and international capacity and capability to prevent, protect against, mitigate the effects of, respond to, and recover from the nuclear and radiological disasters, including nuclear and radiological accident, terrorist attack by Improvised Nuclear Device (IND) or by “Dirty Bomb”-Radiological Dispersal Device (RDD), that pose the greatest risk to the national and international security and safety...

  15. A brief multi-disciplinary review on antimicrobial resistance in medicine and its linkage to the global environmental microbiota

    DEFF Research Database (Denmark)

    Cantas, L.; Shah, Syed Q A; Cavaco, Lina

    2013-01-01

    The discovery and introduction of antimicrobial agents to clinical medicine was one of the greatest medical triumphs of the 20th century that revolutionized the treatment of bacterial infections. However, the gradual emergence of populations of antimicrobial-resistant pathogenic bacteria resulting...... from use, misuse, and abuse of antimicrobials has today become a major global health concern. Antimicrobial resistance (AMR) genes have been suggested to originate from environmental bacteria, as clinically relevant resistance genes have been detected on the chromosome of environmental bacteria....... As only a few new antimicrobials have been developed in the last decade, the further evolution of resistance poses a serious threat to public health. Urgent measures are required not only to minimize the use of antimicrobials for prophylactic and therapeutic purposes but also to look for alternative...

  16. Impulsive responding in threat and reward contexts as a function of PTSD symptoms and trait disinhibition.

    Science.gov (United States)

    Sadeh, Naomi; Spielberg, Jeffrey M; Hayes, Jasmeet P

    2018-01-01

    We examined current posttraumatic stress disorder (PTSD) symptoms, trait disinhibition, and affective context as contributors to impulsive and self-destructive behavior in 94 trauma-exposed Veterans. Participants completed an affective Go/No-Go task (GNG) with different emotional contexts (threat, reward, and a multidimensional threat/reward condition) and current PTSD, trait disinhibition, and risky/self-destructive behavior measures. PTSD interacted with trait disinhibition to explain recent engagement in risky/self-destructive behavior, with Veterans scoring high on trait disinhibition and current PTSD symptoms reporting the highest levels of these behaviors. On the GNG task, commission errors were also associated with the interaction of PTSD symptoms and trait disinhibition. Specifically, PTSD symptoms were associated with greater commission errors in threat vs. reward contexts for individuals who were low on trait disinhibition. In contrast, veterans high on PTSD and trait disinhibition exhibited the greatest number of commission errors in the multidimensional affective context that involved both threat and reward processing. Results highlight the interactive effects of PTSD and disinhibited personality traits, as well as threat and reward systems, as risk factors for impulsive and self-destructive behavior in trauma-exposed groups. Findings have clinical implications for understanding heterogeneity in the expression of PTSD and its association with disinhibited behavior. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Amazonian freshwater habitats experiencing environmental and socioeconomic threats affecting subsistence fisheries.

    Science.gov (United States)

    Alho, Cleber J R; Reis, Roberto E; Aquino, Pedro P U

    2015-09-01

    Matching the trend seen among the major large rivers of the globe, the Amazon River and its tributaries are facing aquatic ecosystem disruption that is affecting freshwater habitats and their associated biodiversity, including trends for decline in fishery resources. The Amazon's aquatic ecosystems, linked natural resources, and human communities that depend on them are increasingly at risk from a number of identified threats, including expansion of agriculture; cattle pastures; infrastructure such as hydroelectric dams, logging, mining; and overfishing. The forest, which regulates the hydrological pulse, guaranteeing the distribution of rainfall and stabilizing seasonal flooding, has been affected by deforestation. Flooding dynamics of the Amazon Rivers are a major factor in regulating the intensity and timing of aquatic organisms. This study's objective was to identify threats to the integrity of freshwater ecosystems, and to seek instruments for conservation and sustainable use, taking principally fish diversity and fisheries as factors for analysis.

  18. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Directory of Open Access Journals (Sweden)

    Bettina J Casad

    2016-01-01

    Full Text Available Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  19. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Science.gov (United States)

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681

  20. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.

    Science.gov (United States)

    Casad, Bettina J; Bryant, William J

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  1. One Health Perspectives on Emerging Public Health Threats

    Directory of Open Access Journals (Sweden)

    Sukhyun Ryu

    2017-11-01

    Full Text Available Antimicrobial resistance and emerging infectious diseases, including avian influenza, Ebola virus disease, and Zika virus disease have significantly affected humankind in recent years. In the premodern era, no distinction was made between animal and human medicine. However, as medical science developed, the gap between human and animal science grew deeper. Cooperation among human, animal, and environmental sciences to combat emerging public health threats has become an important issue under the One Health Initiative. Herein, we presented the history of One Health, reviewed current public health threats, and suggested opportunities for the field of public health through better understanding of the One Health paradigm.

  2. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  3. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    with other subsystems like South East Asia may have different approaches to global governance, international constitutional order, or particular cases such as the measure of infringement of human rights when targeting individuals suspected of terrorist links. Yet international law remains the key part of the Asian and global security regime. The hypothesis of this study is that the "void of governance" regime in territorial and international waters provides lucrative environment for developing terrorism, piracy, environmental degradation, and other criminal activities that pose untraditional threats to the regional security. This "void of governance" regime can be caused by either, or both, de jure or de facto insufficient control over particular marine territories.

  4. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    Energy Technology Data Exchange (ETDEWEB)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  5. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    Energy Technology Data Exchange (ETDEWEB)

    Glenn, Colleen [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Sterbentz, Dane [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center; Wright, Aaron [Idaho National Lab. (INL), Idaho Falls, ID (United States). Mission Support Center

    2016-12-20

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks, the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices

  6. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  7. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  8. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  9. pH-dependent leaching of dump coal ash - retrospective environmental analysis

    Energy Technology Data Exchange (ETDEWEB)

    Popovic, A.; Djordjevic, D. [University of Belgrade, Belgrade (Serbia). Dept. of Chemistry

    2009-07-01

    Trace and major elements in coal ash particles from dump of 'Nikola Tesla A' power plant in Obrenovac near Belgrade (Serbia) can cause pollution, due to leaching by atmospheric and surface waters. In order to assess this leaching potential, dump ash samples were subjected to extraction with solutions of decreasing pH values (8.50, 7.00, 5.50, and 4.00), imitating the reactions of the alkaline ash particles with the possible alkaline, neutral, and acidic (e.g., acid rain) waters. The most recently deposited ash represents the greatest environmental threat, while 'aged' ash, because of permanent leaching on the dump, was shown to have already lost this pollution potential. On the basis of the determined leachability, it was possible to perform an estimation of the acidity of the regional rainfalls in the last decades.

  10. Greatest Happiness Principle in a Complex System Approach

    Directory of Open Access Journals (Sweden)

    Katalin Martinás

    2012-06-01

    Full Text Available The principle of greatest happiness was the basis of ethics in Plato’s and Aristotle’s work, it served as the basis of utility principle in economics, and the happiness research has become a hot topic in social sciences in Western countries in particular in economics recently. Nevertheless there is a considerable scientific pessimism over whether it is even possible to affect sustainable increases in happiness.In this paper we outline an economic theory of decision based on the greatest happiness principle (GHP. Modern equilibrium economics is a simple system simplification of the GHP, the complex approach outlines a non-equilibrium economic theory. The comparison of the approaches reveals the fact that the part of the results – laws of modern economics – follow from the simplifications and they are against the economic nature. The most important consequence is that within the free market economy one cannot be sure that the path found by it leads to a beneficial economic system.

  11. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  12. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  13. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  14. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  15. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    Energy Technology Data Exchange (ETDEWEB)

    Goix, Sylvaine [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Lévêque, Thibaut [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); ADEME (French Agency for Environment and Energy Management), 20 Avenue du Grésillé, BP 90406, 49004 Angers Cedex 01 (France); Xiong, Tian-Tian [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Schreck, Eva [Géosciences Environnement Toulouse (GET), Observatoire Midi Pyrénées, Université de Toulouse, CNRS, IRD, 14 Avenue E. Belin, F-31400 Toulouse (France); and others

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.

  16. Climatic threats on the worldwide peace

    International Nuclear Information System (INIS)

    Valantin, J.M.

    2005-06-01

    This book approaches the climatic change under the international relation aspect. It recalls the progressive growth of the collective awareness about the threats of human activities on Earth's climate and analyzes more particularly the policies adopted by the US, UK and the European Union. It evokes also the problems encountered by the developing countries, the energy needs of which are continuously increasing. Finally, it puts the question of the capacity of the international community to solve, by negotiations and not by conflicts, the tensions generated by environmental crises. (J.S.)

  17. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction

  18. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  19. Strategic environmental policy when the governments are threatened by relocation

    International Nuclear Information System (INIS)

    Greaker, Mads

    2003-01-01

    This paper analyzes how the threat of relocation influences environmental policy. The stringency of environmental policy is determined in a game between two governments. There is one firm in each jurisdiction, and both firms threaten to relocate their production to the other jurisdiction. Because there is asymmetric information about the cost of relocation, the governments do not know the credibility of the threat. We compare the outcome of this game with the outcome of a game in which relocation is not possible. We find that the threat of relocation can increase both the level of environmental regulation and welfare. The profit tax level proves to be the most decisive for the result; that is, the higher the profit tax level, the lower the level of environmental regulation

  20. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    Directory of Open Access Journals (Sweden)

    Hannes Gaisberger

    Full Text Available Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change. We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs, climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted

  1. Threat of land subsidence in and around Kolkata City and East ...

    Indian Academy of Sciences (India)

    ile wetland to minimize the adverse environmental impacts of groundwater development. This study, for the first time, indicates the threat of possible land subsidence due to unrestricted groundwater abstraction in the EKW and also out- lines a groundwater management plan for sustain- able development of groundwater in ...

  2. Factors increasing snake detection and perceived threat in captive rhesus macaques (Macaca mulatta).

    Science.gov (United States)

    Etting, Stephanie F; Isbell, Lynne A; Grote, Mark N

    2014-02-01

    The primary predators of primates are all ambush hunters, and yet felids, raptors, and snakes differ in aspects of their ecology that affect the evasive strategies of their primate prey. Felids and raptors can traverse long distances quickly, thus the urgency of threat they present increases as they come closer in proximity to primates. In contrast, snakes do not move rapidly over long distances, and so primates may be reasonably safe even at close distances provided snakes can be detected and monitored. We investigated the ability of captive rhesus macaques (Macaca mulatta) to detect snakes at distances ranging from 15 to 1.5 m. We also examined variation in intensity of perceived threat by applying a Hidden Markov Model to infer changes in underlying state from observable behaviors, that is, increased attention and mobbing. We found that the macaques often failed to detect snake models but that closer proximity improved snake detection, which is necessary before threat can be perceived. We also found that having only one individual in fairly close proximity (≤ 7.5 m) was sufficient to alert the rest of the group and so the chances of detection did not increase with increasing group size. Finally, we found that when the snakes were perceived, they did not elicit greater intensity of response with closer proximity. These results provide evidence that the threat from snakes is greatest when they are in proximity to primates but are unseen. When snakes are seen, however, distance appears not to affect primates' perceived risk, in contrast to their perceived risk from raptors and felids. © 2013 Wiley Periodicals, Inc.

  3. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  4. U.S. Geological Survey environmental health science strategy: Providing environmental health science for a changing world

    Science.gov (United States)

    Bright, Patricia R.; Buxton, Herbert T.; Balistrieri, Laurie S.; Barber, Larry B.; Chapelle, Francis H.; Cross, Paul C.; Krabbenhoft, David P.; Plumlee, Geoffrey S.; Sleeman, Jonathan M.; Tillitt, Donald E.; Toccalino, Patricia L.; Winton, James R.

    2013-01-01

    America has an abundance of natural resources. We have bountiful clean water, fertile soil, and unrivaled national parks, wildlife refuges, and public lands. These resources enrich our lives and preserve our health and wellbeing. These resources have been maintained because of our history of respect for their value and an enduring commitment to their vigilant protection. Awareness of the social, economic, and personal value of the health of our environment is increasing. The emergence of environmentally driven diseases caused by exposure to contaminants and pathogens is a growing concern worldwide. New health threats and patterns of established threats are affected by both natural and anthropogenic changes to the environment. Human activities are key drivers of emerging (new and re-emerging) health threats. Societal demands for land and natural resources, quality of life, and economic prosperity lead to environmental change. Natural earth processes, climate trends, and related climatic events will compound the environmental impact of human activities. These environmental drivers will influence exposure to disease agents, including viral, bacterial, prion, and fungal pathogens, parasites, synthetic chemicals and substances, natural earth materials, toxins, and other biogenic compounds.

  5. Mines and Underwater IEDs in U.S. Ports and Waterways: Context, Threats, Challenges, and Solutions

    National Research Council Canada - National Science Library

    Truver, Scott C

    2008-01-01

    .... The threats of the Cold War are gone, and the United States finds itself operating in an environment where piracy, illegal migration, drug smuggling, terrorism, arms proliferation, and environmental...

  6. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  7. Seasonal Climate Extremes : Mechanism, Predictability and Responses to Global Warming

    NARCIS (Netherlands)

    Shongwe, M.E.

    2010-01-01

    Climate extremes are rarely occurring natural phenomena in the climate system. They often pose one of the greatest environmental threats to human and natural systems. Statistical methods are commonly used to investigate characteristics of climate extremes. The fitted statistical properties are often

  8. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  9. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  10. Population structure, behavior, and current threats to the sarus crane (Grus antigone antigone in Nepal

    Directory of Open Access Journals (Sweden)

    Kamal Raj Gosai

    2016-09-01

    Full Text Available The sarus crane (Grus antigone antigone is listed as “vulnerable” in the International Union for Conservation of Nature (IUCN Red List of Threatened Species. Sarus cranes are distributed in the lowlands, but most live outside protected areas, especially in agricultural areas and wetlands of Nepal. The continuous expansion of agricultural land and the reduction of wetland habitats pose the greatest threats to the conservation of the species. We studied the sarus crane in the Rupandehi District of Nepal to understand their population structure, behavior, and current threats. We used the line (i.e., road transect method from August 2013 to February 2014. The study area contained 147 sarus cranes. Agricultural land and wetland areas contained the highest number of sarus cranes. Our analysis showed that the population of sarus crane in the area has declined since 2007. Most sarus cranes lived in pairs. A single flock contained 13 cranes at maximum. Sarus crane behavior was not significantly different before and after the breeding seasons. Human–sarus crane conflict began when cranes started utilizing agricultural areas. The main threats to the hatching success and survival of sarus cranes in the Rupendehi District are egg theft and the hunting of cranes for meat. The findings of this study establish baseline information on the overall conservation status, habitat availability, and ecological behavior of sarus cranes in the district. We propose regular surveys to monitor sarus crane population levels in the face of multiple anthropogenic threats to their survival.

  11. Scorched earth: will environmental risks in China overwhelm its opportunities?

    Science.gov (United States)

    Economy, Elizabeth; Lieberthal, Kenneth

    2007-06-01

    Of all the risks of doing business in China, the greatest is the threat posed by environmental degradation. And yet it's barely discussed in corporate boardrooms. This is a serious mistake. Multinationals may be more concerned with intellectual property rights violations, corruption, and potential political instability, but the Chinese government, NGOs, and the Chinese press have been focused squarely on the country's energy shortages, soil erosion, lack of water, and pollution problems, which are so severe they might constrain GDP growth. What's more, the Chinese expect the international community to take the lead in environmental protection. If that doesn't happen, multinationals face clear risks to their operations, their workers' health, and their reputations. In factoring environmental issues into their China strategies, foreign firms need to be both defensive, taking steps to reduce harm, and proactive, investing in environmental protection efforts. Coca-Cola, for example, installed state-of-the-art bottling plants in China that operate with no net loss of water resources. Mattel increased the safety of its Barbie-manufacturing process to protect workers' health. With its efforts to reduce greenhouse gas emissions, GE is shrinking its environmental footprint in China; more proactively, GE is working closely with the Chinese government and scientists to develop clean coal, water purification, and water reuse technologies. In considering the value of such efforts, companies can not only factor in reduced risk but also increased opportunity, as they use innovations designed for the Chinese market in the rest of the world. The bottom line: How well multinationals address environmental issues in China will affect their fortunes in one of the most important economies in the world.

  12. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  13. Ambient air pollution and low birth weight - are some women more vulnerable than others?

    NARCIS (Netherlands)

    Westergaard, Nadja; Gehring, Ulrike|info:eu-repo/dai/nl/304831344; Slama, Rémy; Pedersen, Marie

    BACKGROUND AND OBJECTIVES: Ambient air pollution is controllable, and it is one of the greatest environmental threats to human health. Studies conducted worldwide have provided evidence that maternal exposure to ambient air pollution during pregnancy enhances the risk of low birth weight at term

  14. Many Species, Many Threats: A Composite Risk Assessment of Climate Impacts for Salmonids in the Pacific Northwest

    Science.gov (United States)

    Graham, M. C.; Greene, C.; Beechie, T. J.; Raymond, C.

    2016-02-01

    The life cycles of salmonid species span freshwater, estuarine, and marine environments, exposing these economically, ecologically, and culturally important species to a wide variety of climate change threats. The diverse life histories of salmonids make them differentially vulnerable to climate change based on their use of different habitat types and the variability in climate change threats across these habitat types. Previous studies have focused mainly on assessing the vulnerability of particular life stages for a few species. Hence, we lack a broad perspective on how multiple climate threats are expected to impact the entire salmonid community, which spend much of their lives in marine waters. This lack of knowledge hampers our ability to prioritize various adaptation strategies for salmonid conservation. In order to conduct a more extensive vulnerability study of salmonids, we performed a life cycle-based risk assessment of climate change threats for nine species of salmonids (species within Oncorhynchus, Salvelinus, and Prosopium genera) inhabiting the Skagit River watershed, which is subject to an array of climate impacts. Our risk assessment integrated projections of impacts from various climate threats in freshwater, estuarine, and marine ecosystems with expert-based assessments of species-specific sensitivity and exposure. We found that projections (multiple global climate models under moderate emission scenarios) of both changes in magnitude and frequency of three flow-related freshwater impacts (flooding, low flows, and suspended sediment pulses) were more severe than threats in estuarine and marine habitats for which we could obtain projections. Combining projections with expert-based sensitivity and exposure scores revealed that these three threats exhibited the highest risk across all species. Of the nine species, the four most vulnerable were Chinook and coho salmon, steelhead, and bull trout. Even though these salmonids spend much of their lives

  15. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  16. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  17. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  18. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  19. Perceived Vulnerability to Disease Predicts Environmental Attitudes

    Science.gov (United States)

    Prokop, Pavol; Kubiatko, Milan

    2014-01-01

    Investigating predictors of environmental attitudes may bring valuable benefits in terms of improving public awareness about biodiversity degradation and increased pro-environmental behaviour. Here we used an evolutionary approach to study environmental attitudes based on disease-threat model. We hypothesized that people vulnerable to diseases may…

  20. Analysis of inland crude oil spill threats, vulnerabilities, and emergency response in the midwest United States.

    Science.gov (United States)

    Brody, Thomas M; Di Bianca, Paisly; Krysa, Jan

    2012-10-01

    Although coastal oil spills tend to be highly publicized, crude oil spills in the United States affect inland areas relatively often. Spills to inland areas often affect sensitive environments and can have greater impacts to health and welfare than spills to coastal areas. For these reasons, the authors investigated inland crude oil spill threats, vulnerabilities, and emergency response in the midwestern U.S. states of Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin. These states work with the Region 5 Offices of the U.S. Environmental Protection Agency. Region 5's geospatial data in the Inland Sensitivity Atlas were turned into metrics indicating inland crude oil spill threats and vulnerabilities among the Region's sub-watersheds. These threats and vulnerabilities were weighted using data from the National Response Center and the Department of Energy's Environmental Restoration Priority System. The locations of the Region's emergency responders were geocoded in GIS. The GIS calculated the emergency response times to the Region's sub-watersheds. The resulting scatter plots are connected to the sub-watersheds in the map so stakeholders can (1) see the outlying sub-watersheds of concern and (2) better understand how reducing threats and better response time can reduce the risk of inland crude oil spills. Published 2012. This article is a U.S. Government work and is in the public domain in the U.S.A.

  1. Proceedings of the Mongolian Biodiversity Databank Workshop: Assessing the Conservation Status of Mongolian Mammals and Fishes: II – Mam- mals: Assessment Results and Threats.

    Directory of Open Access Journals (Sweden)

    Emma L. Clark

    2005-12-01

    Full Text Available The Mongolian Biodiversity Databank Workshop was held at the National University of Mongolia and Hustai National Park from 1 st October to 4 th November, 2005. As part of the workshop, participants assessed the conservation status of all Mongolian mammal species using the IUCN Categories and Cri - teria. Of the 128 species assessed, 2% were Critically Endangered (CR, 11% Endangered (EN and 4% Vulnerable (VU. A further 5% were categorised as Near Threatened (NT and 36% categorised as Data Deficient (DD. Ungulates were the most highly impacted: 79% were threatened with extinction. Twelve percent of carnivore species and 12% of rodent species were threatened. No non-rodent small mammal species were listed in a threatened category. Rodents and non-rodent small mammals were less well known, with 44% and 43% respectively found to be Data Deficient. This may have affected the threat assessment of these species. Greatest species richness of Mongolian mammals was found in the northern and western part of the country. The greatest number of threatened species also inhabit the north of the country, as well as the south-west. The main threat affecting most mammals in Mongolia was hunting, with lack of enforcement of legislation also considered a problem.

  2. Building relationships with foreign governments in support of threat reduction

    International Nuclear Information System (INIS)

    Cajigal, George L.

    2007-01-01

    The effectiveness of any multinational effort in support of threat reduction depends on the relationship developed between the nation receiving the assistance and the donor nations. The effectiveness of this relationship must be based on a solid legal and cooperative framework that establishes the ground rules for the interaction between all parties involved. The author proposes in this paper to outline major considerations by the donor nation and the nation receiving the assistance as they establish an effective approach to threat-reduction efforts. The legal framework needs to be founded on a well-developed, country-to-country agreement that establishes general ground rules and officially recognizes the collaborative effort in an internationally binding document between signatories. This document normally addresses such issues as liability, tax exemptions, import duties, contracts, applicable environmental regulations, etc. Also, of utmost importance is the establishment of a collaborative framework. The basis for such a collaborative framework must be the buy-in into a common objective, the willingness to share concerns and work toward resolutions, and continuous communications. Only when a proper legal framework and a collaborative approach are established can effective relationships be built to enhance threat-reduction efforts. (author)

  3. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    International Nuclear Information System (INIS)

    1993-01-01

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they're designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn't necessarily the high priority. And that could be very troubling news for the Arctic in the future

  4. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they`re designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn`t necessarily the high priority. And that could be very troubling news for the Arctic in the future.

  5. Greatest Happiness Principle in a Complex System: Maximisation versus Driving Force

    Directory of Open Access Journals (Sweden)

    Katalin Martinás

    2012-06-01

    Full Text Available From philosophical point of view, micro-founded economic theories depart from the principle of the pursuit of the greatest happiness. From mathematical point of view, micro-founded economic theories depart from the utility maximisation program. Though economists are aware of the serious limitations of the equilibrium analysis, they remain in that framework. We show that the maximisation principle, which implies the equilibrium hypothesis, is responsible for this impasse. We formalise the pursuit of the greatest happiness principle by the help of the driving force postulate: the volumes of activities depend on the expected wealth increase. In that case we can get rid of the equilibrium hypothesis and have new insights into economic theory. For example, in what extent standard economic results depend on the equilibrium hypothesis?

  6. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  7. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  8. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  9. How threats influence the evolutionary resolution of within-group conflict.

    Science.gov (United States)

    Cant, Michael A; Johnstone, Rufus A

    2009-06-01

    Most examples of cooperation in nature share a common feature: individuals can interact to produce a productivity benefit or fitness surplus, but there is conflict over how these gains are shared. A central question is how threats to exercise outside options influence the resolution of conflict within such cooperative associations. Here we show how a simple principle from economic bargaining theory, the outside option principle, can help to solve this problem in biological systems. According to this principle, outside options will affect the resolution of conflict only when the payoff of taking up these options exceeds the payoffs individuals can obtain from bargaining or negotiating within the group; otherwise, threats to exercise outside options are not credible and are therefore irrelevant. We show that previous attempts to incorporate outside options in synthetic models of reproductive conflict fail to distinguish between credible and incredible threats, and then we use the outside option principle to develop credible synthetic models in two contexts: reproductive skew and biparental care. A striking prediction of our analysis is that outside options are least relevant to the resolution of conflict in cooperative groups of kin and are most relevant in transient associations or interactions among nonrelatives. Our analysis shows a way to link the resolution of within-group conflict to the environmental setting in which it occurs, and it illuminates the role of threats in the evolution of social behavior.

  10. Asian river fishes in the Anthropocene: threats and conservation challenges in an era of rapid environmental change.

    Science.gov (United States)

    Dudgeon, D

    2011-12-01

    This review compares and contrasts the environmental changes that have influenced, or will influence, fishes and fisheries in the Yangtze and Mekong Rivers. These two rivers have been chosen because they differ markedly in the type and intensity of prevailing threats. The Mekong is relatively pristine, whereas the Three Gorges Dam on the Yangtze is the world's largest dam representing the apotheosis of environmental alteration of Asian rivers thus far. Moreover, it is situated at the foot of a planned cascade of at least 12 new dams on the upper Yangtze. Anthropogenic effects of dams and pollution of Yangtze fishes will be exacerbated by plans to divert water northwards along three transfer routes, in part to supplement the flow of the Yellow River. Adaptation to climate change will undoubtedly stimulate more dam construction and flow regulation, potentially causing perfect storm conditions for fishes in the Yangtze. China has already built dams along the upper course of the Mekong, and there are plans for as many as 11 mainstream dams in People's Democratic Republic (Laos) and Cambodia in the lower Mekong Basin. If built, they could have profound consequences for biodiversity, fisheries and human livelihoods, and such concerns have stalled dam construction. Potential effects of dams proposed for other rivers (such as Nujiang-Salween) are also cause for concern. Conservation or restoration measures to sustain some semblance of the rich fish biodiversity of Asian rivers can be identified, but their implementation may prove problematic in a context of increasing Anthropocene alteration of these ecosystems. © 2011 The Author. Journal of Fish Biology © 2011 The Fisheries Society of the British Isles.

  11. Stigma and Discrimination in HIV/AIDS; The greatest Challenge to ...

    African Journals Online (AJOL)

    The greatest challenge to the efforts of the various agencies and governments in the care, support and treatment of people living with HIV/AIDS, appears to be stigma and discrimination. Stigma and discrimination has to be addressed through public education, legislation to protect people living with HIV/AIDS and also by ...

  12. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  14. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  15. Environmental management systems

    OpenAIRE

    Misiak, Małgorzata

    2016-01-01

    Considering environmental protection requirements in business operations may, in the long run, determine if a lasting comparative advantage can be achieved. That is why our textbook, rich in case studies, identifies not only the threats a business may pose to the environment but stresses the ways of reducing its negative impact. It discusses, among other things, the concept of corporate social responsibility, environmental management systems, methods and the importance of eco-labelling goods ...

  16. Major issues in threat analysis and resolving such problems: an addendum to the GAP analysis

    Directory of Open Access Journals (Sweden)

    T.D. Surasinghe

    2012-04-01

    Full Text Available Identification of regions that warrant conservation attention is a top priority among global environmental concerns. Conventionally, this objective was achieved via recognizing natural landscapes based on the number of IUCN Red Listed species, percentage of endemism and species diversity. A recent innovation in conservation biology is the use of GIS-based threat analysis models to identify key areas of conservation importance. Compared with GAP Analysis, which only identifies biodiversity-rich unprotected lands, threat analysis serves as a rigorous tool in conservation planning which specifically recognizes threats and habitat suitability to different taxa based on a spatially-explicit analysis. Threat analysis is a highly flexible process which involves building up a model with multiple independent (without autocorrelations variables that both positively and negatively affect distribution and population persistence of a concerned species. Parameters include rate of land-use change, population density, population growth rate, land management regimes, protection status, habitat suitability and land stewardship. Threat analysis models can be used to understand the current status of a particular species (or a community and can be used to project future trends about the species under consideration. This publication provides an overview of uses of GIS-based threat analyses in conservation biology and provides insights on the limitations of these models and the directions that should be taken in future.

  17. The TERRA framework: conceptualizing rural environmental health inequities through an environmental justice lens.

    Science.gov (United States)

    Butterfield, Patricia; Postma, Julie

    2009-01-01

    The deleterious consequences of environmentally associated diseases are expressed differentially by income, race, and geography. Scientists are just beginning to understand the consequences of environmental exposures under conditions of poverty, marginalization, and geographic isolation. In this context, we developed the TERRA (translational environmental research in rural areas) framework to explicate environmental health risks experienced by the rural poor. Central to the TERRA framework is the premise that risks exist within physical-spatial, economic-resources, and cultural-ideologic contexts. In the face of scientific and political uncertainty, a precautionary risk reduction approach has the greatest potential to protect health. Conceptual and technical advances will both be needed to achieve environmental justice.

  18. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  19. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  20. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  1. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  2. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  3. Environmental and ground-water surveillance at Hanford

    Energy Technology Data Exchange (ETDEWEB)

    Dirkes, R.L.; Luttrell, S.P.

    1995-06-01

    Environmental and ground-water surveillance of the Hanford Site and surrounding region is conducted to demonstrate compliance with environmental regulations, confirm adherence to DOE environmental protection policies, support DOE environmental management decisions, and provide information to the public. Environmental surveillance encompasses sampling and analyzing for potential radiological and nonradiological chemical contaminants on and off the Hanford Site. Emphasis is placed on surveillance of exposure pathways and chemical constituents that pose the greatest risk to human health and the environment.

  4. Environmental and ground-water surveillance at Hanford

    International Nuclear Information System (INIS)

    Dirkes, R.L.; Luttrell, S.P.

    1995-01-01

    Environmental and ground-water surveillance of the Hanford Site and surrounding region is conducted to demonstrate compliance with environmental regulations, confirm adherence to DOE environmental protection policies, support DOE environmental management decisions, and provide information to the public. Environmental surveillance encompasses sampling and analyzing for potential radiological and nonradiological chemical contaminants on and off the Hanford Site. Emphasis is placed on surveillance of exposure pathways and chemical constituents that pose the greatest risk to human health and the environment

  5. Pollution, habitat loss, fishing, and climate change as critical threats to penguins.

    Science.gov (United States)

    Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara

    2015-02-01

    Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales. © 2014 The Authors. Conservation Biology

  6. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Was ocean acidification responsible for history's greatest extinction?

    Science.gov (United States)

    Schultz, Colin

    2011-11-01

    Two hundred fifty million years ago, the world suffered the greatest recorded extinction of all time. More than 90% of marine animals and a majority of terrestrial species disappeared, yet the cause of the Permian-Triassic boundary (PTB) dieoff remains unknown. Various theories abound, with most focusing on rampant Siberian volcanism and its potential consequences: global warming, carbon dioxide poisoning, ocean acidification, or the severe drawdown of oceanic dissolved oxygen levels, also known as anoxia. To narrow the range of possible causes, Montenegro et al. ran climate simulations for PTB using the University of Victoria Earth System Climate Model, a carbon cycle-climate coupled general circulation model.

  8. Three-Week Bright-Light Intervention Has Dose-Related Effects on Threat-Related Corticolimbic Reactivity and Functional Coupling

    DEFF Research Database (Denmark)

    Fisher, Patrick M; Madsen, Martin K; Mc Mahon, Brenda

    2014-01-01

    environmental stimuli (e.g., threat) and may underlie these effects. Serotonin signaling modulates this circuit and is implicated in the pathophysiology of seasonal and other affective disorders. METHODS: We evaluated the effects of a bright-light intervention protocol on threat-related corticolimbic reactivity......-related amygdala and prefrontal reactivity in a dose-dependent manner. Conversely, amygdala-prefrontal and intraprefrontal functional coupling increased significantly in a dose-dependent manner. Genotype status significantly moderated bright-light intervention effects on intraprefrontal functional coupling....... CONCLUSIONS: This is the first study to evaluate the effects of clinically relevant bright-light intervention on threat-related brain function. We show that amygdala-prefrontal reactivity and communication are significantly affected by bright-light intervention, an effect partly moderated by genotype...

  9. Coping and acceptance: the greatest challenge for veterans with intestinal stomas.

    Science.gov (United States)

    Krouse, Robert S; Grant, Marcia; Rawl, Susan M; Mohler, M Jane; Baldwin, Carol M; Coons, Stephen Joel; McCorkle, Ruth; Schmidt, C Max; Ko, Clifford Y

    2009-03-01

    Intestinal stomas (ostomies) create challenges for veterans. The goal of this qualitative analysis was to understand better patients' perspectives regarding their greatest challenge. Ostomates at three Veterans Affairs locations were surveyed using the modified City of Hope Quality of Life-Ostomy questionnaire that contained an open-ended request for respondents to describe their greatest challenge. The response rate was 51% (239 of 467); 68% (163 of 239) completed the open-ended item. Content analysis was performed by an experienced qualitative research team. Coping and acceptance were the most commonly addressed themes. The most frequently expressed issues and advice were related to a need for positive thinking and insight regarding adjustment over time. Coping strategies included the use of humor, recognition of positive changes resulting from the stoma, and normalization of life with an ostomy. Coping and acceptance are common themes described by veterans with an intestinal stoma. Health-care providers can assist veterans by utilizing ostomate self-management strategies, experience, and advice.

  10. Nuclear threats in the vicinity of the Nordic countries

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.; Moeller, B.

    1999-01-01

    This project is one of the new cross-disciplinary studies in the NKS (Nordic Nuclear Safety) research program 1998-2001. The main task for the project is to aggregate knowledge of nuclear threats in the vicinity of the Nordic countries, a 'base of knowledge', and make this available for the Nordic authorities as a supplement for the national emergency preparedness work. The project will focus on potential events in nuclear installations and the consequences for the Nordic countries especially on: vulnerable food chains; doses to man; environmental contamination; the emergency preparedness system. (au)

  11. The greatest hydroelectric power plant in the world. Itaipu Hydroelectric Power Plant

    International Nuclear Information System (INIS)

    Andonov - Chento, Ilija

    2004-01-01

    Details to demonstrate the size and engineering achievements of one of the world's greatest hydroelectric power plant are given. Principal technical features of construction and operation of the Itaipu Dam are tabulated and discussed

  12. Methodology for national risk analysis and prioritization of toxic industrial chemicals.

    Science.gov (United States)

    Taxell, Piia; Engström, Kerstin; Tuovila, Juha; Söderström, Martin; Kiljunen, Harri; Vanninen, Paula; Santonen, Tiina

    2013-01-01

    The identification of chemicals that pose the greatest threat to human health from incidental releases is a cornerstone in public health preparedness for chemical threats. The present study developed and applied a methodology for the risk analysis and prioritization of industrial chemicals to identify the most significant chemicals that pose a threat to public health in Finland. The prioritization criteria included acute and chronic health hazards, physicochemical and environmental hazards, national production and use quantities, the physicochemical properties of the substances, and the history of substance-related incidents. The presented methodology enabled a systematic review and prioritization of industrial chemicals for the purpose of national public health preparedness for chemical incidents.

  13. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  14. Additive threats from pathogens, climate and land-use change for global amphibian diversity

    DEFF Research Database (Denmark)

    Hof, Christian; Bastos Araujo, Miguel; Jetz, Walter

    2011-01-01

    Amphibian population declines far exceed those of other vertebrate groups, with 30% of all species listed as threatened by the International Union for Conservation of Nature. The causes of these declines are a matter of continued research, but probably include climate change, land-use change...... to be found in Africa, parts of northern South America and the Andes. Regions with the highest projected impact of land-use and climate change coincide, but there is little spatial overlap with regions highly threatened by the fungal disease. Overall, the areas harbouring the richest amphibian faunas...... and spread of the pathogenic fungal disease chytridiomycosis. Here we assess the spatial distribution and interactions of these primary threats in relation to the global distribution of amphibian species. We show that the greatest proportions of species negatively affected by climate change are projected...

  15. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  16. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  17. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  18. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability

    NARCIS (Netherlands)

    Lu, Y.; Yuan, J.; Lu, X.; Su, Chao; Zhang, Y.; Wang, C.; Cao, X.; Li, Q.; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, S.R.; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-01-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients,

  19. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  20. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  1. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  2. A brief multi-disciplinary review on antimicrobial resistance in medicine and its linkage to the global environmental microbiota

    Directory of Open Access Journals (Sweden)

    Leon eCantas

    2013-05-01

    Full Text Available The discovery and introduction of antimicrobial agents to clinical medicine was one of the greatest medical triumphs of the 20th century that revolutionized the treatment of bacterial infections. However, the gradual emergence of populations of antimicrobial-resistant pathogenic bacteria resulting from use, misuse and abuse of antimicrobials has today become a major global health concern. Antimicrobial resistance genes have been suggested to originate from environmental bacteria, as clinically relevant resistance genes have been detected on the chromosome of environmental bacteria. As only a few new antimicrobials have been developed in the last decade, the further evolution of resistance poses a serious threat to public health. Urgent measures are required not only to minimize the use of antimicrobials for prophylactic and therapeutic purposes but also to look for alternative strategies for the control of bacterial infections. This review examines the global picture of antibacterial resistance, factors that favor its spread, strategies and limitations for its control and the need for continuous training of all stake-holders i.e. medical, veterinary, public health and other relevant professionals as well as human consumers of antibiotic drugs, in the appropriate use of antimicrobials.

  3. A brief multi-disciplinary review on antimicrobial resistance in medicine and its linkage to the global environmental microbiota

    Science.gov (United States)

    Cantas, L.; Shah, Syed Q. A.; Cavaco, L. M.; Manaia, C. M.; Walsh, F.; Popowska, M.; Garelick, H.; Bürgmann, H.; Sørum, H.

    2013-01-01

    The discovery and introduction of antimicrobial agents to clinical medicine was one of the greatest medical triumphs of the 20th century that revolutionized the treatment of bacterial infections. However, the gradual emergence of populations of antimicrobial-resistant pathogenic bacteria resulting from use, misuse, and abuse of antimicrobials has today become a major global health concern. Antimicrobial resistance (AMR) genes have been suggested to originate from environmental bacteria, as clinically relevant resistance genes have been detected on the chromosome of environmental bacteria. As only a few new antimicrobials have been developed in the last decade, the further evolution of resistance poses a serious threat to public health. Urgent measures are required not only to minimize the use of antimicrobials for prophylactic and therapeutic purposes but also to look for alternative strategies for the control of bacterial infections. This review examines the global picture of antimicrobial resistance, factors that favor its spread, strategies, and limitations for its control and the need for continuous training of all stake-holders i.e., medical, veterinary, public health, and other relevant professionals as well as human consumers, in the appropriate use of antimicrobial drugs. PMID:23675371

  4. Environmentalism and typological characteristics of globalistion consciousness

    Directory of Open Access Journals (Sweden)

    Roman M. Kolisnichenko

    2016-01-01

    Full Text Available Analyzed anthropo-saving and environmental-depth approaches to understanding the essence environmentalism. The definition of environmentalism as global environmental trends that recognizes the intrinsic value of the natural world, all its elements and aims to rescue mankind from global environmental threats by achieving a sustainable balance of planetary ecosystems, the proper state of the environment and harmonious development of man and nature. Developed the typology of globalization consciousness attitude to solving global problems in the relationship between man and nature. The main types globalistion consciousness, as the growth of thrift in relation to nature, located in the following sequence: ecodestructive, anthropocentric, ecoconsumerist, ecotraditional, environmental, sacred-ethical, naturecentric and antropofobiastic. Developing a typology of globalistion consciousness above criteria also highlighted its neutral type. Proved that environmental globalistion consciousness is environmentally oriented system of ideas that reflect solutions to global environmental problems in accordance with the principles environmentalism. This type of consciousness globalistion a high degree of awareness of global environmental problems, persistent desire to implement effective methods of humane solution, the optimal it is due, the need to maximize the spread of population. It is concluded that the formation environmental globalistion consciousness as a prerequisite for saving humanity from self created global environmental threats can be greatly accelerated by the terms of the assistance of governments, the media, educational institutions, political parties, public organizations and other institutions of political socialization.

  5. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    Science.gov (United States)

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  6. Cattle and the oil and gas industry in Alberta: a literature review with recommendations for environmental management

    International Nuclear Information System (INIS)

    Bertram, H.L.; Ceroici, W.J.; Coleman, R.N.; Coppock, R.W.; Florence, L.Z.; Johnson, R.L.; Khan, A.A.; Liem, A.J.; Schuler, M.M.; Smillie, R.D.; Wilson, M.A.; Yeung, P.P.Y.; Dabrowski, T.L.; Lyness, L.S.; Sevigny, J.H.

    1996-07-01

    Issues relating to the effect of the oil and gas industry on cattle production in Alberta, were discussed. A review of scientific literature, industry codes of practices and government regulations pertaining to the subject was compiled and the potential effects of substances on cattle production were examined. The substances used by Alberta's oil and gas industry in field activities such as exploration, drilling, property development, collection, transportation, refining and processing were described. The chemicals and their toxicological effects were identified. The atmospheric, groundwater and surface water pathways by which those substances are transported was studied. It was concluded that hydrogen sulfide, crude oil and salt water pose the greatest threat to cattle. The exact effects of aromatic hydrocarbons, liquid condensates, methane, carbon dioxide, heavy metals, glycols, methanol, and volatile organic compounds on cattle production, were not fully determined. Recommendations about environmental management, including the need for monitoring programs and research priorities, were presented. 166 refs., 49 tabs., 36 figs

  7. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  8. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  9. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  10. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  11. Climate Change and Developing-Country Cities: Implications For Environmental Health and Equity

    OpenAIRE

    Campbell-Lendrum, Diarmid; Corvalán, Carlos

    2007-01-01

    Climate change is an emerging threat to global public health. It is also highly inequitable, as the greatest risks are to the poorest populations, who have contributed least to greenhouse gas (GHG) emissions. The rapid economic development and the concurrent urbanization of poorer countries mean that developing-country cities will be both vulnerable to health hazards from climate change and, simultaneously, an increasing contributor to the problem. We review the specific health vulnerabilitie...

  12. Survival and sustainability. Environmental concerns in the 21st century

    Energy Technology Data Exchange (ETDEWEB)

    Goekcekus, Hueseyin; Tuerker, Umut [Near East Univ., Nicosia, North Cyprus (Turkey). Dept. of Civil Engineering; LaMoreaux, James W. (eds.) [P.E. LaMoreaux and Associates, Tuscaloosa, AL (United States)

    2011-07-01

    The International Conference on Environment: Survival and Sustainability, held at the Near East University, Nicosia, Northern Cyprus 19-24 February 2007, dealt with environmental threats and proposed solutions at all scales. The 21 themes addressed by the conference fell into four broad categories; Threats to Survival and Sustainability; Technological Advances towards Survival and Sustainability; Activities and Tools for Social Change; Defining Goals for Sustainable Societies. Activities and tools that move the society towards greater sustainability were emphasized at the conference. These included environmental law and ethics, environmental knowledge, technology and information systems, media, environmental awareness, education and lifelong learning, the use of literature for environmental awareness, the green factor in politics, international relations and environmental organizations. The breadth of the issues addressed at the conference made clear the need for greatly increased interdisciplinary and international collaboration the survival and sustainability concept. The exchanges at the conference represent a step in this direction. (orig.)

  13. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  14. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  15. Environmental monitoring at Olympic Dam

    International Nuclear Information System (INIS)

    Anon.

    1989-01-01

    The environmental management and protection program at the Olympic Dam uranium/copper/gold project, Roxby Downs, South Australia, monitors eight major environmental parameters - meteorology, vegetation, mine site rehabilitation, fauna, terrain, soil salinity, hydrogeology and well fields. It came into effect with the approval of the South Australian Government in March 1987. The Great Artesian Basin, one of the world's greatest artesian basins, is the source of the water supply for the project

  16. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  17. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  18. Environmental policy and public health: air pollution, global climate change, and wilderness

    National Research Council Canada - National Science Library

    Rom, William N

    2012-01-01

    .... It scrutinizes the sources of pollution and threats to environmental integrity, the consequences of pollution on the environment and health and explains the legal basis for environmental action...

  19. Recording environmental assets in the national accounts

    OpenAIRE

    Carl Obst; Michael Vardon

    2014-01-01

    Accounting information is a core element of economic decision-making at both national and corporate levels. It is widely accepted that much economic activity is dependent upon natural capital and natural resources—generically termed environmental assets in an accounting context. Environmental assets are under threat of depletion and degradation from economic activity. Consequently, the incorporation of information on environmental assets into standard accounting frameworks is an essential ele...

  20. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  1. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    Science.gov (United States)

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Countermeasure Availability, and Ease of Detection. Reproducibility of scoring data was assessed by examining the standard deviations (SD) of mean scores. Our results were unexpected. Several familiar biothreat diseases such as anthrax and tularemia were judged, by our experts, to be less threatening than many others owing to a number of factors including ease of detection, lack of communicability, and the ready availability of countermeasures. Conversely, several toxins were judged by experts to have very high potential as threat agents owing, in part, to their reliability, virulence, and a lack of available countermeasures. Agreement among experts, as determined by lower SD about a mean score, was greater for more familiar threats. Our study was designed to provide a concise and east-to-apply set of criteria that could be used by NATO nations to evaluate emerging infectious disease threats with respect to their weaponization potential. Our results were unexpected. We believe that a lack of appropriate weighting factors may explain these results and suggest that future studies weigh each of the 12 proposed criteria based on the intended use of the assessment data and other situational factors. We believe that the greatest value of our study lies in a codification of the attributes of a biological weapon. © Association of Military Surgeons of the United States 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  2. Indigenising environmentalism - a task for the next millennium ...

    African Journals Online (AJOL)

    The issue of environmentalism global arising from perceived threat to the environment on all front and thus requiring attention of everyone. In as much as productive activities have contributed to environmental degradation, then it is necessary to address the processes. The environment as a concept however holds different ...

  3. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  4. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  5. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  6. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  7. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  8. Genetic and environmental influences on height from infancy to early adulthood

    DEFF Research Database (Denmark)

    Jelenkovic, Aline; Sund, Reijo; Hur, Yoon-Mi

    2016-01-01

    Height variation is known to be determined by both genetic and environmental factors, but a systematic description of how their influences differ by sex, age and global regions is lacking. We conducted an individual-based pooled analysis of 45 twin cohorts from 20 countries, including 180......,520 paired measurements at ages 1-19 years. The proportion of height variation explained by shared environmental factors was greatest in early childhood, but these effects remained present until early adulthood. Accordingly, the relative genetic contribution increased with age and was greatest in adolescence...... (up to 0.83 in boys and 0.76 in girls). Comparing geographic-cultural regions (Europe, North-America and Australia, and East-Asia), genetic variance was greatest in North-America and Australia and lowest in East-Asia, but the relative proportion of genetic variation was roughly similar across...

  9. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  10. Threats to safety during sedation outside of the operating room and the death of Michael Jackson.

    Science.gov (United States)

    Webster, Craig S; Mason, Keira P; Shafer, Steven L

    2016-03-01

    From an understanding of human psychology and the reliability of high-technology systems, this review considers critical threats to the safety of patients undergoing sedation outside of the operating room, and will stratify these threats along what we define as the 'Patient Risk Continuum'. We then consider interventions suitable for addressing identified risks. The technology, organization and delivery of healthcare continue to become more complex, highlighting the importance of maintaining the safety of patients. Sedation outside of the operating room is known to be associated with higher rates of adverse events. However, a number of recent safety initiatives have shown benefit in improving patient safety. The following threats to patients undergoing sedation, in increasing order of risk, are discussed: equipment and environmental factors, known patient risks, poor team performance, combinatorial problems and egregious violations. To address these threats, we discuss a number of approaches consistent with the systems approach to safety, namely: encouraging functions, forcing functions, cognitive safety nets, information sharing, recovery strategies and regulatory change. Demonstrating improvement with any safety initiative relies critically on quality data collected on the problem area in question.

  11. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  12. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  13. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  14. Dual-Use Threat Assessment Framework - An Attempt to Quantify the Risk

    International Nuclear Information System (INIS)

    Stephen, E. R.; Lavigne, J. J.; Colton, B.

    2007-01-01

    Advances in the biosciences over the past decade have been rapid and transformative. While these advances offer significant benefit to society, they also provide very significant challenges in terms of security. Concerns over misuse and/or accidental use/release (dual use) although not new, are now being viewed through the security lens. There is a wide-spread view that public or private sector scientists, supported through investments by pharmaceutical, environmental and agricultural interests working in the fields that comprise biotechnology, posses the ability to assess the implications of their own work and work within a regime of self-control that is for the most part self-governing (codes of practice). On the other end of the spectrum are those that would codify or legislative control. All this is being done in the absence of a mechanism for quantifying the threat. This presentation will discuss the development of an assessment framework that addresses both actual and potential threats. The framework was developed based on available intelligence and other open source information along with interviews with those persons familiar with the concept of dual use and the multiple, sometimes competing agendas of a variety of interest groups. The framework will help to bring some clarity to the discussion and at the same time, help to inform those that are positioned to respond to the threat. (author)

  15. USGS Environmental health science strategy: providing environmental health science for a changing world: public review release

    Science.gov (United States)

    Bright, Patricia R.; Buxton, Herbert T.; Balistrieri, Laurie S.; Barber, Larry B.; Chapelle, Francis H.; Cross, Paul C.; Krabbenhoft, David P.; Plumlee, Geoffrey S.; Sleeman, Jonathan M.; Tillitt, Donald E.; Toccalino, Patricia L.; Winton, James R.

    2012-01-01

    America has an abundance of natural resources. We have bountiful clean water, fertile soil, and unrivaled national parks, wildlife refuges, and public lands. These resources enrich our lives and preserve our health and wellbeing. These resources have been maintained because of our history of respect for their value and an enduring commitment to their vigilant protection. Awareness of the social, economic, and personal value of the health of our environment is increasing. The emergence of environmentally driven diseases caused by environmental exposure to contaminants and pathogens is a growing concern worldwide. New health threats and patterns of established threats are affected by both natural and anthropogenic changes to the environment. Human activities are key drivers of emerging (new and re-emerging) health threats. Societal demands for land and natural resources, a better quality of life, improved economic prosperity, and the environmental impacts associated with these demands will continue to increase. Natural earth processes, climate trends, and related climatic events will add to the environmental impact of human activities. These environmental drivers will influence exposure to disease agents, including viral, bacterial, prion, and fungal pathogens, parasites, natural earth materials, toxins and other biogenic compounds, and synthetic chemicals and substances. The U.S. Geological Survey (USGS) defines environmental health science broadly as the interdisciplinary study of relations among the quality of the physical environment, the health of the living environment, and human health. The interactions among these three spheres are driven by human activities, ecological processes, and natural earth processes; the interactions affect exposure to contaminants and pathogens and the severity of environmentally driven diseases in animals and people. This definition provides USGS with a framework for synthesizing natural science information from across the Bureau

  16. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  17. Massive the Higgs boson and the greatest hunt in science

    CERN Document Server

    Sample, Ian

    2013-01-01

    Now fully updated -- this is the dramatic and gripping account of the greatest scientific discovery of our time. In the early 1960s, three groups of physicists, working independently in different countries, stumbled upon an idea that would change physics and fuel the imagination of scientists for decades. That idea was the Higgs boson -- to find it would be to finally understand the origins of mass -- the last building block of life itself. Now, almost 50 years later, that particle has finally been discovered.

  18. The 'threat' of radioactivity: how environmental education can help overcome it

    International Nuclear Information System (INIS)

    Villar, Heldio P.

    2009-01-01

    One of the most paradoxical tenets of environmentalists is that nuclear power and environmental preservation are as antagonistic as yin and yang. It is virtually impossible to reconcile them with the idea that, since the second law of thermodynamics decrees that you cannot produce energy without creating environmental change of some kind, the nuclear option is, of all available, the one that is capable of supplying huge amounts of energy with the least impact on the planet. Nevertheless, the public is always misled by the environmental cassandras that prognosticate doom for a world where nuclear reactors still operate. lnevitably, nuclear projects other than power stations, like research reactors and particle accelerators, are also met with public distrust. It is proposed herein that the introduction of the theoretical bases of radioactivity, radiation physics and nuclear power plants in the environmental education curricula will slowly but surely result in a greater awareness of the public towards the reality surrounding radiation and radioactivity. This initiative, coupled with a more realistic approach towards nuclear risks on the part of nuclear regulators and licensers, has the potential to make nuclear applications - not only in electric energy production - more palatable to the public, rendering it more prepared to reap the benefits thereof. (author)

  19. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  20. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  1. The place of environmental education and awareness in biodiversity ...

    African Journals Online (AJOL)

    This paper examines the place of environmental education and awareness in biodiversity conservation in Nigeria. Depletion of biodiversity in Nigeria is a major environmental problem and a serious threat to livelihood and the quality of life. It is very important that future development programmes aggressively develop ...

  2. Preventing radiological threat in the Republic of Azerbaijan

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2005-01-01

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  3. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  4. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  5. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  6. Cannabinoid CB1 receptors in distinct circuits of the extended amygdala determine fear responsiveness to unpredictable threat.

    Science.gov (United States)

    Lange, M D; Daldrup, T; Remmers, F; Szkudlarek, H J; Lesting, J; Guggenhuber, S; Ruehle, S; Jüngling, K; Seidenbecher, T; Lutz, B; Pape, H C

    2017-10-01

    The brain circuits underlying behavioral fear have been extensively studied over the last decades. Although the vast majority of experimental studies assess fear as a transient state of apprehension in response to a discrete threat, such phasic states of fear can shift to a sustained anxious apprehension, particularly in face of diffuse cues with unpredictable environmental contingencies. Unpredictability, in turn, is considered an important variable contributing to anxiety disorders. The networks of the extended amygdala have been suggested keys to the control of phasic and sustained states of fear, although the underlying synaptic pathways and mechanisms remain poorly understood. Here, we show that the endocannabinoid system acting in synaptic circuits of the extended amygdala can explain the fear response profile during exposure to unpredictable threat. Using fear training with predictable or unpredictable cues in mice, combined with local and cell-type-specific deficiency and rescue of cannabinoid type 1 (CB1) receptors, we found that presynaptic CB1 receptors on distinct amygdala projections to bed nucleus of the stria terminalis (BNST) are both necessary and sufficient for the shift from phasic to sustained fear in response to an unpredictable threat. These results thereby identify the causal role of a defined protein in a distinct brain pathway for the temporal development of a sustained state of anxious apprehension during unpredictability of environmental influences, reminiscent of anxiety symptoms in humans.

  7. Penicillin: the medicine with the greatest impact on therapeutic outcomes.

    Science.gov (United States)

    Kardos, Nelson; Demain, Arnold L

    2011-11-01

    The principal point of this paper is that the discovery of penicillin and the development of the supporting technologies in microbiology and chemical engineering leading to its commercial scale production represent it as the medicine with the greatest impact on therapeutic outcomes. Our nomination of penicillin for the top therapeutic molecule rests on two lines of evidence concerning the impact of this event: (1) the magnitude of the therapeutic outcomes resulting from the clinical application of penicillin and the subsequent widespread use of antibiotics and (2) the technologies developed for production of penicillin, including both microbial strain selection and improvement plus chemical engineering methods responsible for successful submerged fermentation production. These became the basis for production of all subsequent antibiotics in use today. These same technologies became the model for the development and production of new types of bioproducts (i.e., anticancer agents, monoclonal antibodies, and industrial enzymes). The clinical impact of penicillin was large and immediate. By ushering in the widespread clinical use of antibiotics, penicillin was responsible for enabling the control of many infectious diseases that had previously burdened mankind, with subsequent impact on global population demographics. Moreover, the large cumulative public effect of the many new antibiotics and new bioproducts that were developed and commercialized on the basis of the science and technology after penicillin demonstrates that penicillin had the greatest therapeutic impact event of all times. © Springer-Verlag 2011

  8. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  9. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  10. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    Science.gov (United States)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  11. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  12. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  13. School Issues Under [Section] 504 and the ADA: The Latest and Greatest.

    Science.gov (United States)

    Aleman, Steven R.

    This paper highlights recent guidance and rulings from the Office of Civil Rights (OCR) of interest to administrators, advocates, and attorneys. It is a companion piece to Student Issues on SectionNB504/ADA: The Latest and Greatest. Compliance with SectionNB504 and the Americans with Disabilities Act (ADA) continues to involve debate and dialog on…

  14. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  15. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  16. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  17. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  18. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  19. Scientifically defensible fish conservation and recovery plans: Addressing diffuse threats and developing rigorous adaptive management plans

    Science.gov (United States)

    Maas-Hebner, Kathleen G.; Schreck, Carl B.; Hughes, Robert M.; Yeakley, Alan; Molina, Nancy

    2016-01-01

    We discuss the importance of addressing diffuse threats to long-term species and habitat viability in fish conservation and recovery planning. In the Pacific Northwest, USA, salmonid management plans have typically focused on degraded freshwater habitat, dams, fish passage, harvest rates, and hatchery releases. However, such plans inadequately address threats related to human population and economic growth, intra- and interspecific competition, and changes in climate, ocean, and estuarine conditions. Based on reviews conducted on eight conservation and/or recovery plans, we found that though threats resulting from such changes are difficult to model and/or predict, they are especially important for wide-ranging diadromous species. Adaptive management is also a critical but often inadequately constructed component of those plans. Adaptive management should be designed to respond to evolving knowledge about the fish and their supporting ecosystems; if done properly, it should help improve conservation efforts by decreasing uncertainty regarding known and diffuse threats. We conclude with a general call for environmental managers and planners to reinvigorate the adaptive management process in future management plans, including more explicitly identifying critical uncertainties, implementing monitoring programs to reduce those uncertainties, and explicitly stating what management actions will occur when pre-identified trigger points are reached.

  20. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist

    Science.gov (United States)

    Perera, Frederica

    2017-01-01

    Fossil-fuel combustion by-products are the world’s most significant threat to children’s health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO2), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases—all of which may be “seeded“ in utero and affect health and functioning immediately and over the life course. By impairing children’s health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the

  1. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist.

    Science.gov (United States)

    Perera, Frederica

    2017-12-23

    Fossil-fuel combustion by-products are the world's most significant threat to children's health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO₂), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases-all of which may be "seeded" in utero and affect health and functioning immediately and over the life course. By impairing children's health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the neurodevelopmental

  2. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  3. Environmental Risk Profiling of the Volta Delta, Ghana

    Science.gov (United States)

    Nyarko, B. K.; Appeaning-Addo, K.; Amisigo, B.

    2017-12-01

    Volta Delta communities find it difficult to absorb or bear risk at different levels, because of the physical and economic impacts of environmental hazards. In this regards various agencies and organizations have in recent years launched initiatives to measure and identify risk areas with a set of indicators and indices. The theory underpinning this study is concepts of Modern Portfolio Theory (MPT). The Cox proportional hazards regression model will be used as the model for the risk profile. Finding the optimal level of environmental risk for activities in the Volta Delta considering the risk required, risk capacity and risk tolerance. Using data from different sources, an environmental risk profile was developed for the Volta Delta. The result indicates that risks are distributed across the Delta. However, areas that have government interventions, such as sea defense system and irrigation facilities have less threat. In addition wealthy areas do effectively reduce the threat of any form of disaster.

  4. Frequently updated noise threat maps created with use of supercomputing grid

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2014-09-01

    Full Text Available An innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed serviceswere developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers. Selected experimental results achieved by the usage of the services proposed were presented. The assessment of the environmental noise threats includes creation of the noise maps using either ofline or online data, acquired through a grid of the monitoring stations. A concept of estimation of the source model parameters based on the measured sound level for the purpose of creating frequently updated noise maps was presented. Connecting the noise mapping grid service with a distributed sensor network enables to automatically update noise maps for a specified time period. Moreover, a unique attribute of the developed software is the estimation of the auditory effects evoked by the exposure to noise. The estimation method uses a modified psychoacoustic model of hearing and is based on the calculated noise level values and on the given exposure period. Potential use scenarios of the grid services for research or educational purpose were introduced. Presentation of the results of predicted hearing threshold shift caused by exposure to excessive noise can raise the public awareness of the noise threats.

  5. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  6. Decentralised bioenergy systems: A review of opportunities and threats

    International Nuclear Information System (INIS)

    Mangoyana, Robert B.; Smith, Timothy F.

    2011-01-01

    Decentralised bioenergy systems are receiving increasing attention due to the potential ability to support local development, create local employment, and contribute to climate change mitigation. These issues, along with other bioenergy sustainability issues, are reviewed through eighteen international case studies with the objective of identifying opportunities and threats to decentralised bioenergy systems. The case studies were selected based on feedstock type, bioenergy type, production capacity, synergistic alliances, ownership structure and physical locations. This variation was used to provide a basis for evaluating opportunities and threats from different contexts. Commercial viability remains the primary concern for the sustainability of decentralised bioenergy systems. There are, however, opportunities for compounding benefits through integrating small scale decentralised bioenergy systems with other production systems. Integrated production, including closed loop models, allow waste materials from one process to be used as inputs in other production processes, and thereby increasing economic, social and environmental outcomes. Synergistic opportunities along the bioenergy production chain, which include feedstock production, bioenergy marketing and distribution could also be exploited by communities and other investors to minimise decentralised production risk. - Research Highlights: → Small scale decentralised bioenergy production is a potentially sustainable energy system. →Economic viability limits small scale decentralised bioenergy production. → Synergistic alliances along the bioenergy production chain could enhance viability.

  7. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  8. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  9. Radiation -- A Cosmic Hazard to Human Habitation in Space

    Science.gov (United States)

    Lewis, Ruthan; Pellish, Jonathan

    2017-01-01

    Radiation exposure is one of the greatest environmental threats to the performance and success of human and robotic space missions. Radiation permeates all space and aeronautical systems, challenges optimal and reliable performance, and tests survival and survivability. We will discuss the broad scope of research, technological, and operational considerations to forecast and mitigate the effects of the radiation environment for deep space and planetary exploration.

  10. Prioritizing environmental justice and equality: diesel emissions in southern California.

    Science.gov (United States)

    Marshall, Julian D; Swor, Kathryn R; Nguyen, Nam P

    2014-04-01

    Existing environmental policies aim to reduce emissions but lack standards for addressing environmental justice. Environmental justice research documents disparities in exposure to air pollution; however, little guidance currently exists on how to make improvements or on how specific emission-reduction scenarios would improve or deteriorate environmental justice conditions. Here, we quantify how emission reductions from specific sources would change various measures of environmental equality and justice. We evaluate potential emission reductions for fine diesel particulate matter (DPM) in Southern California for five sources: on-road mobile, off-road mobile, ships, trains, and stationary. Our approach employs state-of-the-science dispersion and exposure models. We compare four environmental goals: impact, efficiency, equality, and justice. Results indicate potential trade-offs among those goals. For example, reductions in train emissions produce the greatest improvements in terms of efficiency, equality, and justice, whereas off-road mobile source reductions can have the greatest total impact. Reductions in on-road emissions produce improvements in impact, equality, and justice, whereas emission reductions from ships would widen existing population inequalities. Results are similar for complex versus simplified exposure analyses. The approach employed here could usefully be applied elsewhere to evaluate opportunities for improving environmental equality and justice in other locations.

  11. FedWeb Greatest Hits: Presenting the New Test Collection for Federated Web Search

    NARCIS (Netherlands)

    Demeester, Thomas; Trieschnigg, Rudolf Berend; Zhou, Ke; Nguyen, Dong-Phuong; Hiemstra, Djoerd

    This paper presents 'FedWeb Greatest Hits', a large new test collection for research in web information retrieval. As a combination and extension of the datasets used in the TREC Federated Web Search Track, this collection opens up new research possibilities on federated web search challenges, as

  12. Environmental surveillance at Los Alamos during 1991. Environmental protection group

    Energy Technology Data Exchange (ETDEWEB)

    Dewart, J.; Kohen, K.L. [comps.

    1993-08-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1991. Routine monitoring for radiation and for radioactive and chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1991 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment.

  13. A Study Of Environmental Impacts On The Coral Resources In The Vicinity Of The Saint Martin Island Bangladesh

    Directory of Open Access Journals (Sweden)

    Shaikh Sayed Ahammed

    2015-08-01

    Full Text Available A study of the environmental impacts on the coral resources in the vicinity of the Saint Martin Island Bangladesh was conducted with a view to making an assessment of the current status of coral resources in the island and identifying major natural and anthropogenic environmental threats to the future sustainability of these resources. It is evident that the coral resources have been reduced significantly and currently only 41 coral species are available. The existing environmental condition assessed by pH salinity turbidity and temperature in the island is not found responsible for the survival of the corals. The study also reveals that the major anthropogenic interventions are responsible for the gradual depletion of the coral resources. The major anthropogenic threats to the coral resources are coral collection and overfishing. In addition coral extraction is identified as a potential threat to the future integrity of coral communities in the island. Environmental threats from anthropogenic activities related to sedimentation land erosion and pollution are also the concerns for the coral communities in the island. For the conservation of the coral population no coral monitoring cell has been established in this island.

  14. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  15. Strategies regarding the environmental problems in Valea Jiului coal basin

    International Nuclear Information System (INIS)

    Babut, G.; Moraru, R.; Matei, I.

    1998-01-01

    The recent progress in environmental management concepts and tools allows to combine economic operation of industry with environmental protection if appropriate measures are used. The paper outlines some key issues facing the mining industry in the greatest romanian coal basin, where coal is industrially exploited for more than 100 years. 3 refs

  16. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  17. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  18. The greatest challenges reported by long-term colorectal cancer survivors with stomas.

    Science.gov (United States)

    McMullen, Carmit K; Hornbrook, Mark C; Grant, Marcia; Baldwin, Carol M; Wendel, Christopher S; Mohler, M Jane; Altschuler, Andrea; Ramirez, Michelle; Krouse, Robert S

    2008-04-01

    This paper presents a qualitative analysis of the greatest challenges reported by long-term colorectal cancer survivors with ostomies. Surveys that included an open-ended question about challenges of living with an ostomy were administered at three Kaiser Permanente regions: Northern California, Northwest, and Hawaii. The study was coordinated at the Southern Arizona Veterans Affairs Health Care System in Tucson. The City of Hope Quality of Life Model for Ostomy Patients provided a framework for the study's design, measures, data collection, and data analysis. The study's findings may be generalized broadly to community settings across the United States. Results replicate those of previous research among veterans, California members of the United Ostomy Association, Koreans with ostomies, and colorectal cancer survivors with ostomies residing in the United Kingdom. The greatest challenges reported by 178 colorectal cancer survivors with ostomies confirmed the Institute of Medicine's findings that survivorship is a distinct, chronic phase of cancer care and that cancer's effects are broad and pervasive. The challenges reported by study participants should inform the design, testing and integration of targeted education, early interventions, and ongoing support services for colorectal cancer patients with ostomies.

  19. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  20. Using expert opinion surveys to rank threats to endangered species: a case study with sea turtles.

    Science.gov (United States)

    Donlan, C Josh; Wingfield, Dana K; Crowder, Larry B; Wilcox, Chris

    2010-12-01

    Little is known about how specific anthropogenic hazards affect the biology of organisms. Quantifying the effect of regional hazards is particularly challenging for species such as sea turtles because they are migratory, difficult to study, long lived, and face multiple anthropogenic threats. Expert elicitation, a technique used to synthesize opinions of experts while assessing uncertainty around those views, has been in use for several decades in the social science and risk assessment sectors. We conducted an internet-based survey to quantify expert opinion on the relative magnitude of anthropogenic hazards to sea turtle populations at the regional level. Fisheries bycatch and coastal development were most often ranked as the top hazards to sea turtle species in a geographic region. Nest predation and direct take followed as the second and third greatest threats, respectively. Survey results suggest most experts believe sea turtles are threatened by multiple factors, including substantial at-sea threats such as fisheries bycatch. Resources invested by the sea turtle community, however, appear biased toward terrestrial-based impacts. Results from the survey are useful for conservation planning because they provide estimates of relative impacts of hazards on sea turtles and a measure of consensus on the magnitude of those impacts among researchers and practitioners. Our survey results also revealed patterns of expert bias, which we controlled for in our analysis. Respondents with no experience with respect to a sea turtle species tended to rank hazards affecting that sea turtle species higher than respondents with experience. A more-striking pattern was with hazard-based expertise: the more experience a respondent had with a specific hazard, the higher the respondent scored the impact of that hazard on sea turtle populations. Bias-controlled expert opinion surveys focused on threatened species and their hazards can help guide and expedite species recovery plans.

  1. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  2. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  3. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  4. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  5. Environmental impact assessment of waste electronic and electric ...

    African Journals Online (AJOL)

    Wuhib.Z

    Key words: Printed circuit boards (PCBs), e-waste, leaching tests, heavy metals, ..... Maximum leachability (in mg/kg) of metals versus leaching test methods (all tests were in triplicate). and c) ..... Environmental threats of discarded picture tubes.

  6. Impact of Environmental Education on the Knowledge and Attitude of Students towards the Environment

    Science.gov (United States)

    Erhabor, Norris I.; Don, Juliet U.

    2016-01-01

    Environmentally aware and empowered youths are potentially the greatest agent of change for the long term protection and stewardship of the environment. Thus environmental education which promotes such change will enable these youths to have a greater voice on environmental issue if effectively implemented in Nigeria. Hence, this study was…

  7. Environmental management: A system approach

    Science.gov (United States)

    Petak, William J.

    1981-05-01

    This paper presents a system framework whose purpose is to improve understanding of environmental management. By analyzing the links between elements of the environmental management system, it is possible to construct a model that aids thinking systematically about the decision-making subsystem, and other subsystems, of the entire environmental management system. Through a multidisciplinary environmental approach, each of the individual subsystems is able to adapt to threats and opportunities. The fields of government, market economics, social responsibility and ecology, for example, are so complex that it is extremely difficult to develop a framework that gives full consideration to all aspects. This paper, through the application of a highly idealized system framework, attempts to show the general relationships that exist between complex system elements.

  8. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  9. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  10. Oceania's most pressing environmental concerns

    International Nuclear Information System (INIS)

    Dahl, A.L.

    1984-01-01

    The islands and coastal waters of Oceania are unique eco-systems. The characteristics which set them apart, however, also make them vulnerable to a wide range of environmental threats. This article provides an overview of the various regional and localized problems in the South Pacific and outlines the principles for sustained use of island resources

  11. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  12. Global Environmental Change: What Can Health Care Providers and the Environmental Health Community Do About It Now?

    Science.gov (United States)

    Schwartz, Brian S.; Parker, Cindy; Glass, Thomas A.; Hu, Howard

    2006-01-01

    The debate about whether global environmental change is real is now over; in its wake is the realization that it is happening more rapidly than predicted. These changes constitute a profound challenge to human health, both as a direct threat and as a promoter of other risks. We call on health care providers to inform themselves about these issues and to become agents of change in their communities. It is our responsibility as clinicians to educate patients and their communities on the connections between regressive policies, unsustainable behaviors, global environmental changes, and threats to health and security. We call on professional organizations to assist in educating their members about these issues, in helping clinicians practice behavior change with their patients, and in adding their voices to this issue in our statehouses and Congress. We call for the development of carbon- and other environmental-labeling of consumer products so individuals can make informed choices; we also call for the rapid implementation of policies that provide tangible economic incentives for choosing environmentally sustainable products and services. We urge the environmental health community to take up the challenge of developing a global environmental health index that will incorporate human health into available “planetary health” metrics and that can be used as a policy tool to evaluate the impact of interventions and document spatial and temporal shifts in the healthfulness of local areas. Finally, we urge our political, business, public health, and academic leaders to heed these environmental warnings and quickly develop regulatory and policy solutions so that the health of populations and the integrity of their environments will be ensured for future generations. PMID:17185267

  13. Global environmental change: what can health care providers and the environmental health community do about it now?

    Science.gov (United States)

    Schwartz, Brian S; Parker, Cindy; Glass, Thomas A; Hu, Howard

    2006-12-01

    The debate about whether global environmental change is real is now over; in its wake is the realization that it is happening more rapidly than predicted. These changes constitute a profound challenge to human health, both as a direct threat and as a promoter of other risks. We call on health care providers to inform themselves about these issues and to become agents of change in their communities. It is our responsibility as clinicians to educate patients and their communities on the connections between regressive policies, unsustainable behaviors, global environmental changes, and threats to health and security. We call on professional organizations to assist in educating their members about these issues, in helping clinicians practice behavior change with their patients, and in adding their voices to this issue in our statehouses and Congress. We call for the development of carbon and other environmental-labeling of consumer products so individuals can make informed choices; we also call for the rapid implementation of policies that provide tangible economic incentives for choosing environmentally sustainable products and services. We urge the environmental health community to take up the challenge of developing a global environmental health index that will incorporate human health into available "planetary health" metrics and that can be used as a policy tool to evaluate the impact of interventions and document spatial and temporal shifts in the healthfulness of local areas. Finally, we urge our political, business, public health, and academic leaders to heed these environmental warnings and quickly develop regulatory and policy solutions so that the health of populations and the integrity of their environments will be ensured for future generations.

  14. Healthy communities: addressing vulnerability and environmental health

    CSIR Research Space (South Africa)

    Wright, C

    2009-01-01

    Full Text Available Air pollution in South Africa is a serious environmental health threat, particularly in urban and peri-urban metropolitan areas, but also in low income settlements where indoor air pollution from domestic fuel use is a concern. A healthy population...

  15. Adapting to and coping with the threat and impacts of climate change.

    Science.gov (United States)

    Reser, Joseph P; Swim, Janet K

    2011-01-01

    This article addresses the nature and challenge of adaptation in the context of global climate change. The complexity of "climate change" as threat, environmental stressor, risk domain, and impacting process with dramatic environmental and human consequences requires a synthesis of perspectives and models from diverse areas of psychology to adequately communicate and explain how a more psychological framing of the human dimensions of global environmental change can greatly inform and enhance effective and collaborative climate change adaptation and mitigation policies and research. An integrative framework is provided that identifies and considers important mediating and moderating parameters and processes relating to climate change adaptation, with particular emphasis given to environmental stress and stress and coping perspectives. This psychological perspective on climate change adaptation highlights crucial aspects of adaptation that have been neglected in the arena of climate change science. Of particular importance are intra-individual and social "psychological adaptation" processes that powerfully mediate public risk perceptions and understandings, effective coping responses and resilience, overt behavioral adjustment and change, and psychological and social impacts. This psychological window on climate change adaptation is arguably indispensable to genuinely multidisciplinary and interdisciplinary research and policy initiatives addressing the impacts of climate change.

  16. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  17. Environmental program audit, Paducah Gaseous Diffusion Plant, Paducah, Kentucky. Final report

    International Nuclear Information System (INIS)

    1985-08-01

    The environmental monitoring program, environmental control equipment and its use, and the facility's compliance with DOE orders, Federal and State laws and regulations were evaluated in this audit. No imminent threat to public health and safety was discovered. A needed quality assurance program is being added. Recommendations are given

  18. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  19. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  20. Biomarkers of Thermal Adaptation: New Tools in Sustainable Livestock Production under Climate Change

    OpenAIRE

    Geraldo, A; Lamy, E; Pinheiro, CC; Lopes, OS; Capela e Silva, F; Pereira, A

    2015-01-01

    Climate changes have been identified as one of the greatest environmental, social and economic threats to the planet and humanity. The increase of extreme weather events, such as prolonged droughts, extreme ambient temperatures or periods with high and intensive precipitation has effects on animal production systems. Crops, and consequently forage productivity and availability are compromised, the risk of new diseases increase, and animal production is impaired (growth, reproductive performan...

  1. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  2. Masses of galaxies and the greatest redshifts of quasars

    Energy Technology Data Exchange (ETDEWEB)

    Hills, J G [Illinois Univ., Urbana (USA)

    1977-04-01

    The outer parts of a typical galaxy follows an R/sup -2/ density distribution which results in the collapse time of its protogalaxy being proportional to its mass. Since quasars probably occur in the nuclei of galaxies which can only form after the collapse of their parent galaxies, their greatest observed redshift, Zsub(max), is largely determined by the mass, Msub(t), of a typical protogalaxy. The observed Zsub(max) of quasars indicates that Msub(t) = 1 x 10/sup 12/ solar masses. This mass is consistent with the masses of galaxies found in recent dynamical studies. It indicates that most of the mass in a typical galaxy is in the halo lying beyond the familiar optically-bright core, but the mass of a standard galaxy is still only 0.3 of that required for galaxies alone to close the universe.

  3. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  4. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  5. The mean and variance of environmental temperature interact to determine physiological tolerance and fitness.

    Science.gov (United States)

    Bozinovic, Francisco; Bastías, Daniel A; Boher, Francisca; Clavijo-Baquet, Sabrina; Estay, Sergio A; Angilletta, Michael J

    2011-01-01

    Global climate change poses one of the greatest threats to biodiversity. Most analyses of the potential biological impacts have focused on changes in mean temperature, but changes in thermal variance will also impact organisms and populations. We assessed the combined effects of the mean and variance of temperature on thermal tolerances, organismal survival, and population growth in Drosophila melanogaster. Because the performance of ectotherms relates nonlinearly to temperature, we predicted that responses to thermal variation (±0° or ±5°C) would depend on the mean temperature (17° or 24°C). Consistent with our prediction, thermal variation enhanced the rate of population growth (r(max)) at a low mean temperature but depressed this rate at a high mean temperature. The interactive effect on fitness occurred despite the fact that flies improved their heat and cold tolerances through acclimation to thermal conditions. Flies exposed to a high mean and a high variance of temperature recovered from heat coma faster and survived heat exposure better than did flies that developed at other conditions. Relatively high survival following heat exposure was associated with low survival following cold exposure. Recovery from chill coma was affected primarily by the mean temperature; flies acclimated to a low mean temperature recovered much faster than did flies acclimated to a high mean temperature. To develop more realistic predictions about the biological impacts of climate change, one must consider the interactions between the mean environmental temperature and the variance of environmental temperature.

  6. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  7. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  8. Nuclear threats and emergency preparedness in Finland; Ydinuhkat ja varautuminen

    Energy Technology Data Exchange (ETDEWEB)

    Mustonen, R; Aaltonen, H; Laaksonen, J; Lahtinen, J; Rantavaara, A; Reponen, H; Rytoemaa, T; Suomela, M; Toivonen, H; Varjoranta, T

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.).

  9. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  10. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  11. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  12. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  13. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  14. Electrochemical processes for the environmental remediation of toxic Cr(VI): A review

    International Nuclear Information System (INIS)

    Jin, Wei; Du, Hao; Zheng, Shili; Zhang, Yi

    2016-01-01

    Highlights: • Recent advances in electrochemical technologies for practical Cr(VI) treatment applications was reviewed. • The mechanism and performance of electrocoagulation, electrochemical reduction, electrodialysis, electro-electrodialysis and electrodeionization were discussed and compared. • The remained challenges and future perspectives were commented. - Abstract: Hexavalent chromium Cr(VI) is extremely toxic and classified as one of the 17 chemicals posing the greatest threat to humans. Large amounts of Cr(VI) compounds are directly or indirectly discharged into the environment, therefore considerable efforts have been made to control the Cr(VI) concentration below the recommended level. It has been demonstrated that electrochemical technique is one of the most efficient and environmental benign approach for the Cr(VI) removal. This review aims at recent advances in electrochemical technology for practical Cr(VI) treatment applications. By using the “clean reagent” of electron, Cr(VI) can be completely eliminated or separated via different electrochemical techniques such as electrocoagulation, electrochemical reduction, electrodialysis, electro-electrodialysis and electrodeionization. Besides, the mechanism and performance of different strategies are commented and compared. The treatment process is largely dependent on variables such as pH, electrode materials, cell configuration and techniques integration. Furthermore, the remained limitation and challenges for the electrochemical Cr(VI) remediation are also discussed.

  15. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  16. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  17. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  18. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  19. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  20. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  1. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  2. Site environmental report for 1991

    International Nuclear Information System (INIS)

    Cassady, C.K.; Gordon, K.W.; Holland, R.C.

    1992-01-01

    This report describes the results of the Environmental Protection Program conducted at Sandia National Laboratories, Livermore, in calendar year 1991. This program routinely monitors radioactive and chemical materials at the Sandia site and in the surrounding area. The Environmental Protection Department of SNL, Livermore, prepared this report in accordance with the requirements of Department of Energy Orders 5484.1 and 5400.1. It documents, evaluates, and interprets effluent and environmental monitoring data. These data are used in part to determine Sandia's compliance with environmental laws and regulations. Much of the off-site monitoring data presented in this report has been collected by Lawrence Livermore National Laboratory (LLNL), which provides off-site environmental monitoring for both facilities. The Environmental Monitoring Program at SNL, Livermore, augments LLNL's program by performing on-site and perimeter monitoring, and by monitoring airborne and liquid effluents. Based on comparison to appropriate safety standards and background measurements, operations at SNL, Livermore, in 1991 posed no significant threat to the public or the environment

  3. Site environmental report for 1990

    International Nuclear Information System (INIS)

    Brekke, D.D.

    1991-01-01

    This report describes the results of the Environmental Monitoring Program conducted at Sandia National Laboratories, Livermore, in calendar year 1990. This program routinely monitors radioactive and chemical materials at the Sandia site and in the surrounding area. The Environmental Protection Division of SNL, Livermore, prepared this report in accordance with the requirements of Department of Energy Orders 5484.1 and 5400.1. It documents, evaluates, and interprets effluent and environmental monitoring data. These data are used to determine Sandia's compliance with environmental laws and regulations. Much of the off-site monitoring data presented in this report has been collected by Lawrence Livermore National Laboratory (LLNL), which provides off-site environmental monitoring for both facilities. The Environmental Monitoring Program at SNL, Livermore, augments LLNL's program by performing on-site and perimeter monitoring, and by monitoring airborne and liquid effluents. Based on comparison to appropriate safety standards and background measurements, operations at SNL, Livermore, in 1990 posed no significant threat to Laboratory employees, the public, or the environment

  4. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  5. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  6. Environmental report for 1989

    International Nuclear Information System (INIS)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Brown, M.G.; Gallegos, G.M.

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance efforts for 1989. To enable evaluation of the effect of LLNL operations on the local environment, measurements were made at both the Livermore site and nearby Site 300 of direct radiation and a variety of radionuclides and chemical pollutants in ambient air, soil, sewage effluent, surface water, groundwater, vegetation, and foodstuff. Evaluations were made of LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment. The monitoring data demonstrate that LLNL was in compliance with environmental laws and regulations concerning emission and discharge of materials to the environment. In addition, the monitoring data demonstrate that the environmental impacts of LLNL are minimal and pose no threat to the public or the environment. 98 refs., 40 figs., 77 tabs

  7. Environmental report for 1989

    Energy Technology Data Exchange (ETDEWEB)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Brown, M.G.; Gallegos, G.M. (eds.)

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance efforts for 1989. To enable evaluation of the effect of LLNL operations on the local environment, measurements were made at both the Livermore site and nearby Site 300 of direct radiation and a variety of radionuclides and chemical pollutants in ambient air, soil, sewage effluent, surface water, groundwater, vegetation, and foodstuff. Evaluations were made of LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment. The monitoring data demonstrate that LLNL was in compliance with environmental laws and regulations concerning emission and discharge of materials to the environment. In addition, the monitoring data demonstrate that the environmental impacts of LLNL are minimal and pose no threat to the public or the environment. 98 refs., 40 figs., 77 tabs.

  8. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  9. Social and Environmental Reporting and Auditing in Indonesia: Maintaining Organizational Legitimacy?

    OpenAIRE

    Basalamah, Anies S.; Jermias, Johnny

    2005-01-01

    The purpose of this study is to examine social and environmental reporting and auditing practices by companies in Indonesia. Consistent with our prediction, we found that social and environmental reporting and auditing are undertaken by management for strategic reasons, rather than on the basis of any perceived responsibilities. The results indicate that reporting and auditing social and environmental activities increases following threats to the company’s legitimacy and ongoing survival. The...

  10. Environmental policy challenge crime in Republic Serbia and its impact on environmental safety

    Directory of Open Access Journals (Sweden)

    Jović Vojislav

    2014-01-01

    Full Text Available Environmental law and ecological security representing nearly two related fields that have a scientific discipline in our legal security framework introduced in the first decade of this century. Despite this fact, the legal norms that regulate the protection and safety of the environment have been studied in the framework of other disciplines, and their etymology suggests that environmental regulations have existed in the ninth century, first as a prohibitive provision 'is prohibited'. It is known that environmental law to a certain extent based on criminal law norms and the norms of a protective object with the environment - Ekos. The fact of regulation of a large number of offenses in this field indicates the significance of the criminal policy which is in the field of environmental law and environmental security provides criminal protection. In this paper, in addition to general introductory remarks on environmental law, environmental safety and environmental tort, consider the area of combating environmental crime, the share of primary and secondary subjects of criminal procedural and international cooperation, particularly in combating transnational environmental crime. In the end, considering the environmental impact of crime on ecological security, clarifying the possible forms of threats and extent of the reaction.

  11. THE ROLE OF ENVIRONMENTAL DEGRADATION IN POPULATION DISPLACEMENT AND CONFLICT IN THE DRYLANDS OF SUBSAHARAN AFRICA (SSA WITH SPECIAL REFERENCE TO NORTHERN NIGERIA

    Directory of Open Access Journals (Sweden)

    Andrea Spiess

    2005-05-01

    Full Text Available At present, major parts of Sub-Saharan Africa are seriously threatened by progressivedesertification and in addition continue to face some of the world’s greatest developmentchallenges. More than 200 million people are undernourished, thousands of displaced personsare accommodated in refugee camps and the quality of essential resources such as water,grazing- and arable land are seriously under threat. While income in these regions reliesmainly on natural resources, desertification, caused by anthropogenic activities and enhancedby climatic changes, has massive and negative social, environmental and economic impacts.Once productive drylands are degraded, livelihoods are no longer secure, resources becomeoverexploited, social tension increases, traditional cultural systems collapse and armedconflicts are increasingly driven by resource availability. In the next decades, populationgrowth, rising average resource demand, and persistent inequalities in resource access ensurethat scarcities will affect many environmentally sensitive regions with a severity, speed, andscale unprecedented in history. Approximately 60 million people are expected to eventuallymove from the desertified regions in Sub-Saharan Africa towards North Africa and Europewithin the next 20 years. Long term studies conducted on West Africa on the other handproject a constant migratory flow from Sahelian regions to the coastal cities, such as Lagosand Abidjan, whose population is expected to grow 3.5 times the numbers in 1997 to 271million in 2020.

  12. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  13. Integrating medical and environmental sociology with environmental health: crossing boundaries and building connections through advocacy.

    Science.gov (United States)

    Brown, Phil

    2013-06-01

    This article reviews the personal and professional processes of developing an interdisciplinary approach to understanding the complex issues of environmental health in their community, political-economic, social science, and scientific contexts. This interdisciplinary approach includes a synthesis of research, policy work, and advocacy. To examine multiple forms of interdisciplinarity, I examine pathways of integrating medical and environmental sociology via three challenges to the boundaries of traditional research: (1) crossing the boundaries of medical and environmental sociology, (2) linking social science and environmental health science, and (3) crossing the boundary of research and advocacy. These boundary crossings are discussed in light of conceptual and theoretical developments of popular epidemiology, contested illnesses, and health social movements. This interdisciplinary work offers a more comprehensive sociological lens for understanding complex problems and a practical ability to join with scientists, activists, and officials to meet public health needs for amelioration and prevention of environmental health threats.

  14. Energy and environmental issues

    International Nuclear Information System (INIS)

    Skea, Jim

    1993-01-01

    This paper provides an overview of the current energy-environmental issues. Firstly, the environmental problems associated with energy production and use are briefly described. Secondly, the paper reviews the availability of technological solutions to environmental problems, focussing particularly on atmospheric emission control. Finally, it moves on to look at recent policy developments in some parts of the world. Since the paper is written from the perspective of an industrialized country, emerging policy issues in Europe, Japan, and North America receive the greatest attention, with a particular focus on Europe where greenhouse gases and the proposed carbon tax have received a particularly high priority. The paper concludes with a discussion of some of the issues arising from the 1992 UNCED (UN Conference on Environment and Development) and implications for the diffusion of cleaner technologies from North to South. (author). 36 refs

  15. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  16. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  17. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  18. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  19. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  20. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  1. Asymptotics for the greatest zeros of solutions of a particular O.D.E.

    Directory of Open Access Journals (Sweden)

    Silvia Noschese

    1994-05-01

    Full Text Available This paper deals with the Liouville-Stekeloff method for approximating solutions of homogeneous linear ODE and a general result due to Tricomi which provides estimates for the zeros of functions by means of the knowledge of an asymptotic representation. From the classical tools we deduce information about the asymptotics of the greatest zeros of a class of solutions of a particular ODE, including the classical Hermite polynomials.

  2. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  3. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  4. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  5. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  6. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  7. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  8. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  9. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  10. Environmental Durability Issues for Solar Power Systems in Low Earth Orbit

    Science.gov (United States)

    Degroh, Kim K.; Banks, Bruce A.; Smith, Daniela C.

    1994-01-01

    Space solar power systems for use in the low Earth orbit (LEO) environment experience a variety of harsh environmental conditions. Materials used for solar power generation in LEO need to be durable to environmental threats such as atomic oxygen, ultraviolet (UV) radiation, thermal cycling, and micrometeoroid and debris impact. Another threat to LEO solar power performance is due to contamination from other spacecraft components. This paper gives an overview of these LEO environmental issues as they relate to space solar power system materials. Issues addressed include atomic oxygen erosion of organic materials, atomic oxygen undercutting of protective coatings, UV darkening of ceramics, UV embrittlement of Teflon, effects of thermal cycling on organic composites, and contamination due to silicone and organic materials. Specific examples of samples from the Long Duration Exposure Facility (LDEF) and materials returned from the first servicing mission of the Hubble Space Telescope (HST) are presented. Issues concerning ground laboratory facilities which simulate the LEO environment are discussed along with ground-to-space correlation issues.

  11. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  12. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  13. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  14. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  15. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  16. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  17. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  18. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  19. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  20. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  1. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  2. The role of coal in the US energy economy: Interfuel competition, environmental concerns, and the impact of utility restructuring

    International Nuclear Information System (INIS)

    Raschke, M.G.

    1988-01-01

    This paper briefly examines the role coal plays in the US energy economy and its competition with nuclear power, and then in greater detail the impact of environmental regulation, changes in utility regulation, and inter fuel competition on the future of coal. The US as the world's number two coal producer, shares many of the same problems and concerns as China, the world's number one coal producer. The use of coal in electric generation has been and will continue to be the only growth sector for the coal industry. The steel industry remains in permanent long-term decline. Forecasts vary, but there are indications that even in conservative forecasts, there is more down side risk than upside potential. Poor performance in the nuclear power sector can be expected to favorably impact coal consumption in the long term. Continued escalation of operating costs could erode any cost advantage that nuclear plants currently enjoy. However, environmental concerns could also escalate operating costs for coal fired plants. Also, concern over the greenhouse effect may lead policy makers to reexamine the nuclear option of inherently safe reactors. The greatest challenge to expanded use of coal comes from environmental concerns. Acid rain is a complex political, economic, and scientific issue. Clean coal technologies are seen by many as the answer to the threat posed by various forms of clean air legislation and regulation. Significant changes in the regulatory environment for electric and gas utilities and technological developments are likely in the 1990's to alter the nature of the electric generation industry

  3. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  4. Contested discourses, knowledge, and socio-environmental conflict in Ecuador

    NARCIS (Netherlands)

    Buchanan, K.S.

    2013-01-01

    This paper explores how multiple types of knowledge – epistemic, technical, and anecdotal – are combined and used discursively within the claim-making process of a long-running socio-environmental conflict concerning copper extraction and its threat to biodiversity conservation in Ecuador's Intag

  5. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  6. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  7. Determinants of pro-environmental consumption. The role of reference groups and routine behavior

    International Nuclear Information System (INIS)

    Welsch, Heinz; Kuehling, Jan

    2009-01-01

    This paper investigates the determinants of pro-environmental consumption, focusing on the role of reference groups and routine behavior. We study the factors that explain whether or not people have installed residential solar energy equipment or have subscribed to green-electricity programs, and the factors that influence the intensity of buying organic food. In addition to demographic characteristics and environmental attitudes, we consider the following categories of determinants: economic and cognitive factors (income, estimated price premium, level of information on environmentally-friendly goods); consumption patterns of reference persons; own consumption patterns in the past. Using a unique data set from a survey conducted in the region of Hanover, Germany, we find the following: (1) Economic and cognitive factors are significant covariates of all three kinds of pro-environmental consumption. Their influence is greatest in the case of green electricity. (2) Consumption patterns of reference persons are significant covariates of all three kinds of pro-environmental consumption. Their influence is greatest in the case of organic food. (3) The intensity of buying organic food is greater the longer people have been consumers of these goods. (author)

  8. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  9. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  10. Disrupted expected value signaling in youth with disruptive behavior disorders to environmental reinforcers.

    Science.gov (United States)

    White, Stuart F; Fowler, Katherine A; Sinclair, Stephen; Schechter, Julia C; Majestic, Catherine M; Pine, Daniel S; Blair, R James

    2014-05-01

    Youth with disruptive behavior disorders (DBD), including conduct disorder (CD) and oppositional defiant disorder (ODD), have difficulties in reinforcement-based decision making, the neural basis of which is poorly understood. Studies examining decision making in youth with DBD have revealed reduced reward responses within the ventromedial prefrontal cortex/orbitofrontal cortex (vmPFC/OFC), increased responses to unexpected punishment within the vmPFC and striatum, and reduced use of expected value information in the anterior insula cortex and dorsal anterior cingulate cortex during the avoidance of suboptimal choices. Previous work has used only monetary reinforcement. The current study examined whether dysfunction in youth with DBD during decision making extended to environmental reinforcers. A total of 30 youth (15 healthy youth and 15 youth with DBD) completed a novel reinforcement-learning paradigm using environmental reinforcers (physical threat images, e.g., striking snake image; contamination threat images, e.g., rotting food; appetitive images, e.g., puppies) while undergoing functional magnetic resonance imaging (fMRI). Behaviorally, healthy youth were significantly more likely to avoid physical threat, but not contamination threat, stimuli than youth with DBD. Imaging results revealed that youth with DBD showed significantly reduced use of expected value information in the bilateral caudate, thalamus, and posterior cingulate cortex during the avoidance of suboptimal responses. The current data suggest that youth with DBD show deficits to environmental reinforcers similar to the deficits seen to monetary reinforcers. Importantly, this deficit was unrelated to callous-unemotional (CU) traits, suggesting that caudate impairment may be a common deficit across youth with DBD. Published by Elsevier Inc.

  11. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  12. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  13. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  14. Lead from hunting activities and its potential environmental threat to wildlife in a protected wetland in Yucatan, Mexico.

    Science.gov (United States)

    Arcega-Cabrera, Flor; Noreña-Barroso, Elsa; Oceguera-Vargas, Ismael

    2014-02-01

    This study provides insights into the status of lead in the protected wetland of El Palmar, located on the northwestern littoral of the Yucatan Peninsula. This reserve is ecologically and economically important because it provides feeding and breeding habitats for many species, as well as being an ecotourism destination (especially for bird watching). Although it is a protected area, duck species are heavily hunted within the reserve during the winter. As a result, animals feeding or living in sediments could be exposed to anthropogenic lead. Total lead and its geochemical fractionated forms were measured in sediment cores from six selected sites in "El Palmar" wetland, during pre- and post-hunting seasons, to approximate the potential environmental threat (especially for benthonic living/feeding organisms). Anthropogenic lead concentrations detected in soil cores ranged from below the minimum infaunal community effect level (30.24 μg g(-1)) during the pre-hunting season, to bordering the probable infaunal community effect level (112.18 μg g(-1)) during the post-hunting season, according to SquiiRTs NOAA guidelines. Yet, these results were lower than expected based on the intensity of hunting. Consequently, this article explores the possibility that the lower than expected lead concentration in sediments results from (1) degradation of shot and transformation to soluble or particulate forms; or (2) ingestion of lead shot by benthic and other lacustrine species living in the protected area. Geochemical fractionation of lead demonstrated that in the top 6 cm of the soil column at heavily active hunting sites (EP5 and EP6), lead was associated with the lithogenic fraction (average 45 percent) and with the organic fraction (average 20 percent). Bioavailable lead (sum of lead adsorbed to the carbonates, Fe/Mn oxyhydroxides and organic fractions) in sediments was lower than 50 percent for the heavily active hunting areas and higher for the rest of the sites

  15. [Using SWOT to analyze breastfeeding education results in a medical center].

    Science.gov (United States)

    Lee, Pei-Shan; Huang, Chiu-Mieh

    2005-08-01

    The breastfeeding rate within the first month after postpartum dropped from 95% in 1962 to 25% in 1989. As a result, the Department of Health, Executive Yuan, has made a lot of effort to promote a baby-friendly hospital policy since 2001, with the aim of increasing the breastfeeding rate. However, many studies have pointed out that the Department of Health is encountering difficulties when implementing this policy. This study is designed to use the Strengths, Weakness, Opportunities, and Threats (SWOT) Analysis to evaluate the development of breastfeeding education in a certain medical center. We divide those factors that influence the effect of this policy into extrinsic environmental factors and intrinsic environmental factors. The intrinsic environmental factors are the strengths and weaknesses of the baby-friendly hospital policy. The extrinsic environmental factors are the opportunities and threats. The SWOT Matrix is also applied to develop appropriate strategies to take the greatest possible advantage of opportunities available. With the SWOT approach, managers can not only readily extinguish intrinsic advantages from intrinsic disadvantages, but also recognize external opportunities and threats. Furthermore, it assists managers in resolving problems and turning adversity into opportunity. In providing the SWOT analysis, we hope clinical nursing staff will gain a better understanding of the baby-friendly hospital policy and deliver higher quality of health care for postpartum mothers, thus increasing the breastfeeding rate.

  16. Quality of life threats in recreational and competitive sport

    DEFF Research Database (Denmark)

    Støckel, Jan Toftegaard

    Quality of life threats in recreational and competitive sport Author: ass. Professor Jan Toftegaard Støckel Key words: sport, stress, depression, illness, Previous research has shown that personal issues (nutrition, injury, goals and expectations), coach-athlete issues (coach, coaching style......, selection) and environmental issues (team atmosphere, support structures) are key determinants for stress, depression and illness in elite sports. In a large scale survey among 4,000 Danish athletes from recreational thru to elite sport a regression analysis show an increase in risk of self-reported stress......, depression or illness (SDI) by odds ratio 6,5 in elite sport compared to recreational sport. One in eight athletes reported SDI and highest associations are related to coach behavior. The key question for this abstract is to examine whether men and women are equally vulnerable to SDI at various sport levels...

  17. Chemical Safety Alert: First Responders’ Environmental Liability Due To Mass Decontamination Runoff

    Science.gov (United States)

    CERCLA's good Samaritan provisions protect responders such as the Chemical Weapons Improved Response Team during lifesaving actions. Once imminent threats are addressed, responders should contain contamination and avoid/mitigate environmental consequences.

  18. 49 CFR 520.34 - Comments on environmental statements prepared by other agencies.

    Science.gov (United States)

    2010-10-01

    ... systems, traffic congestion, threats to health, or other consequences adverse to the environmental goals... changes in vehicular or pedestrian access. b. Statement of the “national, State or local significance” of...

  19. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  20. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  1. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  2. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  3. Cumulative environmental effects. Summary

    International Nuclear Information System (INIS)

    2012-01-01

    This report presents a compilation of knowledge about the state of the environment and human activity in the Norwegian part of the North Sea and Skagerrak. The report gives an overview of pressures and impacts on the environment from normal activity and in the event of accidents. This is used to assess the cumulative environmental effects, which factors have most impact and where the impacts are greatest, and to indicate which problems are expected to be most serious in the future. The report is intended to provide relevant information that can be used in the management of the marine area in the future. It also provides input for the identification of environmental targets and management measures for the North Sea and Skagerrak.(Author)

  4. Cumulative environmental effects. Summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    This report presents a compilation of knowledge about the state of the environment and human activity in the Norwegian part of the North Sea and Skagerrak. The report gives an overview of pressures and impacts on the environment from normal activity and in the event of accidents. This is used to assess the cumulative environmental effects, which factors have most impact and where the impacts are greatest, and to indicate which problems are expected to be most serious in the future. The report is intended to provide relevant information that can be used in the management of the marine area in the future. It also provides input for the identification of environmental targets and management measures for the North Sea and Skagerrak.(Author)

  5. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  6. Ethics Guidelines in Environmental Epidemiology: Their Development and Challenges We Face.

    Science.gov (United States)

    Kramer, Shira; Soskolne, Colin L

    2017-06-01

    This review integrates historical developments and key events in bringing ethics into epidemiology in general and into environmental epidemiology in particular. The goal is to provide context for and discern among the various approaches and motivations that drive the need for ethical conduct in support of the public interest. The need for ethics guidelines in epidemiology is different from developments in other biomedical-related fields by virtue of its focus on populations rather than on individuals. The need for ethics guidelines in environmental epidemiology as a subspecialty of epidemiology stems from the larger scale of its mission than that of epidemiology per se. Ethics guidelines in the field of environmental epidemiology have been established. They articulate not only the profession's core values and mission, but more specifically, they address the environmental epidemiologist's obligations to the participants in research, to colleagues, and to employers. They are the product of consensus, scholarship, and diligent stewardship over several decades. The next challenge is ensuring their value and impact. The forces that support professional and institutional success, and the power of special interests, are the major threats to achieving the goals of ethical conduct and research for the public good. In environmental epidemiology, these threats have global implications.

  7. West African Research and Training Hub on Environmental and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The initial research focuses on documenting and reducing health threats associated with processing electronic waste (e-waste), small-scale gold mining, and air pollution impacts from the informal transport sector. All three economic activities produce significant levels of environmental contamination and pose elevated ...

  8. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  9. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  10. Site environmental report for calendar year 1994, Yucca Mountain Site, Nye County, Nevada

    International Nuclear Information System (INIS)

    1995-06-01

    The Yucca Mountain Site Characterization office has established an environmental program to ensure that facilities are operated in order to protect, maintain, and restore environmental quality, minimize potential threats to the environment and the public, and comply with environmental policies and US DOE orders. The status of the environmental program has been summarized in this annual report to characterize performance, confirm compliance with environmental requirements, and highlight significant programs and efforts during CY 1994. Monitoring, archaeology, groundwater, ecosystems, tortoise conservation, waste minimization, etc., are covered

  11. Site environmental report for calendar year 1994, Yucca Mountain Site, Nye County, Nevada.

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    The Yucca Mountain Site Characterization office has established an environmental program to ensure that facilities are operated in order to protect, maintain, and restore environmental quality, minimize potential threats to the environment and the public, and comply with environmental policies and US DOE orders. The status of the environmental program has been summarized in this annual report to characterize performance, confirm compliance with environmental requirements, and highlight significant programs and efforts during CY 1994. Monitoring, archaeology, groundwater, ecosystems, tortoise conservation, waste minimization, etc., are covered.

  12. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  13. Microplastics as an emerging threat to terrestrial ecosystems.

    Science.gov (United States)

    de Souza Machado, Anderson Abel; Kloas, Werner; Zarfl, Christiane; Hempel, Stefan; Rillig, Matthias C

    2018-04-01

    Microplastics (plastics plastic litter or from direct environmental emission. Their potential impacts in terrestrial ecosystems remain largely unexplored despite numerous reported effects on marine organisms. Most plastics arriving in the oceans were produced, used, and often disposed on land. Hence, it is within terrestrial systems that microplastics might first interact with biota eliciting ecologically relevant impacts. This article introduces the pervasive microplastic contamination as a potential agent of global change in terrestrial systems, highlights the physical and chemical nature of the respective observed effects, and discusses the broad toxicity of nanoplastics derived from plastic breakdown. Making relevant links to the fate of microplastics in aquatic continental systems, we here present new insights into the mechanisms of impacts on terrestrial geochemistry, the biophysical environment, and ecotoxicology. Broad changes in continental environments are possible even in particle-rich habitats such as soils. Furthermore, there is a growing body of evidence indicating that microplastics interact with terrestrial organisms that mediate essential ecosystem services and functions, such as soil dwelling invertebrates, terrestrial fungi, and plant-pollinators. Therefore, research is needed to clarify the terrestrial fate and effects of microplastics. We suggest that due to the widespread presence, environmental persistence, and various interactions with continental biota, microplastic pollution might represent an emerging global change threat to terrestrial ecosystems. © 2017 John Wiley & Sons Ltd.

  14. Environmental parameters linked to the last migratory stage of barnacle geese en route to their breeding sites

    NARCIS (Netherlands)

    Najafabadi, M.S.; Darvishzadeh, R.; Skidmore, A.K.; Kölzsch, Andrea; Exo, Klaus-Michael; Nolet, Bart A.; Griffin, Larry; Stahl, Julia; Havinga, Paul J.M.; Meratnia, Nirvana; Toxopeus, A.G.

    The migration timing of birds can be controlled by endogenous parameters. However, little is known about how environmental parameters influence the timing of migration and which have the greatest influence at different stages of migration. In this study we identified the main environmental

  15. Environmental parameters linked to the last migratory stage of barnacle geese en route to their breeding sites

    NARCIS (Netherlands)

    Shariati Najafabadi, Mitra; Darvishzadeh, Roshanak; Skidmore, A.K.; Kölzsch, A.; Exo, K-M.; Nolet, B.A.; Griffin, L.; Stahl, J.; Havinga, Paul J.M.; Meratnia, Nirvana; Toxopeus, A.G.

    2016-01-01

    The migration timing of birds can be controlled by endogenous parameters. However, little is known about how environmental parameters influence the timing of migration and which have the greatest influence at different stages of migration. In this study we identified the main environmental

  16. The environmental imperative for renewable energy

    International Nuclear Information System (INIS)

    Serchuk, Adam

    2000-01-01

    This article assesses the report by the Renewable Energy Policy Project entitled 'The Environmental Imperative: A Driving Force in the Development and Deployment of Renewable Energy Technologies', and focuses on the environmental impacts of the generation of electricity including air pollution, climate change, land and water pollution, the threat to wildlife, and the risk of radiation from commercial nuclear power plants. A table is presented illustrating the air pollution, climate change, land use and degradation, water use and quality, wildlife and radiation effects from the use of coal, oil, natural gas, biomass, wind, photovoltaic, geothermal, hydroelectric and nuclear power

  17. Children's Environmental Health: Beyond National Boundaries.

    Science.gov (United States)

    Miller, Mark D; Marty, Melanie A; Landrigan, Philip J

    2016-02-01

    Children are especially vulnerable to environmental pollution, a major cause of disease, death, and disability in countries at every level of development. This article reviews threats to children, including air and water pollution, toxic industrial chemicals, pesticides, heavy metals, and hazardous wastes. Global climate change is expected to exacerbate many of these issues. Examples of innovative nongovernmental organizations and governmental programs that address the impacts of environmental hazards on children are included. International travel, adoption, migration, and movement of goods and pollutants worldwide make these conditions concerns for all pediatricians. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. The precautionary principle in international environmental law and international jurisprudence

    OpenAIRE

    Tubić, Bojan

    2014-01-01

    This paper analysis international regulation of the precautionary principle as one of environmental principles. This principle envisages that when there are threats of serious and irreparable harm, as a consequence of certain economic activity, the lack of scientific evidence and full certainty cannot be used as a reason for postponing efficient measures for preventing environmental harm. From economic point of view, the application of precautionary principle is problematic, because it create...

  19. Environmental Impact of the use of natural Resources (EIRES)

    DEFF Research Database (Denmark)

    Nielsen, Per H.; Tukker, Arnold; Weidema, Bo

    relationships between resource use and environmental impacts, and therefore of possibilities to give consolidated advice on priority needs in policy development. * Persisting weaknesses in environmental impact assessment models. Proposals to develop further the scientific input concerning the environmental......, Kerssemeeckers M, Blok K, Patel M, de Beer J (2002). Assessing the environmental potential of clean material technologies. Institute for Prospective Technological Studies, Joint Research Centre (DG JRC), European Commission. Report EUR 20515 EN. * Nemry F, Thollier K, Jansen B, Theunis J (2002). Identifying key...... Deliverable No. 9. Groningen: Center for Energy and Environmental Studies, University of Groningen. The objectives of the present study were to analyse and evaluate this existing body of research with a view to identifying those materials and resources whose use has the greatest environmental impacts...

  20. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    Science.gov (United States)

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  1. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  2. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  3. The space between us: stereotype threat and distance in interracial contexts.

    Science.gov (United States)

    Goff, Phillip Atiba; Steele, Claude M; Davies, Paul G

    2008-01-01

    Four studies investigate the role that stereotype threat plays in producing racial distancing behavior in an anticipated conversation paradigm. It was hypothesized that the threat of appearing racist may have the ironic effect of causing Whites to distance themselves from Black conversation partners. In Study 1, participants distanced themselves more from Black partners under conditions of threat, and this distance correlated with the activation of a "White racist" stereotype. In Study 2, it was demonstrated that Whites' interracial distancing behavior was not predicted by explicit or implicit prejudice. Study 3 provides evidence that conceiving of interracial interactions as opportunities to learn may attenuate the negative consequences of threat for Whites. Study 4 found that Whites have conscious access to their experience of stereotype threat and that this awareness may mediate the relationship between threat and distance. These results are discussed within a broader discourse of racial distancing and the possibility that certain identity threats may be as important as prejudice in determining the outcomes of interracial interactions. Copyright 2008 APA, all rights reserved.

  4. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  5. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  6. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  7. Social Media - DoD’s Greatest Information Sharing Tool or Weakest Security Link?

    Science.gov (United States)

    2010-04-15

    or position of the Department of the Army, Department of Defense, or the U.S. Government. SOCIAL MEDIA – DOD’S GREATEST INFORMATION SHARING TOOL...appropriateness and effectiveness of these policies in securing the information network. 15. SUBJECT TERMS Social media , information...TYPE Civilian Research Paper 3. DATES COVERED (From - To) August 2009-April 2010 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Social Media

  8. Age differences in the underlying mechanisms of stereotype threat effects.

    Science.gov (United States)

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  10. Environmental Management Systems for Educational Institutions: A Case Study of Teri University, New Delhi

    Science.gov (United States)

    Jain, Suresh; Pant, Pallavi

    2010-01-01

    Purpose: The purpose of this paper is to put forth a model for implementation of an environmental management system (EMS) in institutes of higher education in India. Design/methodology/approach: The authors carried out initial environmental review (IER) and strengths, weaknesses, opportunities and threats (SWOT) analysis to identify the major…

  11. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  12. Exotic mosquito threats require strategic surveillance and response planning.

    Science.gov (United States)

    Webb, Cameron E; Doggett, Stephen L

    2016-12-14

    Mosquito-borne diseases caused by endemic pathogens such as Ross River, Barmah Forest and Murray Valley encephalitis viruses are an annual concern in New South Wales (NSW), Australia. More than a dozen mosquito species have been implicated in the transmission of these pathogens, with each mosquito occupying a specialised ecological niche that influences their habitat associations, host feeding preferences and the environmental drivers of their abundance. The NSW Arbovirus Surveillance and Mosquito Monitoring Program provides an early warning system for potential outbreaks of mosquito-borne disease by tracking annual activity of these mosquitoes and their associated pathogens. Although the program will effectively track changes in local mosquito populations that may increase with a changing climate, urbanisation and wetland rehabilitation, it will be less effective with current surveillance methodologies at detecting or monitoring changes in exotic mosquito threats, where different surveillance strategies need to be used. Exotic container-inhabiting mosquitoes such as Aedes aegypti and Ae. albopictus pose a threat to NSW because they are nuisance-biting pests and vectors of pathogens such as dengue, chikungunya and Zika viruses. International movement of humans and their belongings have spread these mosquitoes to many regions of the world. In recent years, these two mosquitoes have been detected by the Australian Government Department of Agriculture and Water Resources at local airports and seaports. To target the detection of these exotic mosquitoes, new trapping technologies and networks of surveillance locations are required. Additionally, incursions of these mosquitoes into urban areas of the state will require strategic responses to minimise substantial public health and economic burdens to local communities.

  13. Rethinking environmental stress from the perspective of an integrated environmental footprint: Application in the Beijing industry sector.

    Science.gov (United States)

    Hu, Jingru; Huang, Kai; Ridoutt, Bradley G; Yu, Yajuan; Wei, Jing

    2018-05-13

    Individual footprint indicators are limited in that they usually only address one specific environmental aspect. For this reason, assessments involving multiple footprint indicators are preferred. However, the interpretation of a profile of footprint indicators can be difficult as the relative importance of the different footprint results is not readily discerned by decision-makers. In this study, a time series (1997-2012) of carbon, water and land footprints was calculated for industry sectors in the Beijing region using input-output analysis. An integrated environmental footprint (IEF) was subsequently developed using normalization and entropy weighting. The results show that steep increases in environmental footprint have accompanied Beijing's rapid economic development. In 2012, the Primary Industry had the largest IEF (8.32); however, the Secondary Industry had the greatest increase over the study period, from 0.19 to 6.37. For the Primary Industry, the greatest contribution to the IEF came from the land footprint. For the Secondary and Tertiary Industries, the water footprint was most important. Using the IEF, industry sectors with low resource utilization efficiency and high greenhouse gas emissions intensity can be identified. As such, the IEF can help to inform about industry sectors which should be given priority for modernization as well as the particular footprints that require priority attention in each sector. The IEF can also be helpful in identifying industry sectors that could be encouraged to expand within the Beijing region as they are especially efficient in terms of value adding relative to IEF. Other industries, over time, may be better located in other regions that do not face the same environmental pressures as Beijing. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. Discussion of environmental impact assessment for the nuclear technology application in hospital

    International Nuclear Information System (INIS)

    Li Shaoting; Xu Zhongyang

    2010-01-01

    Medical use of ionizing radiation has become the greatest artificial radiation in the world. Based on the characteristics of the nuclear technology application in hospital the content of the environmental impact assessment has been stated, including identification of the environmental impact factor, the standard, the environmental impact, control of the pollution as well. The dose of the medical staff which engaged in interventional operation and the accompanies of the patients which received nuclear medicine treatment should be focused on. (authors)

  15. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  16. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal; Pernici, B; Gulla, J.A.

    2007-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not

  17. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  18. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    Science.gov (United States)

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  19. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  20. Phishing - A Growing Threat to E-Commerce

    OpenAIRE

    Banday, M. Tariq; Qadri, Jameel A.

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyl...

  1. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Directory of Open Access Journals (Sweden)

    Marta Coll

    Full Text Available The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular

  2. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Science.gov (United States)

    Coll, Marta; Piroddi, Chiara; Steenbeek, Jeroen; Kaschner, Kristin; Ben Rais Lasram, Frida; Aguzzi, Jacopo; Ballesteros, Enric; Bianchi, Carlo Nike; Corbera, Jordi; Dailianis, Thanos; Danovaro, Roberto; Estrada, Marta; Froglia, Carlo; Galil, Bella S; Gasol, Josep M; Gertwagen, Ruthy; Gil, João; Guilhaumon, François; Kesner-Reyes, Kathleen; Kitsos, Miltiadis-Spyridon; Koukouras, Athanasios; Lampadariou, Nikolaos; Laxamana, Elijah; López-Fé de la Cuadra, Carlos M; Lotze, Heike K; Martin, Daniel; Mouillot, David; Oro, Daniel; Raicevich, Sasa; Rius-Barile, Josephine; Saiz-Salinas, Jose Ignacio; San Vicente, Carles; Somot, Samuel; Templado, José; Turon, Xavier; Vafidis, Dimitris; Villanueva, Roger; Voultsiadou, Eleni

    2010-08-02

    The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular, the Strait of

  3. Exciting fear in adolescence: Does pubertal development alter threat processing?

    Directory of Open Access Journals (Sweden)

    Jeffrey M. Spielberg

    2014-04-01

    Full Text Available Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala, but also regions associated with reward pursuit (i.e., nucleus accumbens. These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues—which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences.

  4. Exciting fear in adolescence: does pubertal development alter threat processing?

    Science.gov (United States)

    Spielberg, Jeffrey M; Olino, Thomas M; Forbes, Erika E; Dahl, Ronald E

    2014-04-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues--which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  5. Sterilization, high-level disinfection, and environmental cleaning.

    Science.gov (United States)

    Rutala, William A; Weber, David J

    2011-03-01

    Failure to perform proper disinfection and sterilization of medical devices may lead to introduction of pathogens, resulting in infection. New techniques have been developed for achieving high-level disinfection and adequate environmental cleanliness. This article examines new technologies for sterilization and high-level disinfection of critical and semicritical items, respectively, and because semicritical items carry the greatest risk of infection, the authors discuss reprocessing semicritical items such as endoscopes and automated endoscope reprocessors, endocavitary probes, prostate biopsy probes, tonometers, laryngoscopes, and infrared coagulation devices. In addition, current issues and practices associated with environmental cleaning are reviewed. Copyright © 2011. Published by Elsevier Inc.

  6. Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2016-09-01

    Full Text Available Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft. 

  7. A comparison of threats, vulnerabilities and management approaches in global seagrass bioregions

    International Nuclear Information System (INIS)

    Grech, Alana; Chartrand-Miller, Katie; McKenzie, Len; Rasheed, Michael; Taylor, Helen; Coles, Rob; Erftemeijer, Paul; Fonseca, Mark

    2012-01-01

    Global seagrass habitats are threatened by multiple anthropogenic factors. Effective management of seagrasses requires information on the relative impacts of threats; however, this information is rarely available. Our goal was to use the knowledge of experts to assess the relative impacts of anthropogenic activities in six global seagrass bioregions. The activities that threaten seagrasses were identified at an international seagrass workshop and followed with a web-based survey to collect seagrass vulnerability information. There was a global consensus that urban/industrial runoff, urban/port infrastructure development, agricultural runoff and dredging had the greatest impact on seagrasses, though the order of relative impacts varied by bioregion. These activities are largely terrestrially based, highlighting the need for marine planning initiatives to be co-ordinated with adjacent watershed planning. Sea level rise and increases in the severity of cyclones were ranked highest relative to other climate change related activities, but overall the five climate change activities were ranked low and experts were uncertain of their effects on seagrasses. The experts’ preferred mechanism of delivering management outcomes were processes such as policy development, planning and consultation rather than prescriptive management tools. Our approach to collecting expert opinion provides the required data to prioritize seagrass management actions at bioregional scales. (letter)

  8. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  9. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  10. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    Science.gov (United States)

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  12. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  13. The cyber threat landscape: Challenges and future research directions

    Science.gov (United States)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  14. Machine Learning Technologies Translates Vigilant Surveillance Satellite Big Data into Predictive Alerts for Environmental Stressors

    Science.gov (United States)

    Johnson, S. P.; Rohrer, M. E.

    2017-12-01

    The application of scientific research pertaining to satellite imaging and data processing has facilitated the development of dynamic methodologies and tools that utilize nanosatellites and analytical platforms to address the increasing scope, scale, and intensity of emerging environmental threats to national security. While the use of remotely sensed data to monitor the environment at local and global scales is not a novel proposition, the application of advances in nanosatellites and analytical platforms are capable of overcoming the data availability and accessibility barriers that have historically impeded the timely detection, identification, and monitoring of these stressors. Commercial and university-based applications of these technologies were used to identify and evaluate their capacity as security-motivated environmental monitoring tools. Presently, nanosatellites can provide consumers with 1-meter resolution imaging, frequent revisits, and customizable tasking, allowing users to define an appropriate temporal scale for high resolution data collection that meets their operational needs. Analytical platforms are capable of ingesting increasingly large and diverse volumes of data, delivering complex analyses in the form of interpretation-ready data products and solutions. The synchronous advancement of these technologies creates the capability of analytical platforms to deliver interpretable products from persistently collected high-resolution data that meet varying temporal and geographic scale requirements. In terms of emerging environmental threats, these advances translate into customizable and flexible tools that can respond to and accommodate the evolving nature of environmental stressors. This presentation will demonstrate the capability of nanosatellites and analytical platforms to provide timely, relevant, and actionable information that enables environmental analysts and stakeholders to make informed decisions regarding the prevention

  15. Transformation of triphenyltin by Eubacteria: Fate and effects in environmental system

    Digital Repository Service at National Institute of Oceanography (India)

    Jadhav, S.

    and organisms. Knowledge about the environmental concentrations of any chemical compound is required to understand its effects on the system. Presence of such compounds in the environment is a serious threat and danger for human health and aquatic organisms...

  16. Regional variations in the health, environmental, and climate benefits of wind and solar generation

    Science.gov (United States)

    Siler-Evans, Kyle; Azevedo, Inês Lima; Morgan, M. Granger; Apt, Jay

    2013-01-01

    When wind or solar energy displace conventional generation, the reduction in emissions varies dramatically across the United States. Although the Southwest has the greatest solar resource, a solar panel in New Jersey displaces significantly more sulfur dioxide, nitrogen oxides, and particulate matter than a panel in Arizona, resulting in 15 times more health and environmental benefits. A wind turbine in West Virginia displaces twice as much carbon dioxide as the same turbine in California. Depending on location, we estimate that the combined health, environmental, and climate benefits from wind or solar range from $10/MWh to $100/MWh, and the sites with the highest energy output do not yield the greatest social benefits in many cases. We estimate that the social benefits from existing wind farms are roughly 60% higher than the cost of the Production Tax Credit, an important federal subsidy for wind energy. However, that same investment could achieve greater health, environmental, and climate benefits if it were differentiated by region. PMID:23798431

  17. Regional variations in the health, environmental, and climate benefits of wind and solar generation.

    Science.gov (United States)

    Siler-Evans, Kyle; Azevedo, Inês Lima; Morgan, M Granger; Apt, Jay

    2013-07-16

    When wind or solar energy displace conventional generation, the reduction in emissions varies dramatically across the United States. Although the Southwest has the greatest solar resource, a solar panel in New Jersey displaces significantly more sulfur dioxide, nitrogen oxides, and particulate matter than a panel in Arizona, resulting in 15 times more health and environmental benefits. A wind turbine in West Virginia displaces twice as much carbon dioxide as the same turbine in California. Depending on location, we estimate that the combined health, environmental, and climate benefits from wind or solar range from $10/MWh to $100/MWh, and the sites with the highest energy output do not yield the greatest social benefits in many cases. We estimate that the social benefits from existing wind farms are roughly 60% higher than the cost of the Production Tax Credit, an important federal subsidy for wind energy. However, that same investment could achieve greater health, environmental, and climate benefits if it were differentiated by region.

  18. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  19. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  20. Viewing behaviour of spider phobics and non-phobics in the presence of threat and safety stimuli.

    Science.gov (United States)

    Lange, W G T; Tierney, K J; Reinhardt-Rutland, A H; Vivekananda-Schmidt, P

    2004-09-01

    To determine whether spider phobics and spider non-phobics differ in attending to threat and safety stimuli in close proximity, or spatially separated. A sample group of 16 spider-phobic and 16 spider-non-phobic volunteers were drawn from a student population on the basis of their scores on Watts and Sharrock's Spider Phobia Questionnaire. Attention was assessed by way of participants' viewing behaviour using an ASL 501 head-mounted eye-tracking system. In a control condition, participants viewed a neutral stimulus (a TV video) in the absence of the threat stimulus. In two experimental conditions, the threat stimulus (a live Chilean rose tarantula) was introduced (a) immediately beside the safety stimulus (the only exit of the experimental room), or (b) away from the safety stimulus. In the experimental conditions, phobics reduced their viewing of the TV and increased their viewing of the tarantula and of the exit; the biggest changes occurred when tarantula and exit were together. Phobics also made more eye motions across the experimental room. Our results are consistent with previous research employing reaction time to a neutral stimulus as dependent measure. In addition, our results suggest that phobics scan the environment as part of safety behaviour. We suggest that exposure treatments to reduce spider phobia may be facilitated by encouraging patients to stop environmental scanning. Copyright 2004 The British Psychological Society

  1. Paranoid thinking, cognitive bias and dangerous neighbourhoods: Implications for perception of threat and expectations of victimisation.

    Science.gov (United States)

    Jack, Alexander; Egan, Vincent

    2016-03-01

    Paranoid thinking is prevalent in the non-clinical population and cognitive mechanisms of heuristic reasoning and jumping to conclusions bias contributes to its formation and maintenance. This study investigated the degree to which paranoia, perceived environmental risk, heuristic reasoning and jumping to conclusions bias (measured with the beads task) contribute to misinterpretation of neutral stimuli, and whether this informed judgements regarding vulnerability to threat and crime. It is also investigated whether impulsiveness is a confounding factor on the beads task. Two hundred participants were recruited using a snowball-sampling method for a quantitative cross-sectional study. Participants reported demographic information, three psychometric questionnaires and two experimental tasks via an online paradigm hosted by the Bristol Online Survey tool. Participants with high paranoia scores perceived their environment to be more dangerous than those with low scores. Participants with high paranoia scores also overestimated threat in neutral stimuli and had high expectations of future victimisation. Jumping to conclusions on the beads task did not predict fear of crime outcomes, but was predicted by impulsivity. Participants who demonstrated paranoid thinking were more likely to reside in perceived dangerous neighbourhoods and overestimate threat. While this could indicate a paranoid heuristic, it is a potentially rational response to prior experiences of crime and victimisation. Implications and suggestions for future research are discussed. © The Author(s) 2015.

  2. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  3. Cultural adaptations to the differential threats posed by hot versus cold climates.

    Science.gov (United States)

    Murray, Damian R

    2013-10-01

    Hot and cold climates have posed differential threats to human survival throughout history. Cold temperatures can pose direct threats to survival in themselves, whereas hot temperatures may pose threats indirectly through higher prevalence of infectious disease. These differential threats yield convergent predictions for the relationship between more demanding climates and freedom of expression, but divergent predictions for freedom from discrimination.

  4. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  5. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  6. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  7. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  8. Threat driven modeling framework using petri nets for e-learning system.

    Science.gov (United States)

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  9. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    Science.gov (United States)

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  10. Strategic threat management: an exploration of nursing strategies in the pediatric intensive care unit.

    Science.gov (United States)

    Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina

    2015-03-01

    Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  11. Meeting Report: Threats to Human Health and Environmental Sustainability in the Pacific Basin

    Science.gov (United States)

    Arnold, Robert G.; Carpenter, David O.; Kirk, Donald; Koh, David; Armour, Margaret-Ann; Cebrian, Mariano; Cifuentes, Luis; Khwaja, Mahmood; Ling, Bo; Makalinao, Irma; Paz-y-Miño, César; Peralta, Genandrialine; Prasad, Rajendra; Singh, Kirpal; Sly, Peter; Tohyama, Chiharu; Woodward, Alistair; Zheng, Baoshan; Maiden, Todd

    2007-01-01

    The coastal zone of the Pacific Rim is home for about one-third of the world’s population. Disproportionate growth of Far Eastern economies has produced a disproportionate share of related environmental difficulties. As the region searches for acceptable compromises between growth and environmental quality, its influence on global environmental health is certain to increase. Consequences of global environmental change such as habitat alteration, storms, and sealevel rise will be particularly acute among Pacific Rim nations. Adverse health effects from arsenic exposure in Pacific Rim nations have been used to justify drinking water standards in the United States and elsewhere. As global manufacturing in the Pacific Rim increases, the centroid of global air quality and waste management issues will shift further toward Far Eastern nations. The Eleventh International Conference of the Pacific Basin Consortium (PBC) was held in September 2005 in Honolulu, Hawaii. The purpose of the conference was to bring together individuals to discuss regional challenges to sustainable growth. The historic emphasis of the conference on hazardous wastes in relation to human health makes the PBC an ideal forum for discussing technical aspects of sustainable economic growth in the Pacific region. That role is reflected in the 2005 PBC conference themes, which included management of arsenic in potable waters, air quality, climate change, pesticides, mercury, and electronics industry waste—each with emphasis on relationships to human health. Arsenic management exemplifies the manner in which the PBC can focus interdisciplinary discussion in a single technical area. The conference program provided talks on arsenic toxicology, treatment technologies, management of arsenic-bearing residuals from water treatment, and the probable societal costs and benefits of arsenic management. PMID:18087598

  12. Meeting report: threats to human health and environmental sustainability in the pacific basin.

    Science.gov (United States)

    Arnold, Robert G; Carpenter, David O; Kirk, Donald; Koh, David; Armour, Margaret-Ann; Cebrian, Mariano; Cifuentes, Luis; Khwaja, Mahmood; Ling, Bo; Makalinao, Irma; Paz-Y-Miño, César; Peralta, Genandrialine; Prasad, Rajendra; Singh, Kirpal; Sly, Peter; Tohyama, Chiharu; Woodward, Alistair; Zheng, Baoshan; Maiden, Todd

    2007-12-01

    The coastal zone of the Pacific Rim is home for about one-third of the world's population. Disproportionate growth of Far Eastern economies has produced a disproportionate share of related environmental difficulties. As the region searches for acceptable compromises between growth and environmental quality, its influence on global environmental health is certain to increase. Consequences of global environmental change such as habitat alteration, storms, and sea level rise will be particularly acute among Pacific Rim nations. Adverse health effects from arsenic exposure in Pacific Rim nations have been used to justify drinking water standards in the United States and elsewhere. As global manufacturing in the Pacific Rim increases, the centroid of global air quality and waste management issues will shift further toward Far Eastern nations. The Eleventh International Conference of the Pacific Basin Consortium (PBC) was held in September 2005 in Honolulu, Hawaii. The purpose of the conference was to bring together individuals to discuss regional challenges to sustainable growth. The historic emphasis of the conference on hazardous wastes in relation to human health makes the PBC an ideal forum for discussing technical aspects of sustainable economic growth in the Pacific region. That role is reflected in the 2005 PBC conference themes, which included management of arsenic in potable waters, air quality, climate change, pesticides, mercury, and electronics industry waste-each with emphasis on relationships to human health. Arsenic management exemplifies the manner in which the PBC can focus interdisciplinary discussion in a single technical area. The conference program provided talks on arsenic toxicology, treatment technologies, management of arsenic-bearing residuals from water treatment, and the probable societal costs and benefits of arsenic management.

  13. Attentional bias towards health-threat information in chronic fatigue syndrome.

    Science.gov (United States)

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  14. Site environmental report for calendar year 1996: Yucca Mountain site, Nye County, Nevada

    International Nuclear Information System (INIS)

    1997-11-01

    The environmental program established by the Yucca Mountain Site Characterization Office (YMSCO) has been designed and implemented to protect, maintain, and restore environmental quality, minimize potential threats to the environment and the public, and comply with environmental policies and US Department of Energy (DOE) Orders. In accordance with DOE Order 5400.1, General Environmental Protection Program (DOE, 1990a), to be superseded by DOE Order 231.1 (under review), the status of the Yucca Mountain Site Characterization Project (YMP) environmental program has been summarized in this annual Site Environmental Report (SER) to characterize performance, document compliance with environmental requirements, and highlight significant programs and efforts during calendar year 1996

  15. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  16. Environmental issues: the challenge for the chief executive.

    Science.gov (United States)

    Hutchinson, C

    1992-06-01

    Businesses are under pressure to adopt environmental policies and incorporate them into their strategic business planning as a matter of routine. These pressures are coming from at least five sources--stricter legislation, consumer demand, competitive advantage, staff concerns and community pressure. The challenge is enormous but there is growing evidence that sound environmental management provides pay-off in bottom line results. Business organizations have a vital role to play and its good for them. There are opportunities for new business as well as threats to those organizations which continue to ignore the trends.

  17. Biodiversity conservation in a changing climate: a review of threats and implications for conservation planning in Myanmar.

    Science.gov (United States)

    Rao, Madhu; Saw Htun; Platt, Steven G; Tizard, Robert; Poole, Colin; Than Myint; Watson, James E M

    2013-11-01

    High levels of species richness and endemism make Myanmar a regional priority for conservation. However, decades of economic and political sanctions have resulted in low conservation investment to effectively tackle threats to biodiversity. Recent sweeping political reforms have placed Myanmar on the fast track to economic development-the expectation is increased economic investments focused on the exploitation of the country's rich, and relatively intact, natural resources. Within a context of weak regulatory capacity and inadequate environmental safeguards, rapid economic development is likely to have far-reaching negative implications for already threatened biodiversity and natural-resource-dependent human communities. Climate change will further exacerbate prevailing threats given Myanmar's high exposure and vulnerability. The aim of this review is to examine the implications of increased economic growth and a changing climate within the larger context of biodiversity conservation in Myanmar. We summarize conservation challenges, assess direct climatological impacts on biodiversity and conclude with recommendations for long-term adaptation approaches for biodiversity conservation.

  18. A simple strategy to reduce stereotype threat for orthopedic residents.

    Science.gov (United States)

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  19. Investigation of a Markov Model for Computer System Security Threats

    Directory of Open Access Journals (Sweden)

    Alexey A. A. Magazev

    2017-01-01

    Full Text Available In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. In the framework of this model the functioning of the computer system is considered as a sequence of failures and recovery actions which appear as results of information security threats acting on the system. We provide a detailed description of the model: the explicit analytical formulas for the probabilities of computer system states at any arbitrary moment of time are derived, some limiting cases are discussed, and the long-run dynamics of the system is analysed. The dependence of the security state probability (i.e. the state for which threats are absent on the probabilities of threats is separately investigated. In particular, it is shown that this dependence is qualitatively different for odd and even moments of time. For instance, in the case of one threat the security state probability demonstrates non-monotonic dependence on the probability of threat at even moments of time; this function admits at least one local minimum in its domain of definition. It is believed that the mentioned feature is important because it allows to locate the most dangerous areas of threats where the security state probability can be lower then the permissible level. Finally, we introduce an important characteristic of the model, called the relaxation time, by means of which we construct the permitting domain of the security parameters. Also the prospects of the received results application to the problem of finding the optimal values of the security parameters is discussed.

  20. Environmentally benign chemical synthesis and processing

    International Nuclear Information System (INIS)

    Hancock, K.G.

    1992-01-01

    A new era of university-industry-government partnership is required to address the intertwined problems of industrial economic competitiveness and environmental quality. Chemicals that go up the stacks and down the drains are simultaneously a serious detriment to the environment, a waste of natural resources, and a threat to industrial profitability. Recently, the NSF Divisions of Chemistry and chemical and Thermal Systems have joined with the Council for Chemical research in a new grant program to reduce pollution at the source by underwriting research aimed at environmentally benign chemical synthesis and processing. Part of a broader NSF initiative on environmental science research, this new program serves as a model for university-industry-government joint action and technology transfer. Other features of this program and related activities will be described in this paper

  1. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    OpenAIRE

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01

    This chapter explores stereotype threat in organizational contexts. Building on the understanding that stereotype threat involves concerns about confirming a negative stereotype about one’s group, we begin by elucidating the scope of potential stereotype threat effects in organizations. We first examine the ubiquity of evaluations in organizations, which are at the heart of stereotype threat. Next we specify the potential psychological consequences of stereotype threat on targeted individua...

  2. Inferring the nature of anthropogenic threats from long-term abundance records.

    Science.gov (United States)

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  3. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    Science.gov (United States)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-12-01

    Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Among the major (well-known) threats with high impact are nutrient input (particularly of phosphorus), habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture) or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international

  4. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  5. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    Science.gov (United States)

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  6. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    interests. These threats were separate from traditional regional or state-centered threats, and included such diverse issues as terrorism, mass migrations ...organizations as examples of TOC; the Sinaloa Cartel, the Yakuza, the Camorra. This conceptual framework leads to the conclusion that the best way to deal

  7. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider...

  8. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  9. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Directory of Open Access Journals (Sweden)

    Lindberg Nina

    2012-12-01

    Full Text Available Abstract Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic.

  10. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Science.gov (United States)

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  11. Hot or cold: is communicating anger or threats more effective in negotiation?

    Science.gov (United States)

    Sinaceur, Marwan; Van Kleef, Gerben A; Neale, Margaret A; Adam, Hajo; Haag, Christophe

    2011-09-01

    Is communicating anger or threats more effective in eliciting concessions in negotiation? Recent research has emphasized the effectiveness of anger communication, an emotional strategy. In this article, we argue that anger communication conveys an implied threat, and we document that issuing threats is a more effective negotiation strategy than communicating anger. In 3 computer-mediated negotiation experiments, participants received either angry or threatening messages from a simulated counterpart. Experiment 1 showed that perceptions of threat mediated the effect of anger (vs. a control) on concessions. Experiment 2 showed that (a) threat communication elicited greater concessions than anger communication and (b) poise (being confident and in control of one's own feelings and decisions) ascribed to the counterpart mediated the positive effect of threat compared to anger on concessions. Experiment 3 replicated this positive effect of threat over anger when recipients had an attractive alternative to a negotiated agreement. These findings qualify previous research on anger communication in negotiation. Implications for the understanding of emotion and negotiation are discussed. PsycINFO Database Record (c) 2011 APA, all rights reserved

  12. Nuclear threats in the vicinity of the Nordic countries. Supplementary final report of the Nordic Nuclear Safety research

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.

    2006-04-01

    The purpose of this project was to continue the cross-disciplinary study SBA-1 'base of knowledge' in the NKS research program 1998-2001 regarding possible nuclear threats in the vicinity of the Nordic countries. The main task for the project was to expand and envelope this database. Finding information to be placed in the database and identifying and filling gaps in knowledge were prioritised. This is a continuous process which extends beyond the end of this project, in order to have an operating and updated database also in the years to come. In this project work has been done making information systems in Norway that can take care of the database in the future. The scope of the preceding project was to prepare a base of knowledge regarding possible nuclear threats in the vicinity of the Nordic countries. The database, including a literature database, is presented on the website 'Nuclear threats in the vicinity of the Nordic Countries'. The utilisation of modern information technology gives the user of the database easy access to information on different types of nuclear installations and threats. The project focused on potential events at nuclear installations and the consequences for the Nordic countries, especially with regards to vulnerable food chains, doses to man, environmental contamination and emergency preparedness systems. The geographical area dealt with includes North-west Russia and the Baltic states and the nuclear installations investigated are nuclear power plants, ship reactors and storage and handling of used fuel and radioactive waste. (au)

  13. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    OpenAIRE

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, ste...

  14. Rift Valley fever: Real or perceived threat for Zambia?

    Directory of Open Access Journals (Sweden)

    George Dautu

    2012-06-01

    Full Text Available Rift Valley fever (RVF in Zambia was first reported in 1974 during an epizootic of cattle and sheep that occurred in parts of Central, Southern and Copperbelt Provinces. In 1990, the disease was documented in nine districts of the provinces of Zambia. In the last two decades, there have been no reports of RVF. This long period without reported clinical disease raises questions as to whether RVF is a current or just a perceived threat. To address this question, World Organisation for Animal Health (OIE disease occurrence data on RVF for the period 2005−2010 in the Southern Africa Development Community (SADC was analysed. From the analysis, it was evident that most countries that share a common border with Zambia had reported at least one occurrence of the disease during the period under review. Due to the absence of natural physical barriers between Zambia and most of her neighbours, informal livestock trade and movements is a ubiquitous reality. Analysis of the rainfall patterns also showed that Zambia received rains sufficient to support a mosquito population large enough for high risk of RVF transmission. The evidence of disease occurrence in nearby countries coupled with animal movement, and environmental risk suggests that RVF is a serious threat to Zambia. In conclusion, the current occurrence of RVF in Zambia is unclear, but there are sufficient indications that the magnitude of the circulating infection is such that capacity building in disease surveillance and courses on recognition of the disease for field staff is recommended. Given the zoonotic potential of RVF, these measures are also a prerequisite for accurate assessment of the disease burden in humans.

  15. Self-Models and Relationship Threat

    Directory of Open Access Journals (Sweden)

    Máire B. Ford

    2015-07-01

    Full Text Available This study investigated a key claim of risk regulation theory, namely, that psychological internalizing of a relationship threat will serve as a mediator of the link between self-models (self-esteem and attachment anxiety and relationship responses (moving closer to a partner vs. distancing from a partner. Participants (N = 101 received feedback that threatened their current romantic relationship (or no feedback and then completed measures of internal–external focus, relationship closeness–distancing, and acceptance–rejection of the feedback. Results showed that participants with negative self-models responded to the relationship threat by becoming more internally focused and by distancing from their partners, whereas those with positive self-models became more externally focused and moved closer to their partners. Mediation analyses indicated that the link between self-models and relationship closeness–distancing was partially explained by internal focus.

  16. Uranium Mill Tailings Remedial Action Project environmental protection implementation plan

    International Nuclear Information System (INIS)

    1994-10-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project Environmental Protection Implementation Plan (EPIP) has been prepared in accordance with the requirements of the U.S. Department of Energy (DOE) Order 5400.1. The UMTRA EPIP is updated annually. This version covers the time period of 9 November 1994, through 8 November 1995. Its purpose is to provide management direction to ensure that the UMTRA Project is operated and managed in a manner that will protect, maintain, and where necessary, restore environmental quality, minimize potential threats to public health and the environment, and comply with environmental regulations and DOE policies

  17. Uranium Mill Tailings Remedial Action Project environmental protection implementation plan

    Energy Technology Data Exchange (ETDEWEB)

    1994-10-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project Environmental Protection Implementation Plan (EPIP) has been prepared in accordance with the requirements of the U.S. Department of Energy (DOE) Order 5400.1. The UMTRA EPIP is updated annually. This version covers the time period of 9 November 1994, through 8 November 1995. Its purpose is to provide management direction to ensure that the UMTRA Project is operated and managed in a manner that will protect, maintain, and where necessary, restore environmental quality, minimize potential threats to public health and the environment, and comply with environmental regulations and DOE policies.

  18. Physical threat and self-evaluative emotions in smoking cessation

    NARCIS (Netherlands)

    Dijkstra, A; Den Dijker, L

    Negative self-evaluative emotions (e.g., feeling dissatisfied with oneself, feeling stupid) are considered to indicate a threat to the self that can be caused by an external physical threat (e.g., smoking). A sample of 363 smokers was tested twice, with an interval of 8 months. Prospective analyses

  19. Removing environmental organic pollutants with bioremediation and phytoremediation.

    Science.gov (United States)

    Kang, Jun Won

    2014-06-01

    Hazardous organic pollutants represent a threat to human, animal, and environmental health. If left unmanaged, these pollutants could cause concern. Many researchers have stepped up efforts to find more sustainable and cost-effective alternatives to using hazardous chemicals and treatments to remove existing harmful pollutants. Environmental biotechnology, such as bioremediation and phytoremediation, is a promising field that utilizes natural resources including microbes and plants to eliminate toxic organic contaminants. This technology offers an attractive alternative to other conventional remediation processes because of its relatively low cost and environmentally-friendly method. This review discusses current biological technologies for the removal of organic contaminants, including chlorinated hydrocarbons, focusing on their limitation and recent efforts to correct the drawbacks.

  20. Identifying species threat hotspots from global supply chains.

    Science.gov (United States)

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  1. Planning a radar system for protection from the airborne threat

    International Nuclear Information System (INIS)

    Greneker, E.F.; McGee, M.C.

    1986-01-01

    A planning methodology for developing a radar system to protect nuclear materials facilities from the airborne threat is presented. Planning for physical security to counter the airborne threat is becoming even more important because hostile acts by terrorists are increasing and airborne platforms that can be used to bypass physical barriers are readily available. The comprehensive system planning process includes threat and facility surveys, defense hardening, analysis of detection and early warning requirements, optimization of sensor mix and placement, and system implementation considerations

  2. The effects of takeover threats of shareholders and firm value

    OpenAIRE

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  3. Contextual influences on environmental concerns cross-nationally: A multilevel investigation.

    Science.gov (United States)

    Marquart-Pyatt, Sandra T

    2012-09-01

    Environmental issues continue to grow in international prominence, as environmental conditions are recognized as some of the most important problems facing the world. Research examining this globalization of environmental concern shown in public opinion surveys emphasizes the importance of context yet is currently underspecified. To address this gap, this research uses a multi-level, cross-national study to examine individual-level and country-level influences on three measures of environmental concern: environmental threat awareness, environmental efficacy, and willingness to pay. At the individual level, education, age, and gender affect environmental concerns. At the national level, economic, political, and environmental factors affect environmental concerns. Importantly, contextual factors differ in their effects depending on the dimension of environmental concern measured. Results from cross-level interactions for education confirm these complexities across these measures, supporting a dimensionality argument. The importance of the measurement of environmental concern shown in this research is emphasized for future cross-national scholarship. Copyright © 2012 Elsevier Inc. All rights reserved.

  4. Climate Change and Requirement of Transfer of Environmentally Sound Technology

    DEFF Research Database (Denmark)

    Uddin, Mahatab

    that developed the technology, to another that adopts, adapts, and uses it. As different kinds of threats posed by climate change are continuously increasing all over the world the issue of “technology transfer” especially the transfer of environmentally sound technologies has become one of the key topics...

  5. Evaluating the response of complex systems to environmental threats: the Σ II method

    International Nuclear Information System (INIS)

    Corynen, G.C.

    1983-05-01

    The Σ II method was developed to model and compute the probabilistic performance of systems that operate in a threatening environment. Although we emphasize the vulnerability of complex systems to earthquakes and to electromagnetic threats such as EMP (electromagnetic pulse), the method applies in general to most large-scale systems or networks that are embedded in a potentially harmful environment. Other methods exist for obtaining system vulnerability, but their complexity increases exponentially as the size of systems is increased. The complexity of the Σ II method is polynomial, and accurate solutions are now possible for problems for which current methods require the use of rough statistical bounds, confidence statements, and other approximations. For super-large problems, where the costs of precise answers may be prohibitive, a desired accuracy can be specified, and the Σ II algorithms will halt when that accuracy has been reached. We summarize the results of a theoretical complexity analysis - which is reported elsewhere - and validate the theory with computer experiments conducted both on worst-case academic problems and on more reasonable problems occurring in practice. Finally, we compare our method with the exact methods of Abraham and Nakazawa, and with current bounding methods, and we demonstrate the computational efficiency and accuracy of Σ II

  6. Animal species endangerment: The role of environmental pollution

    Science.gov (United States)

    Pattee, Oliver H.; Fellows, Valerie L.; Bounds, Dixie L.; Hoffman, David J.; Rattner, Barnett A.; Burton, G. Allen; Cairns, John

    2003-01-01

    of Section 7 consultations and environmental impact statements, review permit applications, conduct environmental risk assessments, prioritize research needs. and identify limiting factors affecting species health. These data are also useful in identifying potential threats to species' health. Without properly identifying threats to endangered species based on sound. scientific research. there is little hope to successfully recover an endangered species.

  7. Future directions for environmental policy

    Energy Technology Data Exchange (ETDEWEB)

    O' Riordan, T

    1984-01-01

    Environmentalism is an elusive concept with many meanings. Its changing character is examined together with an analysis of how it is likely to influence public policy across a broad front. The paper also reviews the major environmental issues which QECD countries are likely to face nationally, regionally and globally over the next twenty years and discusses the type of politics that may emerge within the new environmentalism. The overriding global issue will be the tragic interconnection between poverty and environmental damage in the underdeveloped countries. In the developed but de-industrialising economies of the 'north' greatest attention will be placed on devising means for creating jobs and providing satisfying occupations for people forced out of a job or never in employment. Environmental rehabilitation can create jobs, but it will involve the denial of resources otherwise available to create jobs elsewhere. It will therefore be necessary to consider the 'next job effectiveness' of environmental policies. Another policy area that requires new thinking is the management of environmental hazards, notably how to dispose of toxic wastes in a manner acceptable to a majority of people. Finally serious efforts will have to be made, not only to infuse environmental principles within all policy arenas, but also to ensure that departmental responsibilities and budgets are properly linked. The principle that those who exploit environmental resources should subsidise those who use environmental resources frugally and benignly by means of transfer taxes and payments should also become established. (orig.).

  8. European monitoring systems and data for assessing environmental and climate impacts on human infectious diseases.

    Science.gov (United States)

    Nichols, Gordon L; Andersson, Yvonne; Lindgren, Elisabet; Devaux, Isabelle; Semenza, Jan C

    2014-04-09

    Surveillance is critical to understanding the epidemiology and control of infectious diseases. The growing concern over climate and other drivers that may increase infectious disease threats to future generations has stimulated a review of the surveillance systems and environmental data sources that might be used to assess future health impacts from climate change in Europe. We present an overview of organizations, agencies and institutions that are responsible for infectious disease surveillance in Europe. We describe the surveillance systems, tracking tools, communication channels, information exchange and outputs in light of environmental and climatic drivers of infectious diseases. We discuss environmental and climatic data sets that lend themselves to epidemiological analysis. Many of the environmental data sets have a relatively uniform quality across EU Member States because they are based on satellite measurements or EU funded FP6 or FP7 projects with full EU coverage. Case-reporting systems for surveillance of infectious diseases should include clear and consistent case definitions and reporting formats that are geo-located at an appropriate resolution. This will allow linkage to environmental, social and climatic sources that will enable risk assessments, future threat evaluations, outbreak management and interventions to reduce disease burden.

  9. The Phenomenon of Ukrainian Poverty in the Context of Threats to National Security

    Directory of Open Access Journals (Sweden)

    Hrinenko Аndrei Yu.

    2018-03-01

    Full Text Available Poverty is one of the unresolved problems among the socio-economic components in Ukraine. According to recent researches, the majority of the population of our country is beyond the limit of poverty. Experts from both Ukraine and the international organizations, including the UN, have different estimates of extent of poverty in Ukraine, citing different methods of calculation. However, whatever estimates be given to this social phenomenon, all experts agree on one thing: poverty in Ukraine is aggravated and covers the wider population of the country. The phenomenon of Ukrainian poverty is that for more than a quarter of a century inequality in the income of the population is growing, the price of labor is falling, and, paradoxically, the Government contributes to the growth of poverty by its regulation and deregulation of the economy, financial and social spheres. Therefore, the greatest threat to conducting reforms, ensuring the economic growth, to the entire national economy today, is the exorbitant poverty, which not only provides for the increase in labor migration, but leads to the total emigration of skilled workers, who are highly valued by employers of the near and far abroad countries. And yet, despite the significant economic potential, available resources, Ukraine remains one of the poorest countries in Europe.

  10. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  11. The Influence of Social Threat on Pain, Aggression, and Empathy in Women.

    Science.gov (United States)

    Karos, Kai; Meulders, Ann; Goubert, Liesbet; Vlaeyen, Johan W S

    2018-03-01

    Only one published study has investigated the effect of a threatening social context on the perception and expression of pain, showing that social threat leads to increased pain reports but reduced nonverbal pain expression. The current study aimed to replicate and extend these findings to further explore the effects of a threatening social context. Healthy, female participants (N = 71) received 10 electrocutaneous stimuli delivered by a confederate. They were led to believe that the confederate was requested to administer 10 painful stimuli (control group) or that the confederate deliberately chose to deliver 10 painful stimuli when given the choice to deliver between 1 to 10 painful stimuli (social threat group). Self-reported pain intensity, unpleasantness, threat value of pain, and painful facial expression were assessed. Additionally, empathy and aggression toward the confederate were investigated. Social threat did not affect painful facial expression or self-reported pain intensity, but led to increased aggression toward the confederate. Moreover, perceived social threat predicted the threat value of pain and reduced empathy toward the confederate. We were not able to replicate the previously reported dissociation between pain reports and pain expression as a result of social threat. However, social threat was associated with an increased threat value of pain, increased aggression, and reduced empathy. A threatening social context affects how threatening pain is perceived and has interpersonal consequences such as increased aggression and reduced empathy, thereby creating a double burden on the individual suffering from pain. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  12. Emerging various environmental threats to brain and overview of surveillance system with zebrafish model

    Directory of Open Access Journals (Sweden)

    Rafael Vargas

    Full Text Available Pathologies related to neurotoxicity represent an important percentage of the diseases that determine the global burden of diseases. Neurotoxicity may be related to the increasing levels of potentially neurotoxic agents that pollute the environment, which generates concern, since agents that affect children may increase the incidence of neurodevelopmental disorders, affecting the quality of life of future citizens. Many environmental contaminants have been detected, and many of them derive from several human activities, including the mining, agriculture, manufacturing, pharmaceutical, beverage and food industries. These problems are more acute in third world countries, where environmental regulations are lax or non-existent. An additional major emerging problem is drug contamination. Periodic monitoring should be performed to identify potential neurotoxic substances using biological tests capable of identifying the risk. In this sense the fish embryo test (FET, which is performed on zebrafish embryos, is a useful, reliable and economical alternative that can be implemented in developing countries. Keywords: Neurotoxicity, Global burden disease, Environmental contaminants, Zebrafish embryo test

  13. Screening-level exposure-based prioritization to identify potential POPs, vPvBs and planetary boundary threats among Arctic contaminants

    Directory of Open Access Journals (Sweden)

    Efstathios Reppas-Chrysovitsinos

    2017-06-01

    Full Text Available A report that reviews Arctic contaminants that are not currently regulated as persistent organic pollutants (POPs under international treaties was recently published by the Arctic Monitoring and Assessment Programme (AMAP. We evaluated 464 individual chemicals mentioned in the AMAP report according to hazard profiles for POPs, very persistent and very bioaccumulative (vPvB chemicals, and two novel and distinct hazard profiles we derived from the planetary boundary threat framework. The two planetary boundary threat profiles assign high priority to chemicals that will be mobile and poorly reversible environmental contaminants. Utilizing persistence as a proxy for poor reversibility, we defined two exposure-based hazard profiles; airborne persistent contaminants (APCs and waterborne persistent contaminants (WPCs that are potential planetary boundary threats. We used in silico estimates of physicochemical properties and multimedia models to calculate hazard metrics for persistence, bioaccumulation and long-range transport potential, then we synthesized this information into four exposure-based hazard scores of the potential of each AMAP chemical to fit each of the POP, vPvB, APC and WPC exposure-based hazard profiles. As an alternative to adopting a “bright line” score that represented cause for concern, we scored the AMAP chemicals by benchmarking against a reference set of 148 known and relatively well-studied contaminants and expressed their exposure-based hazard scores as percentile ranks against the scores of the reference set chemicals. Our results show that scores in the four exposure-based hazard profiles provide complementary information about the potential environmental exposure-based hazards of the AMAP chemicals. Our POP, vPvB, APC and WPC exposure-based hazard scores identify high priority chemicals for further study from among the AMAP contaminants.

  14. Building an environmentally accountable medical curriculum through international collaboration

    DEFF Research Database (Denmark)

    Walpole, Sarah Catherine; Vyas, Aditya; Maxwell, Janie

    2017-01-01

    to mitigation of and adaptation to negative health impacts of environmental change. Medical schools have an integral role in training doctors who understand the interdependence of ecosystems and human health. Yet integrating environmental perspectives into busy medical curricula is not a simple task. Content......Background: Global environmental change is associated with significant health threats. The medical profession can address this challenge through advocacy, health system adaptation and workforce preparedness. Stewardship of health systems with attention to their environmental impacts can contribute......: At the 2016 Association for Medical Education in Europe conference, medical educators, students and clinicians from six continents discussed these challenges in a participatory workshop. Here we reflect on emerging themes from the workshop and how to plan for curricular change. Firstly, we outline recent...

  15. The effects of physical threat on team processes during complex task performance

    NARCIS (Netherlands)

    Kamphuis, W.; Gaillard, A.W.K.; Vogelaar, A.L.W.

    2011-01-01

    Teams have become the norm for operating in dangerous and complex situations. To investigate how physical threat affects team performance, 27 threeperson teams engaged in a complex planning and problem-solving task, either under physical threat or under normal conditions. Threat consisted of the

  16. Which US States Pose the Greatest Threats to Military Readiness and Public Health? Public Health Policy Implications for a Cross-sectional Investigation of Cardiorespiratory Fitness, Body Mass Index, and Injuries Among US Army Recruits.

    Science.gov (United States)

    Bornstein, Daniel B; Grieve, George L; Clennin, Morgan N; McLain, Alexander C; Whitsel, Laurie P; Beets, Michael W; Hauret, Keith G; Jones, Bruce H; Sarzynski, Mark A

    2018-01-09

    Many states in the southern region of the United States are recognized for higher rates of obesity, physical inactivity, and chronic disease. These states are therefore recognized for their disproportionate public health burden. The purpose of this study was to investigate state-level distributions of cardiorespiratory fitness, body mass index (BMI), and injuries among US Army recruits in order to determine whether or not certain states may also pose disproportionate threats to military readiness and national security. Sex-specific state-level values for injuries and fitness among 165 584 Army recruits were determined. Next, the relationship between median cardiorespiratory fitness and injury incidence at the state level was examined using Spearman correlations. Finally, multivariable Poisson regression models stratified by sex examined state-level associations between fitness and injury incidence, while controlling for BMI, and other covariates. Cardiorespiratory fitness and training-related injury incidence. A cluster of 10 states from the south and southeastern regions (Alabama, Arkansas, Florida, Georgia, Louisiana, Mississippi, North Carolina, South Carolina, Tennessee, and Texas) produced male or female recruits who were significantly less fit and/or more likely to become injured than recruits from other US states. Compared with the "most fit states," the incidence of injuries increased by 22% (95% CI, 17-28; P < .001) and 28% (95% CI, 19-36; P < .001) in male and female recruits from the "least fit states," respectively. The impact of policies, systems, and environments on physical activity behavior, and subsequently fitness and health, has been clearly established. Advocacy efforts aimed at active living policies, systems, and environmental changes to improve population health often fail. However, advocating for active living policies to improve national security may prove more promising, particularly with legislators. Results from this study demonstrate

  17. Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators.

    Science.gov (United States)

    Pennington, Charlotte R; Heim, Derek; Levy, Andrew R; Larkin, Derek T

    2016-01-01

    This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms.

  18. Endogenous Pain Modulation Induced by Extrinsic and Intrinsic Psychological Threat in Healthy Individuals.

    Science.gov (United States)

    Gibson, William; Moss, Penny; Cheng, Tak Ho; Garnier, Alexandre; Wright, Anthony; Wand, Benedict M

    2018-03-01

    Many factors interact to influence threat perception and the subsequent experience of pain. This study investigated the effect of observing pain (extrinsic threat) and intrinsic threat of pain to oneself on pressure pain threshold (PPT). Forty socially connected pairs of healthy volunteers were threat-primed and randomly allocated to experimental or control roles. An experimental pain modulation paradigm was applied, with non-nociceptive threat cues used as conditioning stimuli. In substudy 1, the extrinsic threat to the experimental participant was observation of the control partner in pain. The control participant underwent hand immersion in noxious and non-noxious water baths in randomized order. Change in the observing participant's PPT from baseline to mid- and postimmersion was calculated. A significant interaction was found for PPT between conditions and test time (F 2,78  = 24.9, P Extrinsic and intrinsic threat of pain, in the absence of any afferent input therefore influences pain modulation. This may need to be considered in studies that use noxious afferent input with populations who show dysfunctional pain modulation. The effect on endogenous analgesia of observing another's pain and of threat of pain to oneself was investigated. Extrinsic as well as intrinsic threat cues, in the absence of any afferent input, increased pain thresholds, suggesting that mere threat of pain may initiate analgesic effects in traditional noxious experimental paradigms. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  19. Biodiversity in environmental assessment-current practice and tools for prediction

    International Nuclear Information System (INIS)

    Gontier, Mikael; Balfors, Berit; Moertberg, Ulla

    2006-01-01

    Habitat loss and fragmentation are major threats to biodiversity. Environmental impact assessment and strategic environmental assessment are essential instruments used in physical planning to address such problems. Yet there are no well-developed methods for quantifying and predicting impacts of fragmentation on biodiversity. In this study, a literature review was conducted on GIS-based ecological models that have potential as prediction tools for biodiversity assessment. Further, a review of environmental impact statements for road and railway projects from four European countries was performed, to study how impact prediction concerning biodiversity issues was addressed. The results of the study showed the existing gap between research in GIS-based ecological modelling and current practice in biodiversity assessment within environmental assessment

  20. Translations on Environmental Quality, No. 152

    Science.gov (United States)

    1977-11-01

    information was released during a press conference called by Manuel Diaz Dorado, under-secretary for Environmental Planning , Luis Urbano Juagueri, technical...seriousness of this threat, as well as what is being done and what plans have been made to eliminate the hazard. It is not superfluous to reiterate...the floating solids in the harbor; the use of a floating in- cinerator to collect and burn the garbage from ships anchored in the port; the planning

  1. Do environmental and climate change issues threaten sustainable development?

    International Nuclear Information System (INIS)

    Mesarovic, M.

    2002-01-01

    The atmospheric environment is presently under threat from anthropogenic emissions of pollutants and greenhouse gases to the extent that irreversible changes to the climate, the ozone layer and the quality of the air could occur. While the required changes in practice and regulations may hit economies if the induced costs are to be internalised, the impact of ignoring these requirements might even threaten the concept of sustainable development. The prospects of environmental pollution, depletion of ozone layer and climate change due to human activities have sparked a variety of controversies on many fronts. These topics are discussed with respect to the imposed threats to the sustainable development, and with particular attention paid to delays in urgent emission reductions. (author)

  2. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  3. Vigilant attention to threat, sleep patterns, and anxiety in peripubertal youth.

    Science.gov (United States)

    Ricketts, Emily J; Price, Rebecca B; Siegle, Greg J; Silk, Jennifer S; Forbes, Erika E; Ladouceur, Cecile D; Harvey, Allison G; Ryan, Neal D; Dahl, Ronald E; McMakin, Dana L

    2018-05-02

    Vigilant attention to threat is commonly observed in anxiety, undergoes developmental changes in early adolescence, and has been proposed to interfere with sleep initiation and maintenance. We present one of the first studies to use objective measures to examine associations between vigilant attention to threat and difficulties initiating and maintaining sleep in an early adolescent anxious sample. We also explore the moderating role of development (age, puberty) and sex. Participants were 66 peripubertal youth (ages 9-14) with a primary anxiety disorder and 24 healthy control subjects. A dot-probe task was used to assess attentional bias to fearful relative to neutral face stimuli. Eye-tracking indexed selective attentional bias to threat, and reaction time bias indexed action readiness to threat. Sleep was assessed via actigraphy (e.g. sleep onset delay, wake after sleep onset, etc.), parent report (Children's Sleep Habits Questionnaire), and child report (Sleep Self-Report). The Pediatric Anxiety Rating Scale assessed anxiety severity. Eye-tracking initial threat fixation bias (β = .33, p = .001) and threat dwell time bias (β = .22, p = .041) were positively associated with sleep onset latency. Reaction time bias was positively associated with wake after sleep onset (β = .24, p = .026) and parent-reported sleep disturbance (β = .25, p = .019). Anxiety (severity, diagnosis) was not associated with these outcomes. Sex (β = -.32, p = .036) moderated the relation between initial threat fixation bias and sleep onset latency, with a positive association for males (p = .005), but not for females (p = .289). Age and pubertal status did not moderate effects. Vigilant attention to threat is related to longer sleep onset and reduced sleep maintenance. These associations are not stronger in early adolescents with anxiety. Implications for early intervention or prevention that targets vigilant attention to threat to impact sleep disturbance, and

  4. Girls can play ball: Stereotype threat reduces variability in a motor skill.

    Science.gov (United States)

    Huber, Meghan E; Brown, Adam J; Sternad, Dagmar

    2016-09-01

    The majority of research on stereotype threat shows what is expected: threat debilitates performance. However, facilitation is also possible, although seldom reported. This study investigated how stereotype threat influences novice females when performing the sensorimotor task of bouncing a ball to a target. We tested the predictions of two prevailing accounts for debilitation and facilitation due to sterotype threat effects: working memory and mere effort. Experimental results showed that variability in performance decreased more in stigmatized females than in control females, consistent with the prediction of the mere effort account, but inconsistent with the working memory account. These findings suggest that stereotype threat effects may be predicated upon the correctness of the dominant motor behavior, rather than on a novice-expert distinction or task difficulty. Further, a comprehensive understanding should incorporate the fact that stereotype threat can facilitate, as well as debilitate, performance. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Designing environmental campaigns by using agent-based simulations: strategies for changing environmental attitudes.

    Science.gov (United States)

    Mosler, Hans-Joachim; Martens, Thomas

    2008-09-01

    Agent-based computer simulation was used to create artificial communities in which each individual was constructed according to the principles of the elaboration likelihood model of Petty and Cacioppo [1986. The elaboration likelihood model of persuasion. In: Berkowitz, L. (Ed.), Advances in Experimental Social Psychology. Academic Press, New York, NY, pp. 123-205]. Campaigning strategies and community characteristics were varied systematically to understand and test their impact on attitudes towards environmental protection. The results show that strong arguments influence a green (environmentally concerned) population with many contacts most effectively, while peripheral cues have the greatest impact on a non-green population with fewer contacts. Overall, deeper information scrutiny increases the impact of strong arguments but is especially important for convincing green populations. Campaigns involving person-to-person communication are superior to mass-media campaigns because they can be adapted to recipients' characteristics.

  6. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  7. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  8. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  9. Toddlers’ Duration of Attention towards Putative Threat

    Science.gov (United States)

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  10. Prioritizing a One Health Approach in the Immediate Fight Against Antimicrobial Resistance.

    Science.gov (United States)

    Ogawa, V Ayano; Shah, Cecilia M; Hughes, James M; King, Lonnie J

    2018-03-09

    Antimicrobial resistance is a major threat to global health security. While the global community has made recent advances to mitigate the threat of antimicrobial resistance, we continue to face challenges in creating solutions and concrete actions that will yield the greatest immediate impact. To examine the critical areas in human, animal and environmental health that contribute to the emergence and spread of antimicrobial resistance, the Forum on Microbial Threats of the U.S. National Academies of Sciences, Engineering and Medicine hosted a public workshop on June 20-21, 2017 in Washington, DC. This article summarizes the final synthesis discussion that took place at the workshop on suggestions for immediate actions and implementation that are feasible and cost-effective for combating antimicrobial resistance across the One Health domains. The priorities that emerged from the participants' discussions addressed the following topics: (1) Surveillance; (2) Stewardship, Infection Prevention and Behavior Modification; (3) Basic and Applied Research and Development; and (4) Global Policy and Coordination.

  11. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    Science.gov (United States)

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  12. Science priorities for reducing the threat of invasive species

    Science.gov (United States)

    E. A. Chornesky; A. M. Bartuska; G. H. Aplet; J. Cummings-Carlson; F. W. Davis; J. Eskow; D. R. Gordon; K. W. Gottschalk; R. A. Haack; A. J. Hansen; R. N. Mack; F. J. Rahel; M. A. Shannon; L. A. Wainger; T. B. Wigley

    2005-01-01

    Invasive species pose a major, yet poorly addressed, threat to sustainable forestry. Here we set forth an interdisciplinary science strategy of research, development, and applications to reduce this threat. To spur action by public and private entities that too often are slow, reluctant, or unable to act, we recommend (a) better integrating invasive species into...

  13. Final report from the NKS NordThreat seminar in Asker

    Energy Technology Data Exchange (ETDEWEB)

    Eikelmann, I M.H.; Selnaes, OE G [eds.; Norwegian Radiation Protection Authority (Norway)

    2009-11-15

    Changes in the international security environment have lead to an increased attention towards the need to revise various threat assessments in the Nordic countries. Together with recent events such as incidents at Nordic nuclear power plants, orphan sources and accidents involving nuclear powered vessels, this has given a good opportunity for an exchange of information and opinions. The NKS-B NordThreat seminar took place at Sem gjestegaard in Asker outside Oslo, Norway on 30 - 31 October 2008. Main topics in the seminar were: 1) National threat assessments 2) Potential hazards 3) Experience from previous incidents 4) Public perception of nuclear and radiological threats and information challenges 5) Challenges for future preparedness. There were about 40 participants at the seminar. These were mainly members of the NKS organisations, invited speakers and representatives from various Norwegian emergency preparedness organisations. (author)

  14. Final environmental impact statement supplement for wastewater management systems, North Jefferson County, Kentucky wastewater facilities

    International Nuclear Information System (INIS)

    1992-12-01

    The Final Environmental Impact Statement Supplement (FEISS) serves to update the wastewater treatment alternatives presented in the original EIS (The North County Area Environmental Impact Statement, Jefferson County, KY, July 1984), determine the best alternative, and compare that alternative to the Louisville and Jefferson County Metropolitan Sewer District's North County Action Plan (NCAP). The NCAP was determined to have the greatest cost effectiveness, lowest environmental impact, and best implementability and reliability and so is the preferred alternative in the FEISS. Significant environmental impacts of the alternative are described and mitigative measures discussed

  15. The conditions for attaining the greatest degree of system stability with strict generator excitation control

    Energy Technology Data Exchange (ETDEWEB)

    Gruzdev, I.A.; Ekimova, M.M.; Truspekova, G.A.

    1982-01-01

    Expressions are derived for an idealized model of a complex electric power system; these expressions define the greatest level of stability of an electric power system and the optimum combination of stabilization factors with automatic excitation control in a single power system. The possibility of increasing the level of stability of an electric power system with simultaneous strict automatic excitation control of the synychronous generators in several power systems is analyzed.

  16. Modulation of the startle reflex by heat pain: does threat play a role?

    Science.gov (United States)

    Horn-Hofmann, C; Lautenbacher, S

    2015-02-01

    Previous studies have indicated that the startle reflex is potentiated by phasic, but not by tonic, heat pain, although the latter is seen as more strongly associated with emotional responses and more similar to clinical pain. The threat value of pain might be a decisive variable, which is not influenced alone by stimulus duration. This study aimed at comparing startle responses to tonic heat pain stimulation with varying degrees of threat. We hypothesized that the expectation of unpredictable temperature increases would evoke higher threat and thereby potentiate startle compared with the expectation of constant stimulation. Healthy, pain-free subjects (n = 40) underwent painful stimulation in two conditions (low/high threat) in balanced order. The only difference between the two conditions was that in the high-threat condition 50% of the trials were announced to include a short further noxious temperature increase at the end. Startle tones were presented prior to this temperature increase still in the phase of anticipation. We observed startle potentiation in the high-threat compared with the low-threat condition, but only in those participants who took part first in the high-threat condition. Habituation could not account for these findings, as we detected no significant decline of startle responses in the course of both conditions. Our results suggest that subjective threat might indeed be decisive for the action of pain on startle; the threat level appears not only influenced by actual expectations but also by previous experiences with pain as threatening or not. © 2014 European Pain Federation - EFIC®

  17. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  18. Distracted by the Unthought - Suppression and Reappraisal of Mind Wandering under Stereotype Threat.

    Science.gov (United States)

    Schuster, Carolin; Martiny, Sarah E; Schmader, Toni

    2015-01-01

    Previous research has found that subtle reminders of negative stereotypes about one's group can lead individuals to underperform on stereotype-relevant tests (e.g., women in math, ethnic minorities on intelligence tests). This so called stereotype threat effect can contribute to systematic group differences in performance that can obscure the true abilities of certain social groups and thereby sustain social inequalities. In the present study, we examined processes underlying stereotype threat effects on women's math performance, specifically focusing on the role of suppression of mind wandering (i.e., task-irrelevant thinking) in stereotype threat (ST) and no threat (NT) situations. Based on a process model of stereotype threat effects on performance, we hypothesized that women under stereotype threat spontaneously suppress mind wandering, and that this suppression impairs performance. An alternative regulation strategy that prevents suppression (i.e., reappraising task-irrelevant thoughts as normal) was predicted to prevent stereotype threat effects on performance. We manipulated stereotype threat (ST vs. NT) and cognitive regulation strategy (suppression, reappraisal, or no strategy) and measured women's performance on a math and a concentration task (N = 113). We expected three groups to perform relatively more poorly: Those in ST with either no strategy or suppression and those in NT with a suppression strategy. We tested the performance of these groups against the remaining three groups hypothesized to perform relatively better: those in NT with no strategy or reappraisal and those in ST with reappraisal. The results showed the expected pattern for participants' math performance, but not for concentration achievement. This pattern suggests that ineffective self-regulation by suppressing mind wandering can at least partly explain stereotype threat effects on performance, whereas a reappraisal strategy can prevent this impairment. We discuss implications for

  19. SOCIAL AND ENVIRONMENTAL IMPACTS OF THE SUGARCANE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Luciana Oranges Cezarino

    2012-06-01

    Full Text Available Currently, the concern about the environmental degradation and the conditions of life of our planet has increased. An alarm literally sounded relating the environmental problems and the uncertainties of the future. An energy revolution is necessary in face of the climate changes. Nature offers numerous possibilities of energy production and Brazil is in a great position in this scenario. It is the greatest producer, consumer and exporter of ethanol. Analyzing the Brazilian sugarcane industry, it is easy to recognize its historical and economic importance. More than ever, this industry has shown environmental solutions with changes in the energy matrix using ethanol as renewable fuel. It is essential to have the industry development in balance with social and environmental values. Thus, the first step to expand this sector would be to identify the social and environmental impacts of the sugarcane industry. Public policies are also acting on the sector and have a prominent role in the scenario.

  20. The neurobiology of safety and threat learning in infancy.

    Science.gov (United States)

    Debiec, Jacek; Sullivan, Regina M

    2017-09-01

    What an animal needs to learn to survive is altered dramatically as they change from dependence on the parent for protection to independence and reliance on self-defense. This transition occurs in most altricial animals, but our understanding of the behavioral neurobiology has mostly relied on the infant rat. The transformation from dependence to independence occurs over three weeks in pups and is accompanied by complex changes in responses to both natural and learned threats and the supporting neural circuitry. Overall, in early life, the threat system is quiescent and learning is biased towards acquiring attachment related behaviors to support attachment to the caregiver and proximity seeking. Caregiver-associated cues learned in infancy have the ability to provide a sense of safety throughout lifetime. This attachment/safety system is activated by learning involving presumably pleasurable stimuli (food, warmth) but also painful stimuli (tailpinch, moderate shock). At about the midway point to independence, pups begin to have access to the adult-like amygdala-dependent threat system and amygdala-dependent responses to natural dangers such as predator odors. However, pups have the ability to switch between the infant and adult-like system, which is controlled by maternal presence and modification of stress hormones. Specifically, if the pup is alone, it will learn fear but if with the mother it will learn attachment (10-15days of age). As pups begin to approach weaning, pups lose access to the attachment system and rely only on the amygdala-dependent threat system. However, pups learning system is complex and exhibits flexibility that enables the mother to override the control of the attachment circuit, since newborn pups may acquire threat responses from the mother expressing fear in their presence. Together, these data suggest that the development of pups' threat learning system is not only dependent upon maturation of the amygdala, but it is also exquisitely

  1. Environmental surveillance at Los Alamos during 1992

    International Nuclear Information System (INIS)

    Kohen, K.; Stoker, A.; Stone, G.

    1994-07-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory during 1992. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring results to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1992 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, laboratory employees, or the environment

  2. Environmental surveillance at Los Alamos during 1991

    International Nuclear Information System (INIS)

    Dewart, J.; Kohen, K.L.

    1993-08-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1991. Routine monitoring for radiation and for radioactive and chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1991 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment

  3. Environmental surveillance at Los Alamos during 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory (LANL or the Laboratory) during 1995. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring result to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1995 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, Laboratory employees, or the environment.

  4. Environmental surveillance at Los Alamos during 1992

    Energy Technology Data Exchange (ETDEWEB)

    Kohen, K.; Stoker, A.; Stone, G. [and others

    1994-07-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory during 1992. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring results to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1992 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, laboratory employees, or the environment.

  5. Environmental surveillance at Los Alamos during 1995

    International Nuclear Information System (INIS)

    1996-10-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory (LANL or the Laboratory) during 1995. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring result to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1995 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, Laboratory employees, or the environment

  6. Environmental surveillance at Los Alamos during 1990

    International Nuclear Information System (INIS)

    1992-03-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1990. Routine monitoring for radiation and radioactive or chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1990 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment

  7. Management information systems for environmental compliance activities

    Energy Technology Data Exchange (ETDEWEB)

    1990-04-23

    The Department of Energy (DOE) is subject to Federal and state laws designed to protect against threats to public health and the environment. The purpose of this audit was to determine whether the Department had developed adequate information systems for tracking and reporting on the status of its compliance with these laws. Systems used for prioritizing and budgeting for environmental activities are being addressed in a separate review.

  8. The threat in Iran and United States of America criminal law

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Mahdavi Sabet

    2017-06-01

    Full Text Available Iran criminal law and United States of America have considered the threat as a crime and have imposed the penalty for it. The threat importance is considered in where that from one side the persons and civilians in accordance with domestic laws and international documents are involved very important right entitled of "Freedom of speech" and the mentioned rights violation is associated with domestic and foreign criminal sanctions and on the other hand, the expression of some words or commit a certain attitude with them and in accordance with the same laws are prohibited and to be considered as the criminal threat. However, the laws of both countries have adopted different approaches regarding the circumstances realization of the mentioned crime and some of its examples, although in some criminal threat characteristics such as lack of necessity to apply the means are unlawful and have similarity in its intentionality. In order to detailed understanding of the similarities and differences of criminal threats in Iran and America laws, which leads to the identification of existing disadvantages and advantages and providing the strategies regarding the deficiencies of the current laws and trends, so we are investigating the structure and threat features in criminal law of both countries.

  9. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  10. The effect of stereotype threat on performance of a rhythmic motor skill.

    Science.gov (United States)

    Huber, Meghan E; Seitchik, Allison E; Brown, Adam J; Sternad, Dagmar; Harkins, Stephen G

    2015-04-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. This study tested the effect of stereotype threat on a rhythmic ball bouncing task, where previous analyses of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. (c) 2015 APA, all rights reserved.

  11. Genetic and environmental influences on height from infancy to early adulthood: An individual-based pooled analysis of 45 twin cohorts.

    Science.gov (United States)

    Jelenkovic, Aline; Sund, Reijo; Hur, Yoon-Mi; Yokoyama, Yoshie; Hjelmborg, Jacob V B; Möller, Sören; Honda, Chika; Magnusson, Patrik K E; Pedersen, Nancy L; Ooki, Syuichi; Aaltonen, Sari; Stazi, Maria A; Fagnani, Corrado; D'Ippolito, Cristina; Freitas, Duarte L; Maia, José Antonio; Ji, Fuling; Ning, Feng; Pang, Zengchang; Rebato, Esther; Busjahn, Andreas; Kandler, Christian; Saudino, Kimberly J; Jang, Kerry L; Cozen, Wendy; Hwang, Amie E; Mack, Thomas M; Gao, Wenjing; Yu, Canqing; Li, Liming; Corley, Robin P; Huibregtse, Brooke M; Derom, Catherine A; Vlietinck, Robert F; Loos, Ruth J F; Heikkilä, Kauko; Wardle, Jane; Llewellyn, Clare H; Fisher, Abigail; McAdams, Tom A; Eley, Thalia C; Gregory, Alice M; He, Mingguang; Ding, Xiaohu; Bjerregaard-Andersen, Morten; Beck-Nielsen, Henning; Sodemann, Morten; Tarnoki, Adam D; Tarnoki, David L; Knafo-Noam, Ariel; Mankuta, David; Abramson, Lior; Burt, S Alexandra; Klump, Kelly L; Silberg, Judy L; Eaves, Lindon J; Maes, Hermine H; Krueger, Robert F; McGue, Matt; Pahlen, Shandell; Gatz, Margaret; Butler, David A; Bartels, Meike; van Beijsterveldt, Toos C E M; Craig, Jeffrey M; Saffery, Richard; Dubois, Lise; Boivin, Michel; Brendgen, Mara; Dionne, Ginette; Vitaro, Frank; Martin, Nicholas G; Medland, Sarah E; Montgomery, Grant W; Swan, Gary E; Krasnow, Ruth; Tynelius, Per; Lichtenstein, Paul; Haworth, Claire M A; Plomin, Robert; Bayasgalan, Gombojav; Narandalai, Danshiitsoodol; Harden, K Paige; Tucker-Drob, Elliot M; Spector, Timothy; Mangino, Massimo; Lachance, Genevieve; Baker, Laura A; Tuvblad, Catherine; Duncan, Glen E; Buchwald, Dedra; Willemsen, Gonneke; Skytthe, Axel; Kyvik, Kirsten O; Christensen, Kaare; Öncel, Sevgi Y; Aliev, Fazil; Rasmussen, Finn; Goldberg, Jack H; Sørensen, Thorkild I A; Boomsma, Dorret I; Kaprio, Jaakko; Silventoinen, Karri

    2016-06-23

    Height variation is known to be determined by both genetic and environmental factors, but a systematic description of how their influences differ by sex, age and global regions is lacking. We conducted an individual-based pooled analysis of 45 twin cohorts from 20 countries, including 180,520 paired measurements at ages 1-19 years. The proportion of height variation explained by shared environmental factors was greatest in early childhood, but these effects remained present until early adulthood. Accordingly, the relative genetic contribution increased with age and was greatest in adolescence (up to 0.83 in boys and 0.76 in girls). Comparing geographic-cultural regions (Europe, North-America and Australia, and East-Asia), genetic variance was greatest in North-America and Australia and lowest in East-Asia, but the relative proportion of genetic variation was roughly similar across these regions. Our findings provide further insights into height variation during childhood and adolescence in populations representing different ethnicities and exposed to different environments.

  12. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  13. Early Warnings of Cyber Threats in Online Discussions

    OpenAIRE

    Sapienza, Anna; Bessi, Alessandro; Damodaran, Saranya; Shakarian, Paulo; Lerman, Kristina; Ferrara, Emilio

    2018-01-01

    We introduce a system for automatically generating warnings of imminent or current cyber-threats. Our system leverages the communication of malicious actors on the darkweb, as well as activity of cyber security experts on social media platforms like Twitter. In a time period between September, 2016 and January, 2017, our method generated 661 alerts of which about 84% were relevant to current or imminent cyber-threats. In the paper, we first illustrate the rationale and workflow of our system,...

  14. Prejudice towards Muslims in The Netherlands : Testing integrated threat theory

    NARCIS (Netherlands)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-01-01

    This study uses integrated threat theory to examine Dutch adolescents’ (N ¼ 1; 187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators

  15. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  16. The Millennial generation as an insider threat: high risk or overhyped?

    OpenAIRE

    Fisher, David J.

    2015-01-01

    Approved for public release; distribution is unlimited Cyber security experts agree that insider threats are and will continue to be a threat to every organization. These threats come from trusted co-workers who, for one reason or another, betray their organizations and steal data, disrupt information systems, or corrupt the data. Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits ...

  17. Environmental education and indigenous approach

    International Nuclear Information System (INIS)

    Babar, S.M.; Hussain, M.; Mahmood, T.

    2005-01-01

    Environmental pollution control is the most important and highly discussed issue at the international level. Our and our's next generation survival highly depends on environment. Environmental security is not less important than territorial security. Living in the Competitive trade, Business and Commerce era. WTO threats of globalization to countries like Pakistan require sharp and immediate actions. SOS(Save our Sole) steps should be taken in Environmental Education in order to reorganizing values and clarifying Concepts to develop the necessary skills and attitude necessary to understand and appreciate the interrelatidness among masses, the Cultures and Ecosystem. Historical backgrounds along with different approaches were discussed particularly reference to Pakistan. In this presentation a new but indigenous idea is flashed to improve the environment education system in poor third world countries including Pakistan. Instead of imported ideas, previous implemented as such, indigenous approach highly Perfumed with Islamic, Ideological and cultural blends will do the right job in right direction if employed with true sense of commitment. (author)

  18. Analyzing Cyber-Physical Threats on Robotic Platforms †

    Science.gov (United States)

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  19. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  20. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  1. Uranium Mill Tailings Remedial Action Project Environmental Protection Implementation Plan

    International Nuclear Information System (INIS)

    Vollmer, A.T.

    1993-10-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project Environmental Protection Implementation Plan (EPIP) has been prepared in accordance with the requirements of the US Department of Energy (DOE) Order 5400.1. The UMTRA EPIP covers the time period of November 9, 1993, through November 8, 1994. It will be updated annually. Its purpose is to provide management direction to ensure that the UMTRA Project is operated and managed in a manner that will protect, maintain, and where necessary, restore environmental quality, minimize potential threats to public health and the environment, and comply with environmental regulations and DOE policies. Contents of this report are: (1) general description of the UMTRA project environmental protection program; (2) notifications; (3) planning and reporting; (4) special programs; (5) environmental monitoring programs; (6) quality assurance and data verification; and (7) references

  2. Uranium Mill Tailings Remedial Action Project Environmental Protection Implementation Plan

    Energy Technology Data Exchange (ETDEWEB)

    Vollmer, A.T.

    1993-10-01

    The Uranium Mill Tailings Remedial Action (UMTRA) Project Environmental Protection Implementation Plan (EPIP) has been prepared in accordance with the requirements of the US Department of Energy (DOE) Order 5400.1. The UMTRA EPIP covers the time period of November 9, 1993, through November 8, 1994. It will be updated annually. Its purpose is to provide management direction to ensure that the UMTRA Project is operated and managed in a manner that will protect, maintain, and where necessary, restore environmental quality, minimize potential threats to public health and the environment, and comply with environmental regulations and DOE policies. Contents of this report are: (1) general description of the UMTRA project environmental protection program; (2) notifications; (3) planning and reporting; (4) special programs; (5) environmental monitoring programs; (6) quality assurance and data verification; and (7) references.

  3. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study.

    Science.gov (United States)

    Abdou, Cleopatra M; Fingerhut, Adam W; Jackson, James S; Wheaton, Felicia

    2016-02-01

    Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. Copyright © 2016. Published by Elsevier Inc.

  4. Friendship Characteristics, Threat Appraisals, and Varieties of Jealousy About Romantic Partners’ Friendships

    Directory of Open Access Journals (Sweden)

    Timothy R. Worley

    2014-12-01

    Full Text Available This study examined the role of friendship sex composition, friendship history, and threat appraisals in the experience of jealousy about a romantic partner’s involvement in extradyadic friendships. Using a survey, 201 individuals responded to scenarios describing a romantic partner’s involvement in a significant friendship outside the romantic dyad. A partner’s involvement in a cross-sex friendship was associated with greater perceptions of threat to both the existence and quality of the romantic relationship than was a partner’s involvement in a same-sex friendship. Further, the specific forms of jealousy experienced about partners’ friendships were dependent on the threat appraisals individuals associated with the friendships. Appraisals of relational existence threat mediated the influence of friendship characteristics (i.e., sex composition and history on sexual jealousy and companionship jealousy, while appraisals of relational quality threat mediated the influence of friendship characteristics on intimacy jealousy, power jealousy, and companionship jealousy. This study points toward the central role of threat appraisals in mediating associations between rival characteristics and various forms of jealousy about a partner’s friendships.

  5. Actionable knowledge and strategic decision making for bio- and agroterrorism threats: building a collaborative early warning culture.

    Science.gov (United States)

    Mårtensson, Per-Åke; Hedström, Lars; Sundelius, Bengt; Skiby, Jeffrey E; Elbers, Armin; Knutsson, Rickard

    2013-09-01

    Current trends in biosecurity and cybersecurity include (1) the wide availability of technology and specialized knowledge that previously were available only to governments; (2) the global economic recession, which may increase the spread of radical non-state actors; and (3) recent US and EU commission reports that reflect concerns about non-state actors in asymmetric threats. The intersectoral and international nature of bioterrorism and agroterrorism threats requires collaboration across several sectors including intelligence, police, forensics, customs, and other law enforcement organizations who must work together with public and animal health organizations as well as environmental and social science organizations. This requires coordinated decision making among these organizations, based on actionable knowledge and information sharing. The risk of not sharing information among organizations compared to the benefit of sharing information can be considered in an "information sharing risk-benefit analysis" to prevent a terrorism incident from occurring and to build a rapid response capability. In the EU project AniBioThreat, early warning is the main topic in work package 3 (WP 3). A strategy has been generated based on an iterative approach to bring law enforcement agencies and human and animal health institutes together. Workshops and exercises have taken place during the first half of the project, and spin-off activities include new preparedness plans for institutes and the formation of a legal adviser network for decision making. In addition, a seminar on actionable knowledge was held in Stockholm, Sweden, in 2012, which identified the need to bring various agency cultures together to work on developing a resilient capability to identify early signs of bio- and agroterrorism threats. The seminar concluded that there are a number of challenges in building a collaborative culture, including developing an education program that supports collaboration and shared

  6. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  7. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  8. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  9. The Threat Effect of Active Labor Market Programs: A Systematic Review

    DEFF Research Database (Denmark)

    Filges, Trine; Hansen, Anne Toft

    2017-01-01

    This paper is a systematic review of the threat effect of active labor market programs for unemployed individuals. The threat effect is the induced change in the hazard rate of leaving unemployment prior to program participation. Studies included in the review all estimated a threat effect...... a hazard rate of 1.27 for the pooled estimate. It has thus been concluded that active labor market programs constitute a significant threat effect......., with the participants in all cases being unemployed individuals in receipt of benefit of some kind during their tenure of unemployment. Seven of these studies have been included in a meta-analysis: The meta-analysis, which has been carried out using a random effects model to account for heterogeneity, indicated...

  10. Evolution of the perception of the threats to security in Spain

    Directory of Open Access Journals (Sweden)

    Rafael Grasa

    1993-07-01

    Full Text Available security was internal, in other words, subversion and opposition to the regime. Public opinion, however, revealed that characteristics very different to those in the context of the western block existed, such as a void perception of the soviet threat as opposed to a marked antiamericanism for its support of the regime.This legacy of threats weighed heavily during the transition together with the existence of a cleavage between the armed forces, the political actors and public opinion regarding the real necessity of intergration into NATO. In the eighties there exists a clear differentiation between the threats perceived by public opinion and those considered by the political elites. With regard to the former,serious threats to Spain do not exist. only certain concerns when the subject of security took on importance in the field of public opinion, such as during the referendum campaign over NATO in 1986 which was mixed with the scarce perception of the soviet threat, theconstant danger represented by the United States and the slight rise in those who believed in the Moroccan threat, and the impact of the Gulf War in 1991 and the consequent increase of the threat represented by the arab countries. For the political actors, the mainthreat contemplated was the protection of territorial integrity on a stage closer to the western Mediterranean instead of a global threat to the western block something only considered at a theoretical level with the strategic concept of Spanish defence within the framework of participation in NATO.From 1992 onwards with the Defence Directive, the threat concept is replaced by that of risk and which recovers the importance given over to North Africa. It is argued in the belief that security is indivisible and must be shared not only with the European members. A greater convergence is also initiated in the nineties between the political actors and public opinion with respect to considering what are the risks in a global

  11. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  12. Developing and Validating a Santa Ana Wildfire Threat Index

    Science.gov (United States)

    Capps, S. B.; Rolinski, T.; DAgostino, B.; Vanderburg, S.; Fovell, R. G.; Cao, Y.

    2014-12-01

    Santa Ana winds, common to southern California during the fall through spring, are a type of katabatic wind that originates from a direction generally ranging from 360°/0° to 100° and is usually accompanied by very low humidity. Since fuel conditions tend to be driest from late September through the middle of November, Santa Ana winds occurring during this period have the greatest potential to produce large, devastating fires when an ignition occurs. Such catastrophic fires occurred in 1993, 2003, 2007, and 2008. Because of the destructive nature of these fires, there has been a growing desire to categorize Santa Ana wind events in much the same way that tropical cyclones have been categorized. The Santa Ana Wildfire Threat index (SAWT) is an attempt to categorize such events with respect to fire activity, based on surface wind velocity, dew point depression, and forecasted fuel conditions. The index, a USDA Forest Service product, was developed by the Forest Service in collaboration with San Diego Gas and Electric Utility (SDG&E), the Department of Atmospheric and Oceanic Sciences at UCLA, The Desert Research Institute (DRI), and Vertum Partners. The methodology behind the SAWT index, along with the index itself will be presented in detail. Also, there will be a discussion on the construction of a 30-year climatology of the index, which includes various meteorological and fuel parameters. We will demonstrate the usefulness of the index as another decision support tool for fire agencies and first responders, and how it could assist the general public and private industry in the preparation of critical Santa Ana wind events.

  13. Assessment of wind erosion threat for soils in cadastral area of Hajske

    International Nuclear Information System (INIS)

    Muchova, Z.; Stredanska, A.

    2008-01-01

    This contribution illustrates the application of methods of erosion threat assessment in lan adaptation projects. Calculations of the soil erosion index of particular soil blocks are demonstrated for the cadastral area of Hajske. Two methods for assessment of erosion threat have been applied. First the assessment based on the ecological soil-quality units (ESQU) has been performed. Next, the Pasak method for a detailed analysis of the soil erosion threat was applied. Both of the mentioned approaches are recommended for the land adaption projects. Based on the results, the soil blocks have been ranked by their soil erosion threat. (authors)

  14. BUILDING UP STATE STRATEGIC RESISTANCE AGAINST HYBRID THREATS

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2017-11-01

    Full Text Available Hybrid warfare, conducted in Ukraine since 2014, has become a new geopolitical phenomenon which threatens the Euro-Atlantic security that appeared after the collapse of the bipolar world. The paper discusses how the Russian Federation takes advantage of hybrid warfare to achieve its political objectives and to further its own interests. The paper also contains an assessment of the threat of hybrid warfare in Poland and determines what undertakings are necessary to effectively counter threats coming from Russia.

  15. Policing cyber hate, cyber threat and cyber terrorism

    OpenAIRE

    Chambers-Jones, C.

    2013-01-01

    In late August 2012 the Government Forum of Incident Response and Cyber security Teams (GFIRST) gathered in Atlanta to discuss cyber threats and how new realities are emerging and how new forms of regulation are needed. At the same time Policing cyber hate, cyber threat and cyber terrorism was published. This comprehensive book brings together a divergent problem and tackles each with a candid exploration. The book has ten chapters and covers aspects such as extortion via the internet, the ps...

  16. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2008

    Energy Technology Data Exchange (ETDEWEB)

    West Valley Environmental Services LLC (WVES) and URS - Washington Division

    2009-09-24

    Annual Site Environmental Report for the West Valley Demonstration Project (WVDP) for Calendar Year 2008. The report summarizes the calendar year (CY) 2008 environmental monitoring program data at the WVDP so as to describe the performance of the WVDP’s environmental management system (EMS), confirm compliance with standards and regulations, and highlight important programs. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of the environment, continual improvement, prevention and/or minimization of pollution, public outreach, and stakeholder involvement. In addition to demonstrating compliance with environmental regulations and directives, evaluation of data collected in 2008 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  17. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2008

    International Nuclear Information System (INIS)

    2009-01-01

    Annual Site Environmental Report for the West Valley Demonstration Project (WVDP) for Calendar Year 2008. The report summarizes the calendar year (CY) 2008 environmental monitoring program data at the WVDP so as to describe the performance of the WVDP's environmental management system (EMS), confirm compliance with standards and regulations, and highlight important programs. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of the environment, continual improvement, prevention and/or minimization of pollution, public outreach, and stakeholder involvement. In addition to demonstrating compliance with environmental regulations and directives, evaluation of data collected in 2008 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  18. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  19. Land subsidence threats and its management in the North Coast of Java

    Science.gov (United States)

    Sarah, D.; Soebowo, E.

    2018-02-01

    Cities on the north coast of Java such as Jakarta, Semarang, Pekalongan, and Surabaya are vulnerable to environmental pressures such as sea level change and land subsidence. Land subsidence can be caused by natural and anthropogenic processes. Geologically, the north coastal plain of Java consists of unconsolidated Holocene alluvial deposit. The recent alluvial deposit is prone to compaction, and further aggravated by anthropogenic forces such as groundwater extraction and land development. Understanding the complex interaction of natural and manmade factors is essential to establish mitigation strategy. Although the impacts of land subsidence are widely felt, many do not realize that land subsidence is taking place. This paper presents a brief review of the land subsidence threats in the North coast of Java and proposes a recommendation for suitable management response.

  20. Environmentally conscious patent histories

    Science.gov (United States)

    Crouch, Dennis D.; Crouch, Henry L.

    2004-02-01

    There is a need for investigators, legislators, and business leaders to understand the magnitude of innovation and discovery in the field of environmentally conscious technologies (ECTs). Knowledge of the "big picture" is important to providing a national and global account of actual environmental stewardship over the last twenty-five years. A recitation of the Environmental Protection Agency (EPA) supported Acts which have been enacted into law reveals one facet of the multifaceted dynamic of environmental consciousness. The popular discussion and debate, as well as partisan lobbying, which created the political forces leading to environmentally conscious legislation is another facet. A third facet is the corporate response to the threats and opportunities predicted by CEO"s and others through environmental scanning. This paper examines changes in environmentally conscious inventive effort by comparing data from United States Patents issued from 1976 through 2003. Patents are useful tool for measuring technological innovation because they are publicly available records of innovative activity. Although not all inventions result in patent applications, the monopoly rights granted on the invention give the inventor a strong incentive to obtain patents on any viable product or process. Among the results, we found a significant increase in patents relating to environmentally conscious products and processes during the period in question. Specifically, a dramatic increase in patent activity was seen for the decade of the 1990"s. Surprisingly, the patenting rate from 2000 to 2003 seems to have stabilized. Additionally public discussion of ECTs appears to have a positive impact on patent filings.