WorldWideScience

Sample records for handling student threats

  1. Illegal handling of radioactive and nuclear materials. Threats and suggestions for measures

    International Nuclear Information System (INIS)

    Oliver, Lena; Melin, Lena; Prawitz, Jan; Ringbom, Anders; Sandstroem, Bjoern; Wigg, Lars; Wirstam, Jens

    2004-01-01

    This project deals with threats from smuggling or other illegal transportation of radioactive or nuclear materials across the borders to Sweden, and with the security of handling such materials in Sweden. The project has included studies of relevant documentation; visits and interviews at industries, hospitals, research institutes and military institutions in Sweden that handle radioactive materials; a pilot study at the Stockholm freeport, where equipment for detection of radioactive materials has been tested for six months; an analysis of incidents reported to the IAEA database; and an analysis of Swedish incidents. The following conclusions are drawn: Stricter rules regarding the physical protection of radiation sources and radioactive materials should be implemented in Sweden. The recommendations recently issued by IAEA should serve as a point of departure for working out such rules

  2. Prejudice against international students: the role of threat perceptions and authoritarian dispositions in U.S. students.

    Science.gov (United States)

    Charles-Toussaint, Gifflene C; Crowson, H Michael

    2010-01-01

    International students provide a variety of benefits to higher education institutions within the United States (J. J. Lee, 2007; J. J. Lee & C. Rice, 2007). Despite these benefits, many international students experience prejudice and discrimination by American students. The purpose of the present study was to examine several potential predictors of prejudice against international students: perceptions of international students as symbolic and realistic threats, right-wing authoritarianism, and social dominance orientation. A simultaneous regression analysis that the authors based on 188 students at a Southwestern university revealed that perceptions of symbolic and realistic threats and social dominance orientation were each positive and significant predictors of prejudice. Mediation analyses suggested that the effects of right-wing authoritarianism on prejudice is fully mediated through perceived symbolic threat and partially mediated by realistic threat.

  3. Students as Threats: Schooling inside a Youth Prison

    Science.gov (United States)

    Vélez Young-Alfaro, Morghan

    2017-01-01

    This ethnography explores incarcerated students' experiences and dynamics of identity formation inside a youth prison school. Across two years, 100 students and 50 adults were engaged. The structure, discourse, and adult-student interactions revealed a fixation on framing students as threats with a racialized undertone while also exposing the…

  4. Development and evaluation of online video teaching resources to enhance student knowledge of livestock handling.

    Science.gov (United States)

    Klupiec, C; Pope, S; Taylor, R; Carroll, D; Ward, M H; Celi, P

    2014-07-01

    To evaluate the effectiveness of online audiovisual materials to support the acquisition of animal handling skills by students of veterinary and animal science. A series of video clips (Livestock Handling modules) demonstrating livestock handling procedures was created and delivered online to students enrolled in the Faculty of Veterinary Science, University of Sydney. The effectiveness of these modules for supporting student learning was evaluated via an online survey. The survey also sought feedback on how students could be better prepared for handling livestock. The survey indicated that students found the videos a useful part of their learning experience, particularly by familiarising them with correct handling procedures and emphasising the importance of safety when handling livestock. Students also highlighted that online delivery supported flexible learning. Suggested improvements of the Livestock Handling modules centred around broadening the content of the videos and improving the user-friendliness of online access. Student feedback regarding how the Faculty could better prepare them for livestock handling was dominated by requests for more opportunities to practise animal handling using live animals. The Livestock Handling audiovisual tool is a valuable supplementary resource for developing students' proficiency in safe and effective handling of livestock. However, the results also clearly reveal a perception by students that more hands-on experience is required for acquisition of animal handling skills. These findings will inform future development of the Faculty's animal handling program. © 2014 Australian Veterinary Association.

  5. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  6. An exploration of undergraduate nursing and physiotherapy students' views regarding education for patient handling.

    Science.gov (United States)

    Kneafsey, Rosie; Ramsay, Jill; Edwards, Helen; Callaghan, Helen

    2012-12-01

    To ascertain the views of undergraduate student nurses and physiotherapists regarding their education in patient handling. Musculo-skeletal injuries are an important cause of staff sickness absence and attrition from the nursing profession and are a recognised problem within the physiotherapy profession. Nurses and physiotherapists are at risk of musculo-skeletal injuries as a result of their role in assisting patients with movement. A questionnaire survey was undertaken of undergraduate nursing and physiotherapy students (n = 371) at one university. Most students agreed that university teaching about moving and handling prepared them for clinical practice (64%). Over a third reported that they had never undertaken a written moving and handling risk assessment in clinical practice (38%). Almost half of the sample (40%) admitted undertaking unsafe moving and handling activities. Half (50%) also stated that they would rather 'fit' into the team than challenge unsafe practice. Almost a third (29%) stated that they had begun to experience pain since becoming a student. There were significant differences between nursing and physiotherapy students. Physiotherapy students were more likely to report being supervised when moving and handling and reported being more assertive about adhering to safe practice. The well-being of both nursing and physiotherapy undergraduate students is threatened when students undertake work placements in clinical settings. University-based education in safe patient handling, though important, can be undermined by workplace settings where unsafe practices occur. Collaboration is needed between university educators, managers and practice-based mentors to support students to maintain safe approaches to moving and handling patients. A third of students reported developing pain since becoming a healthcare student. Students entering their professions already injured may leave the workforce owing to poor physical well-being. It is vital that the

  7. Stereotype Threat: A Qualitative Study of the Challenges Facing Female Undergraduate Engineering Students

    Science.gov (United States)

    Entsminger, J. R., II

    From a sociocultural point of view, this qualitative case study explored how upper-level, female undergraduate engineering students perceived the possibility of or experience with stereotype threat as shaping their experiences. The study also investigated how these students explained their reasons for choosing their engineering major, the challenges they encountered in the major, and their reasons for persevering in spite of those challenges. Using Steele and Aronson's (1995) stereotype threat theory as a framework, and considering the documented underrepresentation of females in engineering, the study sought to examine how stereotype threat shaped the experiences of these students and if stereotype threat could be considered a valid reason for the underrepresentation. The study was conducted at a large, four-year public university. First, students in the College of Engineering and Engineering Technology completed the Participant Screening Survey. Based on responses from the survey, six female engineering students from the college were identified and invited to participate in the study. The participants came from the following majors: Electrical Engineering, Industrial and Systems Engineering, and Mechanical Engineering. After receiving the study consent letter and agreeing to participate, the students were involved in a 90-minute focus group meeting, a 45-minute one-on-one interview, and a 30-minute follow-up interview. After conducting the data collection methods, the data were then transcribed, analyzed, and coded for theme development. The themes that emerged coincided with each research question. The themes highlighted the complex interactions and experiences shared by the female engineering majors. The female students were enveloped in an environment where there existed an increased risk for activating stereotype threat. In addition, the female students described feeling pushed to prove to themselves and to others that the negative stereotype that 'females

  8. Mass Media Use by College Students during Hurricane Threat

    Science.gov (United States)

    Piotrowski, Chris

    2015-01-01

    There is a dearth of studies on how college students prepare for the threat of natural disasters. This study surveyed college students' preferences in mass media use prior to an approaching hurricane. The convenience sample (n = 76) were from a university located in the hurricane-prone area of the central Gulf of Mexico coast. Interestingly,…

  9. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    Science.gov (United States)

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  10. The Threat of Living up to Expectations: Analyzing the Performance of Hispanic Students on Standardized Exams

    Science.gov (United States)

    Rodríguez, Bryan A.

    2014-01-01

    The present study examines whether the recognition of stereotypes undermines the academic performance of Hispanic students, a phenomenon known as "stereotype threat." With regard to race, stereotype threat has been examined predominately between African American and White students, yet limited research has investigated how Hispanic…

  11. Influence of Conflict Resolution Training on Conflict Handling Styles of College Students

    Science.gov (United States)

    Waithaka, Abel Gitimu; Moore-Austin, Shante'; Gitimu, Priscilla N.

    2015-01-01

    The purpose of this study was to investigate the influence of conflict resolution skills training on conflict handling styles, and conflict orientation of college students. Conflict handling styles was measured by the Thomas-Kilmann MODE instrument, while Conflict orientation was measured by conflict orientation survey instrument. A sample of 135…

  12. Predictors of Collegiate Student-Athletes' Susceptibility to Stereotype Threat

    Science.gov (United States)

    Feltz, Deborah L.; Schneider, Richard; Hwang, Seunghyun; Skogsberg, Nikolaus J.

    2013-01-01

    The present investigation sought to determine the extent to which collegiate student-athletes are susceptible to stereotype threat and the factors that predict it. We proposed a structural equation model (SEM) by which a perceived coach's positive regard for an athlete's academic ability, athletic identity, and academic identity predicts the…

  13. Minority, Student, and Athlete: Multiracial Division I College Athletes' Stereotype Threat Experiences

    Science.gov (United States)

    Brutus, Angel L.

    2016-01-01

    The purpose of this qualitative transcendental phenomenological study was to understand the meanings ascribed by multiracial male and female NCAA Division I student athletes in the Southeast region of the United States to the lived experiences of stereotype threat. Stereotype threat is a phenomenon that is boundless and can influence any…

  14. Avoidance temperament and social-evaluative threat in college students' math performance: a mediation model of math and test anxiety.

    Science.gov (United States)

    Liew, Jeffrey; Lench, Heather C; Kao, Grace; Yeh, Yu-Chen; Kwok, Oi-man

    2014-01-01

    Standardized testing has become a common form of student evaluation with high stakes, and limited research exists on understanding the roles of students' personality traits and social-evaluative threat on their academic performance. This study examined the roles of avoidance temperament (i.e., fear and behavioral inhibition) and evaluative threat (i.e., fear of failure and being viewed as unintelligent) in standardized math test and course grades in college students. Undergraduate students (N=184) from a large public university were assessed on temperamental fear and behavioral inhibition. They were then given 15 minutes to complete a standardized math test. After the test, students provided data on evaluative threat and their math performance (scores on standardized college entrance exam and average grades in college math courses). Results indicate that avoidance temperament was linked to social-evaluative threat and low standardized math test scores. Furthermore, evaluative threat mediated the influence of avoidance temperament on both types of math performance. Results have educational and clinical implications, particularly for students at risk for test anxiety and underperformance. Interventions targeting emotion regulation and stress management skills may help individuals reduce their math and test anxieties.

  15. Observation of High School Students' Food Handling Behaviors: Do They Improve following a Food Safety Education Intervention?

    Science.gov (United States)

    Diplock, Kenneth J; Dubin, Joel A; Leatherdale, Scott T; Hammond, David; Jones-Bitton, Andria; Majowicz, Shannon E

    2018-06-01

    Youth are a key audience for food safety education. They often engage in risky food handling behaviors, prepare food for others, and have limited experience and knowledge of safe food handling practices. Our goal was to investigate the effectiveness of an existing food handler training program for improving safe food handling behaviors among high school students in Ontario, Canada. However, because no schools agreed to provide control groups, we evaluated whether behaviors changed following delivery of the intervention program and whether changes were sustained over the school term. We measured 32 food safety behaviors, before the intervention and at 2-week and 3-month follow-up evaluations by in-person observations of students ( n = 119) enrolled in grade 10 and 12 Food and Nutrition classes ( n = 8) and who individually prepared recipes. We examined within-student changes in behaviors across the three time points, using mixed effects regression models to model trends in the total food handling score (of a possible 32 behaviors) and subscores for "clean" (17 behaviors), "separate" (14 behaviors), and "cook" (1 behavior), adjusting for student characteristics. At baseline, students ( n = 108) averaged 49.1% (15.7 of 32 behaviors; standard deviation = 5.8) correct food handling behaviors, and only 5.5% (6) of the 108 students used a food thermometer to check the doneness of the chicken (the "cook" behavior). All four behavior score types increased significantly ∼2 weeks postintervention and remained unchanged ∼3 months later. Student characteristics (e.g., having taken a prior food handling course) were not significant predictors of the total number of correctly performed food handling behaviors or of the "clean" or "separate" behaviors, working or volunteering in a food service establishment was the only characteristic significantly associated with food thermometer use (i.e., "cook"). Despite the significant increase in correct behaviors, students continued to

  16. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  17. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  18. The Legal Side of Campus Threat Assessment and Management: What Student Counselors Need to Know

    Science.gov (United States)

    Nolan, Jeffrey J.; Moncure, Thomas M., Jr.

    2012-01-01

    This article identifies what student mental health professionals need to know about legal issues of relevance to threat assessment and management. The article summarizes the common law duties and the common law and statutory standards of care that are likely to apply to the work of college and university threat assessment and management teams. The…

  19. An analysis of stereotype threat in African American engineering students at predominantly White, ethnically diverse, and historically Black colleges and universities

    Science.gov (United States)

    Sparks, David M.

    The purpose of this research was to distinguish the similarities and differences in coping strategies of African American engineering students by analyzing their perceptions of stereotype threat at three academic institution types, Predominantly White Institutions (PWI), ethnically diverse, and Historically Black Colleges and Universities (HBCUs). The researcher collected demographic and survey data using the Stereotype Vulnerability Scale (SVS). The study was offered to the entire population of African American engineering students at each college using an online survey. Results were analyzed using MANOVA and Pearson's correlational statistical analyses to test the hypotheses. Findings revealed that little differences exist between students' scores on an assessment of stereotype vulnerability, with a few areas showing that HBCUs and ethnically diverse universities are doing a similar job in addressing perceptions of their African American engineering students. Finding also revealed that the percentage of African American students at a university did not correlate with the scores on the SVS accept on questions related to the personal feelings students have about their race. The strongest findings related to the differences in male and female students across the universities. African American female engineering students appeared to perceive more stereotype threat than did their male counterparts; although, this fining was not statistically significant. Overall, no statistically significant differences were found between students' perceptions of stereotype threat at the three types of universities. Future research should expand the number of survey participants at the current universities, add more HBCUs to the study population, run similar experiments in different parts of the country, compare stereotype threat in private and elite universities, use ethnically diverse universities as models for minority student development, and use new or improved survey instruments

  20. Iterative student-based testing of automated information-handling exercises

    Directory of Open Access Journals (Sweden)

    C. K. Ramaiah

    1995-12-01

    Full Text Available Much laboratory teaching of information-handling involves students in evaluating information provided either online or via a computer package. A lecturer can help students carry out these tasks in a variety of ways. In particular, it is customary to provide students with hand-outs, and there is good evidence that such hand-outs are a valuable resource, especially for lower-ability students (see, for example Saloman, 1979. In many of these exercises, students are passive receivers of information, in the sense that they assess the information but do not change it. However, it is sometimes possible to use student feedback to change the original input. In this case, the users' mental models of the system can be employed to modify the user-interface set up by the original designer (see Moran, 1981. A number of experiments have been carried out in the Department of Information and Library Studies at Loughborough University to examine how computer interfaces and instruction sheets used in teaching can be improved by student feedback. The present paper discusses examples of this work to help suggest both the factors to be taken into account and the sorts of changes involved. Our approach has been based on the concept of 'iterative usability testing', the value of which has recently been emphasized by Shneiderman (1993.

  1. Stereotype Threat in U.S. Students Abroad: Negotiating American Identity in the Age of Trump

    Science.gov (United States)

    Goldstein, Susan B.

    2017-01-01

    An underinvestigated and significant source of stress for U.S. student sojourners across racial/ethnic groups is exposure to stereotypes that target their American identity. This study built on the extensive research literature on stereotype threat to investigate U.S. students' vulnerability and reactions to being the target of stereotypes.…

  2. Identify and analyze the opportunities and threats of social networks for shahid Beheshti University students

    Directory of Open Access Journals (Sweden)

    R. Tavalaee

    2017-09-01

    Full Text Available Due to the growth of information and communication technology in societies Especially among students, the use of these technologies has become as part of regular working people. Social networks as one of the most important and widely in cyberspace which is Used by many people in various fields. application of social network by students as young and educated population is important.In this regard, this study aimed to investigate and identify the opportunities and threats for shahid Beheshti University students in social network. This study aims to develop a practical and descriptive methodology. Information obtained from the questionnaires using SPSS statistical analysis software in two parts: descriptive and inferential statistics were analyzed.The results indicate that five variables related to social networking opportunities, including e-learning, leisure, organized social groups, the possibility of dialogue and culture, as well as five variables related to social networking threats, including transfer value unethical, abusive, spreading false information, internet & Communications destructive addiction, has a significant positive effect on students.

  3. Strengths weaknesses opportunities and threats of blended learning: students' perceptions.

    Science.gov (United States)

    Hande, S

    2014-05-01

    Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students' perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach.

  4. Stereotype Threat? Male and Female Students in Advanced High School Courses

    Science.gov (United States)

    Corra, Mamadi

    Propositions of stereotype threat theory imply that the social consequences of academic distinction in advanced quantitative areas (such as math and the physical sciences) for women may promote the under representation of female students in advanced quantitative academic courses. The hypothesis that female students will be underrepresented in advanced quantitative (honors and advanced placement math and physical science) courses is tested using academic performance and enrollment data for high school students in a "Student/Parent Informed Choice" (open registration) school district in North Carolina. Results show female students to be overrepresented in both advanced verbal/writing intensive (honors and advanced placement English, foreign language, and social science) and advanced quantitative (honors and advanced placement math and physical science) courses compared to their proportion of the student body. More surprisingly, results also indicate female students (compared to male students) to be overrepresented in advanced courses compared to their proportion of high-performing students. Furthermore, as with patterns observed at the district level, additional analysis of enrollment data for the entire state reveals similar results. Taken together, the findings call into question the prevailing presumption that female students continue to be underrepresented in math and physical science courses. Instead, the changing social context within which females and males experience schooling may provide an explanation for the findings.

  5. Comparison of Efficacy and Threat Perception Processes in Predicting Smoking among University Students Based on Extended Parallel Process Model

    Directory of Open Access Journals (Sweden)

    S. Bashirian

    2014-04-01

    Full Text Available Introduction & Objective: The survey of smoking as the most toxic, common and cheapest ad-diction, and its psychological and demographic variables especially among the youth who are efficient and constructive individuals of the society is of great importance. This study was performed to compare efficacy and threat perception in predicting cigarette smoking among university students based on Expended Parallel Process Model (EPPM. Material & Methods: This cross sectional descriptive study was carried out on 700 college stu-dents of Hamadan recruited with a stratified sampling method. The participants completed a self-administered questionnaire including demographic characteristics, smoking status and EPPM Data analysis was done with the SPSS software (version 16, using t-test, one way ANOVA, Pierson correlation and logistic regression methods. Results: The average scores of threat and efficacy perception were 39.7 and 38.6, respectively. The prevalence of cigarette smoking among participants was 27.1 percent. Also, there were significant differences between the average score of efficacy perception and age, gender, his-tory of drug abuse and dwelling of students (P<0.05. Efficacy and threat perception both predicted student cigarette smoking. Conclusions: Cognitive mediating process of threat perception was a more powerful predictor of cigarette smoking as an unsafe behavior. Therefore, increasing self efficacy and response efficacy of university students aimed at facilitating the acceptance of safe behavior could be note-worthy as a principle in education. (Sci J Hamadan Univ Med Sci 2014; 21 (1:58-65

  6. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  7. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  8. Evaluation of Four Bedside Test Systems for Card Performance, Handling and Safety.

    Science.gov (United States)

    Giebel, Felix; Picker, Susanne M; Gathof, Birgit S

    2008-01-01

    SUMMARY: OBJECTIVE: Pretransfusion ABO compatibility testing is a simple and required precaution against ABO-incompatible transfusion, which is one of the greatest threats in transfusion medicine. While distinct agglutination is most important for correct test interpretation, protection against infectious diseases and ease of handling are crucial for accurate test performance. Therefore, the aim of this study was to evaluate differences in test card design, handling, and user safety. DESIGN: Four different bedside test cards with pre-applied antibodies were evaluated by 100 medical students using packed red blood cells of different ABO blood groups. Criteria of evaluation were: agglutination, labelling, handling, and safety regarding possible user injuries. Criteria were rated subjectively according to German school notes ranging from 1 = very good to 6 = very bad/insufficient. RESULTS: Overall, all cards received very good/good marks. The ABO blood group was identified correctly in all cases. Three cards (no. 1, no. 3, no. 4) received statistically significant (p labelling (1.5 vs. 2.2-2.4), handling (1.9-2.0 vs. 2.5), and user safety (2.5 vs. 3.4). Analysis of card self-explanation revealed no remarkable differences. CONCLUSION: Despite good performance of all card systems tested, the best results when including all criteria evaluated were obtained with card no. 4 (particularly concerning clear agglutination), followed by cards no. 2, no. 1, and no. 3.

  9. Threat Assessment Teams: A Model for Coordinating the Institutional Response and Reducing Legal Liability when College Students Threaten Suicide

    Science.gov (United States)

    Penven, James C.; Janosik, Steven M.

    2012-01-01

    Increasing numbers of college students with mental health issues are enrolling in college. If these students threaten suicide they present serious legal issues for college officials. Lack of communication and coordination of a response to these students exacerbates the issue. Threat assessment teams can serve as mechanisms to coordinate the…

  10. 340 waste handling facility interim safety basis

    Energy Technology Data Exchange (ETDEWEB)

    VAIL, T.S.

    1999-04-01

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

  11. 340 waste handling facility interim safety basis

    International Nuclear Information System (INIS)

    VAIL, T.S.

    1999-01-01

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people

  12. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  13. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  14. Negating Stereotype Threat: Autonomy Support and Academic Identification Boost Performance of African American College Students

    Science.gov (United States)

    Nadler, Dustin R.; Komarraju, Meera

    2016-01-01

    Using a 2 × 2 factorial design, we examined the effects of stereotype threat and autonomy support on the test performance of 190 African American college students. Participants completed a set of 7 easy and 7 difficult problems from Raven's Progressive Matrices and a survey including measures of Academic Self-Concept, Learning Climate, and…

  15. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  16. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  17. Materials Handling. Module SH-01. Safety and Health.

    Science.gov (United States)

    Center for Occupational Research and Development, Inc., Waco, TX.

    This student module on materials handling is one of 50 modules concerned with job safety and health. It presents the procedures for safe materials handling. Discussed are manual handling methods (lifting and carrying by hand) and mechanical lifting (lifting by powered trucks, cranes or conveyors). Following the introduction, 15 objectives (each…

  18. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  19. Singapore Teachers' Beliefs about the Purpose of Climate Change Education and Student Readiness to Handle Controversy

    Science.gov (United States)

    Seow, Tricia; Ho, Li-Ching

    2016-01-01

    This qualitative study examines what four pre-service and six practicing geography educators in Singapore schools believe to be the purpose of climate change education, and how this intersects with their beliefs about student readiness to handle controversy within climate change education. A key finding of this study indicates that the teachers'…

  20. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  1. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  2. Handling Kids in Crisis with Care

    Science.gov (United States)

    Bushinski, Cari

    2018-01-01

    The Handle with Care program helps schools help students who experience trauma. While at the scene of an event like a domestic violence call, drug raid, or car accident, law enforcement personnel determine the names and school of any children present. They notify that child's school to "handle ___ with care" the next day, and the school…

  3. Handling of Solid Residues

    International Nuclear Information System (INIS)

    Medina Bermudez, Clara Ines

    1999-01-01

    The topic of solid residues is specifically of great interest and concern for the authorities, institutions and community that identify in them a true threat against the human health and the atmosphere in the related with the aesthetic deterioration of the urban centers and of the natural landscape; in the proliferation of vectorial transmitters of illnesses and the effect on the biodiversity. Inside the wide spectrum of topics that they keep relationship with the environmental protection, the inadequate handling of solid residues and residues dangerous squatter an important line in the definition of political and practical environmentally sustainable. The industrial development and the population's growth have originated a continuous increase in the production of solid residues; of equal it forms, their composition day after day is more heterogeneous. The base for the good handling includes the appropriate intervention of the different stages of an integral administration of residues, which include the separation in the source, the gathering, the handling, the use, treatment, final disposition and the institutional organization of the administration. The topic of the dangerous residues generates more expectation. These residues understand from those of pathogen type that are generated in the establishments of health that of hospital attention, until those of combustible, inflammable type, explosive, radio-active, volatile, corrosive, reagent or toxic, associated to numerous industrial processes, common in our countries in development

  4. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  5. Stereotype Threat Effects on Learning From a Cognitively Demanding Mathematics Lesson.

    Science.gov (United States)

    Lyons, Emily McLaughlin; Simms, Nina; Begolli, Kreshnik N; Richland, Lindsey E

    2018-03-01

    Stereotype threat-a situational context in which individuals are concerned about confirming a negative stereotype-is often shown to impact test performance, with one hypothesized mechanism being that cognitive resources are temporarily co-opted by intrusive thoughts and worries, leading individuals to underperform despite high content knowledge and ability (see Schmader & Beilock, ). We test here whether stereotype threat may also impact initial student learning and knowledge formation when experienced prior to instruction. Predominantly African American fifth-grade students provided either their race or the date before a videotaped, conceptually demanding mathematics lesson. Students who gave their race retained less learning over time, enjoyed the lesson less, reported a diminished desire to learn more, and were less likely to choose to engage in an optional math activity. The detrimental impact was greatest among students with high baseline cognitive resources. While stereotype threat has been well documented to harm test performance, the finding that effects extend to initial learning suggests that stereotype threat's contribution to achievement gaps may be greatly underestimated. Copyright © 2017 Cognitive Science Society, Inc.

  6. The insider threat to cybersecurity: how group process and ignorance affect analyst accuracy and promptitude

    OpenAIRE

    Kelly, Ryan F.

    2017-01-01

    Approved for public release; distribution is unlimited The recent increase in high-profile insider cyber exploits indicates that current insider threat analysis (ITA) is insufficient to handle the growing insider threat problem. Well-established academic literature agrees that information overload is a problem ITA must overcome because ITA remains a human-intensive task. Two conceptual strategies to overcome information overload include reducing information and distributing information amo...

  7. Intertextuality for Handling Complex Environmental Issues

    Science.gov (United States)

    Byhring, Anne Kristine; Knain, Erik

    2016-01-01

    Nowhere is the need for handling complexity more pertinent than in addressing environmental issues. Our study explores students' situated constructs of complexity in unfolding discourses on socio-scientific issues. Students' dialogues in two group-work episodes are analysed in detail, with tools from Systemic Functional Linguistics. We identify…

  8. The effect of education on the knowledge of environmental threats on health in students of elementary schools in Bushehr port

    Directory of Open Access Journals (Sweden)

    Maryam Ravanipour

    2006-02-01

    Full Text Available Background: More than one fourth of diseases around the world are caused by environmental threats. These threats have multifactorial effects on children's health. So, it needs collaboration between teachers, parents, students, and public health authorities to decrease them and improve health. Methods: A total of 18 primary schools were selected using random cluster sampling. After a need assessment analysis about environmental threads, the 3rd and 4th degree students of selected primary schools were invited to draw posters about air pollution, water sanitation, food contamination, natural disaster, solid waste pollution, and sea and beach pollution. Then, a booklet based on the initial need assessment about environmental threads was designed and used for a six weeks educational course. The students drew a second poster after the educational course taught by their teachers. The posters were scored for technical aspects and health concepts by independent examiners. Results: The mean score of students' knowledge about environmental threads increased after intervention (P<0.05. There was no difference between 4th graders and 5th graders, but girls showed a higher score than boys. Conclusion: In primary schools, booklet-based education was effective in promotion of the students' knowledge about environmental threads on health. Therefore, a booklet-based education, designed according to local need assessments, is recommended as a complementary education in primary schools.

  9. The constant threat of terrorism: stress levels and coping strategies amongst university students of Karachi.

    Science.gov (United States)

    Ahmed, Ayesha Ejaz; Masood, Komal; Dean, Sohni Vicky; Shakir, Tanzila; Kardar, Ahmed Abdul Hafeez; Barlass, Usman; Imam, Syed Haider; Mohmand, Mohammad Ghawar Khan; Ibrahim, Hussain; Khan, Imad Saeed; Akram, Usman; Hasnain, Farid

    2011-04-01

    To assess the levels of stress in the face of terrorism and the adopted coping strategies, amongst the student population of universities in Karachi. A descriptive, cross sectional study was conducted on undergraduate students from four universities of Karachi. Self-administered questionnaires were filled out by 291 students. Pearson Chi-Square test was used to assess associations between stress levels and different variables at a level of significance of 0.05%. A total of 65.8% of the students had mild stress levels, 91.5% of university students were exposed to terrorism through television, while only 26.5% students reported personal exposure to terrorism. 67.4% students were forbidden by their parents to go out (p = 0.002). Most of those who had self exposure to an attack were the ones whose parents forbade them from going out (p = 0.00). Most commonly used coping strategy was increased faith in religion. Irritability was the most common stress symptom. A majority of students studying in universities of Karachi had mild stress levels due to the constant threat of terrorism whereas a minority had severe stress levels. Possible reasons for resilience and only mild stress levels could be the history of Karachi's internal conflicts and its prolonged duration of being exposed to terrorism. These students who are positive for stress need to be targeted for counseling either through the media or through their universities. More extensive research is needed in this area.

  10. MODERN THREATS OF SOCIAL SAFETY OF THE EDUCATION ENVIRONMENT AND THEIR PREVENTION

    Directory of Open Access Journals (Sweden)

    Павел Александрович Кисляков

    2013-04-01

    Full Text Available Purpose: identify modern threats of safety of the school and substantiate the direction of their prevention.Methodology: a theoretical analysis of psychological and pedagogical literature on the issues of safety of students.Results: on the basis of theoretical and empirical analysis identified the following threats of social safety of the education environment: criminal threats, threats of extremism and terrorism, physical and mental abuse, interpersonal conflicts, addictive behavior of students. Substantiates the necessity the design of social safety protection, including space of health, space of tolerance, psychologically comfortable space without violence also providing appropriate training of educators.Practical implications: the system of education.DOI: http://dx.doi.org/10.12731/2218-7405-2013-2-2

  11. "He Who Can, Does; He Who Cannot, Teaches?": Stereotype Threat and Preservice Teachers

    Science.gov (United States)

    Ihme, Toni A.; Möller, Jens

    2015-01-01

    "Stereotype threat" is defined as a situational threat that diminishes performance, originating from a negative stereotype about one's own social group. In 3 studies, we seek to determine whether there are indeed negative stereotypes of students who have chosen a career in teaching, and whether the performance of these students is…

  12. Grain Grading and Handling.

    Science.gov (United States)

    Rendleman, Matt; Legacy, James

    This publication provides an introduction to grain grading and handling for adult students in vocational and technical education programs. Organized in five chapters, the booklet provides a brief overview of the jobs performed at a grain elevator and of the techniques used to grade grain. The first chapter introduces the grain industry and…

  13. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. Deflecting the trajectory and changing the narrative: how self-affirmation affects academic performance and motivation under identity threat.

    Science.gov (United States)

    Sherman, David K; Hartson, Kimberly A; Binning, Kevin R; Purdie-Vaughns, Valerie; Garcia, Julio; Taborsky-Barba, Suzanne; Tomassetti, Sarah; Nussbaum, A David; Cohen, Geoffrey L

    2013-04-01

    To the extent that stereotype and identity threat undermine academic performance, social psychological interventions that lessen threat could buffer threatened students and improve performance. Two studies, each featuring a longitudinal field experiment in a mixed-ethnicity middle school, examined whether a values affirmation writing exercise could attenuate the achievement gap between Latino American and European American students. In Study 1, students completed multiple self-affirmation (or control) activities as part of their regular class assignments. Latino American students, the identity threatened group, earned higher grades in the affirmation than control condition, whereas White students were unaffected. The effects persisted 3 years and, for many students, continued into high school by lifting their performance trajectory. Study 2 featured daily diaries to examine how the affirmation affected psychology under identity threat, with the expectation that it would shape students' narratives of their ongoing academic experience. By conferring a big-picture focus, affirmation was expected to broaden construals, prevent daily adversity from being experienced as identity threat, and insulate academic motivation from identity threat. Indeed, affirmed Latino American students not only earned higher grades than nonaffirmed Latino American students but also construed events at a more abstract than concrete level and were less likely to have their daily feelings of academic fit and motivation undermined by identity threat. Discussion centers on how social-psychological processes propagate themselves over time and how timely interventions targeting these processes can promote well-being and achievement.

  15. An Analysis of Stereotype Threat in African American Engineering Students at Predominantly White, Ethnically Diverse, and Historically Black Colleges and Universities

    Science.gov (United States)

    Sparks, David M.

    2013-01-01

    The purpose of this research was to distinguish the similarities and differences in coping strategies of African American engineering students by analyzing their perceptions of stereotype threat at three academic institution types, Predominantly White Institutions (PWI), ethnically diverse, and Historically Black Colleges and Universities (HBCUs).…

  16. The influence of stereotype threat on immigrants: review and meta-analysis

    OpenAIRE

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemen...

  17. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  18. Invention activities as preparation for learning laboratory data handling skills

    Science.gov (United States)

    Day, James

    2012-10-01

    Undergraduate physics laboratories are often driven by a mix of goals, and usually enough of them to cause cognitive overload for the student. Our recent findings align well with studies indicating that students often exit a physics lab without having properly learned how to handle real data. The value of having students explore the underlying structure of a problem before being able to solve it has been shown as an effective way to ready students for learning. Borrowing on findings from the fields of education and cognitive psychology, we use ``invention activities'' to precede direct instruction and bolster learning. In this talk I will show some of what we have learned about students' data handling skills, explain how an invention activity works, and share some observations of successful transfer.

  19. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  20. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  1. The influence of stereotype threat on immigrants: review and meta-analysis

    Science.gov (United States)

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  2. The Influence of Stereotype Threat on Immigrants: Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Markus eAppel

    2015-07-01

    Full Text Available In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of .63 (random effects model in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research, cultural context (US vs. Europe, age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed.

  3. Stereotypes and the Achievement Gap: Stereotype Threat Prior to Test Taking

    Science.gov (United States)

    Appel, Markus; Kronberger, Nicole

    2012-01-01

    Stereotype threat is known as a situational predicament that prevents members of negatively stereotyped groups to perform up to their full ability. This review shows that the detrimental influence of stereotype threat goes beyond test taking: It impairs stereotyped students to build abilities in the first place. Guided by current theory on…

  4. Women and computers: effects of stereotype threat on attribution of failure

    OpenAIRE

    Koch, Sabine C.; Müller, Stephanie M.; Sieverding, Monika

    2008-01-01

    This study investigated whether stereotype threat can influence women’s attributions of failure in a computer task. Male and female college-age students (n = 86, 16–21 years old) from Germany were asked to work on a computer task and were hinted beforehand that in this task, either (a) men usually perform better than women do (negative threat condition), or (b) women usually perform better than men do (positive condition), or (c) they received no threat or gender-related information (contr...

  5. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    Science.gov (United States)

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  6. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  7. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  8. Information security threats in web-portals on the open journal systems platform

    Directory of Open Access Journals (Sweden)

    Anton A. Abramov

    2018-05-01

    Full Text Available This article addresses the problem of security threats while working with web portals built on the Open Journal Systems platform. The Open Journal Systems (OJS platform was originally developed as part of the Public Knowledge Project and it is one of the most popular open-source platforms for web journals today. Based on the data available in the Public Knowledge Project, there were more than 10,000 active journals using the open journal systems platform by the end of 2016. A migration of a journal to such advanced and complex platform helps to handle the entire workflow over a single web portal. Therefore it is an important move and only peer-reviewed journals that are part of Russian and Worldwide citation systems go for it. At the same time the problem of keeping privacy for a manuscript before it is published is very important for these journals and for authors who submit it to the journal. The paper describes the most common threats for the web portals on the OJS platform as well as a particular model of the security threats, and suggests the measures that could help to neutralize these threats.

  9. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  10. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  11. Interacting with sexist men triggers social identity threat among female engineers.

    Science.gov (United States)

    Logel, Christine; Walton, Gregory M; Spencer, Steven J; Iserman, Emma C; von Hippel, William; Bell, Amy E

    2009-06-01

    Social identity threat is the notion that one of a person's many social identities may be at risk of being devalued in a particular context (C. M. Steele, S. J. Spencer, & J. Aronson, 2002). The authors suggest that in domains in which women are already negatively stereotyped, interacting with a sexist man can trigger social identity threat, undermining women's performance. In Study 1, male engineering students who scored highly on a subtle measure of sexism behaved in a dominant and sexually interested way toward an ostensible female classmate. In Studies 2 and 3, female engineering students who interacted with such sexist men, or with confederates trained to behave in the same way, performed worse on an engineering test than did women who interacted with nonsexist men. Study 4 replicated this finding and showed that women's underperformance did not extend to an English test, an area in which women are not negatively stereotyped. Study 5 showed that interacting with sexist men leads women to suppress concerns about gender stereotypes, an established mechanism of stereotype threat. Discussion addresses implications for social identity threat and for women's performance in school and at work.

  12. [Leaking: Frequency and correlates of announcements and threats of homicidal violence reported by Berlin schools between 1996 and 2007].

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert

    2016-01-01

    Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.

  13. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  14. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  15. Evaluation of Vocational High Schools’ Status Analysis through Student Perception: Evidence from Turkey

    Directory of Open Access Journals (Sweden)

    Salih Börteçine Avci

    2016-03-01

    Full Text Available Nowadays the current status of vocational schools is handled by different sectors with a critical perspective. What will be the future status of vocational schools requires a strategic perspective. In this study, SWOT analyse was used as a method to analyse the current status of vocational schools.  In order to determine the important components of SWOT (strengths, weaknesses, opportunities and threats analyse a questionnaire prepared according to the five-point Likert scale was applied to 300 vocational school students from Ataturk University and Kafkas University in Turkey. Results being subjected to statistical analysis and were given some suggestions.

  16. Sequencing the threat and recommendation components of persuasive messages differentially improves the effectiveness of high- and low-distressing imagery in an anti-alcohol message in students.

    Science.gov (United States)

    Brown, Stephen L; West, Charlotte

    2015-05-01

    Distressing imagery is often used to improve the persuasiveness of mass-reach health promotion messages, but its effectiveness may be limited because audiences avoid attending to content. Prior self-affirmation or self-efficacy inductions have been shown to reduce avoidance and improve audience responsiveness to distressing messages, but these are difficult to introduce into a mass-reach context. Reasoning that a behavioural recommendation may have a similar effect, we reversed the traditional threat-behavioural recommendation health promotion message sequence. 2 × 2 experimental design: Factor 1, high- and low-distress images; Factor 2, threat-recommendation and recommendation-threat sequences. Ninety-one students were exposed to an identical text message accompanied by high- or low-distress imagery presented in threat-recommendation and recommendation-threat sequences. For the high-distress message, greater persuasion was observed for the recommendation-threat than the threat-recommendation sequence. This was partially mediated by participants' greater self-exposure to the threat component of the message, which we attribute to the effect of sequence in reducing attentional avoidance. For the low-distress message, greater persuasion was observed for the threat-recommendation sequence, which was not mediated by reading time allocated to the threat. Tailoring message sequence to suit the degree of distress that message developers wish to induce provides a tool that could improve persuasive messages. These findings provide a first step in this process and discuss further steps needed to consolidate and expand these findings. Statement of contribution What is already known on this subject? Health promotion messages accompanied by distressing imagery might, under some circumstances, persuade individuals to engage in healthier behaviour. Audiences can respond defensively to distressing imagery, but may be less inclined to do so when an easily followed behavioural

  17. Stereotype Threat Effects on African American and Latina/o Elementary Students Tested Together

    Science.gov (United States)

    Wasserberg, Martin James

    2017-01-01

    Purpose: This study aimed to investigate whether a diagnostic testing condition leads to stereotype threat effects for African American and Latina/o children (N = 81) when tested together at an urban elementary school in Miami, Florida. Design/methodology/approach: To analyze the effect of stereotype threat on participants' reading test…

  18. Laboratory biosafety for handling emerging viruses

    Directory of Open Access Journals (Sweden)

    I. Made Artika

    2017-05-01

    Full Text Available Emerging viruses are viruses whose occurrence has risen within the past twenty years, or whose presence is likely to increase in the near future. Diseases caused by emerging viruses are a major threat to global public health. In spite of greater awareness of safety and containment procedures, the handling of pathogenic viruses remains a likely source of infection, and mortality, among laboratory workers. There is a steady increase in both the number of laboratories and scientist handling emerging viruses for diagnostics and research. The potential for harm associated to work with these infectious agents can be minimized through the application of sound biosafety concepts and practices. The main factors to the prevention of laboratory-acquired infection are well-trained personnel who are knowledgable and biohazard aware, who are perceptive of the various ways of transmission, and who are professional in safe laboratory practice management. In addition, we should emphasize that appropriate facilities, practices and procedures are to be used by the laboratory workers for the handling of emerging viruses in a safe and secure manner. This review is aimed at providing researchers and laboratory personnel with basic biosafety principles to protect themselves from exposure to emerging viruses while working in the laboratory. This paper focuses on what emerging viruses are, why emerging viruses can cause laboratory-acquired infection, how to assess the risk of working with emerging viruses, and how laboratory-acquired infection can be prevented. Control measures used in the laboratory designed as such that they protect workers from emerging viruses and safeguard the public through the safe disposal of infectious wastes are also addressed.

  19. Women of low socioeconomic status living with diabetes: Becoming adept at handling a disease

    Directory of Open Access Journals (Sweden)

    Wimonrut Boonsatean

    2015-12-01

    Full Text Available Objective: The objective of this study was to explore how Thai women of low socioeconomic status handle their type 2 diabetes. Methods: A qualitative interpretative method was used to study 19 women with type 2 diabetes in a suburban community in Thailand. Data were collected via semi-structured interviews and were analysed using inductive and constructive processes. Results: Participants’ lives underwent many changes between their initial diagnoses and later stages when they became adept at handling diabetes. Two themes emerged, which involved (1 the transition to handling diabetes and (2 the influences of the social environment. The first theme encompassed confronting the disease, reaching a turning point in the process of adaptation and developing expertise in handling diabetes. The second theme involved threats of loss of status and empowerment by families. These findings showed that becoming adept at handling diabetes required significant changes in women’s behaviours and required taking advantage of influences from the social environment. Conclusion: The process of developing expertise in handling diabetes was influenced by both inner and outer factors that required adjustment to learn to live with diabetes. Furthermore, the reductions found in women’s social statuses when they become patients in the healthcare system might pose a barrier to women of low socioeconomic status becoming adept at handling diabetes. However, the experiences of empowerment received from the women’s families acted as a powerful strategy to strengthen their handling of the disease. To develop accessible and sensitive health care for this population, it is important to pay attention to these findings.

  20. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  1. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  2. The Efficacy of Choice Threats within School Accountability Systems: Results from Legislatively Induced Experiments. PEPG 05-01

    Science.gov (United States)

    West, Martin R.; Peterson, Paul E.

    2005-01-01

    Stigma and school voucher threats under a revised 2002 Florida accountability law have positive impacts on student performance. Stigma and public school choice threats under the U.S. federal accountability law, No Child Left Behind, do not have similar effects in Florida. Significant impacts of stigma, when combined with the voucher threat, are…

  3. Strategic analyses in nursing schools: attracting, educating, and graduating more nursing students: part I--strengths, weaknesses, opportunities, and threats analysis.

    Science.gov (United States)

    Crow, Stephen M; Hartman, Sandra J; Mahesh, Sathiadev; McLendon, Christy L; Henson, Steve W; Jacques, Paul

    2008-01-01

    The shortage of nurses in the United States remains a persistent problem. Faced with this reality, nursing programs in colleges and universities continue to struggle to expand enrollment levels to meet the spiraling demand. This research uses familiar tools in strategic management: the strengths, weaknesses, opportunities, and threats (SWOT) analysis and stakeholder analysis as initial steps to draw more students to the profession of nursing. In a 2-round modified Delphi survey, chief administrators of schools of nursing identify the main SWOT of schools of nursing and the important internal and external stakeholders that influence nursing school success. The authors of the research suggest ways to use that knowledge to increase the enrollment level of nursing students. Part I of this research focuses on the SWOT analyses.

  4. Does Stereotype Threat Affect Post-Course Scores on the Astronomy Diagnostic Test?

    Science.gov (United States)

    Deming, G. L.; Hufnagel, B.; Landato, J. M.; Hodari, A. K.

    2003-12-01

    During the 1990s, Claude Steele and others demonstrated that women mathematics students under-performed while men over-performed on selected GRE questions when told that the exam could differentiate by gender. Stereotype threat is triggered for these women when they fear someone else may negatively stereotype them, and therefore, their performance is affected. In a limited study involving 229 students, we investigated the effect of stereotype threat on performance on the Astronomy Diagnostic Test (ADT). The ADT was administered as a pre-test in four introductory astronomy classes intended for non-science majors. The same professors taught pairs of classes at the University of Maryland, a large research institution, and W. R. Harper College, a small liberal arts school. The classes were treated the same until the final day before the post-course ADT was given. One "threatened" class at each campus was told that gender mattered so they should be sure to include it on the ADT. The "control" classes were told that gender does not matter. The results show no stereotype threat effect on the women in these introductory classes. The university men did slightly over-perform at low statistical significance. As Steele suggested, students must identify with a subject in order to strongly invoke a stereotype threat. This research was supported in part by the National Science Foundation through grants REC-0089239 to GLD, DGE-97014489 to BH, and DGE-9714452 for AKH.

  5. Improving Standoff Bombing Capacity in the Face of Anti-Access Area Denial Threats

    Science.gov (United States)

    2015-09-01

    threats, there will be a high premium on destroying certain targets early in the conflict. The ability of bombers to operate in A2/AD is a significant...Maximum gross takeoff weight (1,000s of lbs.) Military cargo derivatives Commercial derivatives Legacy bombers 63 Military Cargo Derivative...and other structural modifications for the launcher. The original Boeing design for a 747 CMCA had 90,000 pounds reserved for handling and launch

  6. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  7. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  8. The Psychosocial Experience of High School Girls Highly Susceptible to Stereotype Threat: A Phenomenological Study

    Science.gov (United States)

    Picho, Katherine

    2016-01-01

    The author used phenomenology to explore the subjective experience of ninth-grade girls susceptible to mathematics-related stereotype threat in their authentic learning environments. The sample constituted students categorized as either having low or high susceptibility to stereotype threat (SST) enrolled in Honors mathematics classes at an urban…

  9. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  10. Girls' math performance under stereotype threat: the moderating role of mothers' gender stereotypes.

    Science.gov (United States)

    Tomasetto, Carlo; Alparone, Francesca Romana; Cadinu, Mara

    2011-07-01

    Previous research on stereotype threat in children suggests that making gender identity salient disrupts girls' math performance at as early as 5 to 7 years of age. The present study (n = 124) tested the hypothesis that parents' endorsement of gender stereotypes about math moderates girls' susceptibility to stereotype threat. Results confirmed that stereotype threat impaired girls' performance on math tasks among students from kindergarten through 2nd grade. Moreover, mothers' but not fathers' endorsement of gender stereotypes about math moderated girls' vulnerability to stereotype threat: performance of girls whose mothers strongly rejected the gender stereotype about math did not decrease under stereotype threat. These findings are important because they point to the role of mothers' beliefs in the development of girls' vulnerability to the negative effects of gender stereotypes about math. PsycINFO Database Record (c) 2011 APA, all rights reserved

  11. 'I'm Black and I'm Proud': A Majority Ecological Context Protects Affective Aspects of Black Identity Under Stereotype Threat.

    Science.gov (United States)

    Oliver, Andre'; Andemeskel, Ghilamichael; King, Carlise R; Wallace, Lyndsey; McDougal, Serie; Monteiro, Kenneth P; Ben-Zeev, Avi

    2017-12-01

    We provide evidence that stereotype threat, a phenomenon that causes stigmatized individuals to experience group-based evaluative concerns (Steele in Am Psychol 52:613-629, 1997; Whistling Vivaldi and other clues to how stereotypes affect us, W.W. Norton, New York, 2010), impacts affective aspects of Black identity as a function of majority versus minority ecological contexts. Black/African-American students, enrolled in either Africana Studies (Black ecological majority) or Psychology (Black ecological minority), completed private and public regard subscales from the Multidimensional Inventory of Black Identity (Sellers et al. in Pers Soc Psychol Rev 2:18-39, 1998) at baseline (Time 1) and after being randomly assigned to a stereotype threat or no-threat/control condition (Time 2). In threat, participants were introduced to a 'puzzle' task as diagnostic of intellectual abilities, whereas in no-threat the same task was introduced as culture fair, such that people from different racial/ethnic groups had performed similarly on this task in the past. In Psychology, students under threat exhibited a simultaneous decrease and increase in private and public regard, respectively, a pattern shown in the literature to be associated with discrimination-based distress and lesser well-being in Black ecological minority environments. In contrast, Africana Studies students' racial identity under threat remained intact. We discuss the protective effects of Africana Studies on racial identity and implications for educational reform.

  12. Value-Added Models for Teacher Preparation Programs: Validity and Reliability Threats, and a Manageable Alternative

    Science.gov (United States)

    Brady, Michael P.; Heiser, Lawrence A.; McCormick, Jazarae K.; Forgan, James

    2016-01-01

    High-stakes standardized student assessments are increasingly used in value-added evaluation models to connect teacher performance to P-12 student learning. These assessments are also being used to evaluate teacher preparation programs, despite validity and reliability threats. A more rational model linking student performance to candidates who…

  13. The Effects of Stereotype Threat on Standardized Mathematics Test Performance and Cognitive Processing

    Science.gov (United States)

    Arbuthnot, Keena

    2009-01-01

    Although research has extensively documented sources for differential item functioning and stereotype threat--especially among women and black college students--little is known about group differences in test-taking strategies among black adolescent students. In this article, Arbuthnot presents findings from two studies that seek to explore how…

  14. [Handling the cases of school failure in an educational institute in Zaghouan].

    Science.gov (United States)

    Abdelkafi Koubaa, Afifa; Bouslama, Samira; Bel Abed, Najet; Dahmen, Hayet; Mira Gabsi, Zvine; Gabsi, Abdallah; Ouerfelli, Nabil; Mabaouj, Mohamed Taher; Bachouche, Imen

    2011-10-01

    To assess the main reasons for the school failure in a school in Zaghouan, how to handle these issues, to evaluate the work of the school social office. A retrospective study included 86 failure cases in a school in Zaghouan, handled by the school social office for three years (2004 - 2007). He have detected the principals causes of school failure, detected by the educational staff or by the listening office. The causes of failure are mainly social (46%) as family problems and low income. These families received financial aids and free treatment cards. Discussions have been made with the parents in order to make them more conscious. The pedagogical reasons (28%) however are usually relationship' problems between the student and his teacher or the student and the administration, the three subjects were informed so that attitudes could be changed in the purpose of helping the student. Twelve students (14%) have a psychological case, depression and over worrying, led in some cases to addiction.These cases were diagnosed and transferred to specialized clinics.Sense and chronic diseases (12%), are considered as health reasons for school failure and caused several absences in the school. The school physicist took care of these cases by handling them medical guidance cards while observing the diagnose progress. As school results, 56 cases turned satisfaisant which is 65 % of all cases. The school failure became a priority of the "School Health" institute. That puss to create the school social program, his aim is protecting the students from all dangers, early school leaving and social disintegration, and delinquency. Thus, all parts must be responsible for the school failure, teachers, parents, students,psychiatrists and physicists, as well as introducing the social school work and listening offices and missions to the parents, students and teachers in order to guarantee the success of the operations.

  15. Multiple social identities and stereotype threat: imbalance, accessibility, and working memory.

    Science.gov (United States)

    Rydell, Robert J; McConnell, Allen R; Beilock, Sian L

    2009-05-01

    In 4 experiments, the authors showed that concurrently making positive and negative self-relevant stereotypes available about performance in the same ability domain can eliminate stereotype threat effects. Replicating past work, the authors demonstrated that introducing negative stereotypes about women's math performance activated participants' female social identity and hurt their math performance (i.e., stereotype threat) by reducing working memory. Moving beyond past work, it was also demonstrated that concomitantly presenting a positive self-relevant stereotype (e.g., college students are good at math) increased the relative accessibility of females' college student identity and inhibited their gender identity, eliminating attendant working memory deficits and contingent math performance decrements. Furthermore, subtle manipulations in questions presented in the demographic section of a math test eliminated stereotype threat effects that result from women reporting their gender before completing the test. This work identifies the motivated processes through which people's social identities became active in situations in which self-relevant stereotypes about a stigmatized group membership and a nonstigmatized group membership were available. In addition, it demonstrates the downstream consequences of this pattern of activation on working memory and performance. Copyright (c) 2009 APA, all rights reserved.

  16. Fuel handling machine and auxiliary systems for a fuel handling cell

    International Nuclear Information System (INIS)

    Suikki, M.

    2013-10-01

    This working report is an update for as well as a supplement to an earlier fuel handling machine design (Kukkola and Roennqvist 2006). A focus in the earlier design proposal was primarily on the selection of a mechanical structure and operating principle for the fuel handling machine. This report introduces not only a fuel handling machine design but also auxiliary fuel handling cell equipment and its operation. An objective of the design work was to verify the operating principles of and space allocations for fuel handling cell equipment. The fuel handling machine is a remote controlled apparatus capable of handling intensely radiating fuel assemblies in the fuel handling cell of an encapsulation plant. The fuel handling cell is air tight space radiation-shielded with massive concrete walls. The fuel handling machine is based on a bridge crane capable of traveling in the handling cell along wall tracks. The bridge crane has its carriage provided with a carousel type turntable having mounted thereon both fixed and telescopic masts. The fixed mast has a gripper movable on linear guides for the transfer of fuel assemblies. The telescopic mast has a manipulator arm capable of maneuvering equipment present in the fuel handling cell, as well as conducting necessary maintenance and cleaning operations or rectifying possible fault conditions. The auxiliary fuel handling cell systems consist of several subsystems. The subsystems include a service manipulator, a tool carrier for manipulators, a material hatch, assisting winches, a vacuum cleaner, as well as a hose reel. With the exception of the vacuum cleaner, the devices included in the fuel handling cell's auxiliary system are only used when the actual encapsulation process is not ongoing. The malfunctions of mechanisms or actuators responsible for the motion actions of a fuel handling machine preclude in a worst case scenario the bringing of the fuel handling cell and related systems to a condition appropriate for

  17. Fuel handling machine and auxiliary systems for a fuel handling cell

    Energy Technology Data Exchange (ETDEWEB)

    Suikki, M. [Optimik Oy, Turku (Finland)

    2013-10-15

    This working report is an update for as well as a supplement to an earlier fuel handling machine design (Kukkola and Roennqvist 2006). A focus in the earlier design proposal was primarily on the selection of a mechanical structure and operating principle for the fuel handling machine. This report introduces not only a fuel handling machine design but also auxiliary fuel handling cell equipment and its operation. An objective of the design work was to verify the operating principles of and space allocations for fuel handling cell equipment. The fuel handling machine is a remote controlled apparatus capable of handling intensely radiating fuel assemblies in the fuel handling cell of an encapsulation plant. The fuel handling cell is air tight space radiation-shielded with massive concrete walls. The fuel handling machine is based on a bridge crane capable of traveling in the handling cell along wall tracks. The bridge crane has its carriage provided with a carousel type turntable having mounted thereon both fixed and telescopic masts. The fixed mast has a gripper movable on linear guides for the transfer of fuel assemblies. The telescopic mast has a manipulator arm capable of maneuvering equipment present in the fuel handling cell, as well as conducting necessary maintenance and cleaning operations or rectifying possible fault conditions. The auxiliary fuel handling cell systems consist of several subsystems. The subsystems include a service manipulator, a tool carrier for manipulators, a material hatch, assisting winches, a vacuum cleaner, as well as a hose reel. With the exception of the vacuum cleaner, the devices included in the fuel handling cell's auxiliary system are only used when the actual encapsulation process is not ongoing. The malfunctions of mechanisms or actuators responsible for the motion actions of a fuel handling machine preclude in a worst case scenario the bringing of the fuel handling cell and related systems to a condition appropriate for

  18. Statistical methods for handling incomplete data

    CERN Document Server

    Kim, Jae Kwang

    2013-01-01

    ""… this book nicely blends the theoretical material and its application through examples, and will be of interest to students and researchers as a textbook or a reference book. Extensive coverage of recent advances in handling missing data provides resources and guidelines for researchers and practitioners in implementing the methods in new settings. … I plan to use this as a textbook for my teaching and highly recommend it.""-Biometrics, September 2014

  19. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists ( M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  20. Predictive Validity of Explicit and Implicit Threat Overestimation in Contamination Fear

    Science.gov (United States)

    Green, Jennifer S.; Teachman, Bethany A.

    2012-01-01

    We examined the predictive validity of explicit and implicit measures of threat overestimation in relation to contamination-fear outcomes using structural equation modeling. Undergraduate students high in contamination fear (N = 56) completed explicit measures of contamination threat likelihood and severity, as well as looming vulnerability cognitions, in addition to an implicit measure of danger associations with potential contaminants. Participants also completed measures of contamination-fear symptoms, as well as subjective distress and avoidance during a behavioral avoidance task, and state looming vulnerability cognitions during an exposure task. The latent explicit (but not implicit) threat overestimation variable was a significant and unique predictor of contamination fear symptoms and self-reported affective and cognitive facets of contamination fear. On the contrary, the implicit (but not explicit) latent measure predicted behavioral avoidance (at the level of a trend). Results are discussed in terms of differential predictive validity of implicit versus explicit markers of threat processing and multiple fear response systems. PMID:24073390

  1. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  2. Impact of Type 2 Diabetes Threat Appraisal on Physical Activity and Nutrition Behaviors among Overweight and Obese College Students.

    Science.gov (United States)

    Amuta, Ann O; Crosslin, Katie; Goodman, Jessica; Barry, Adam E

    2016-07-01

    We examined the impact of threat appraisal (TA) on Type 2 diabetes (T2D)-related protective behaviors among high-risk college students. Using a Web-based survey, we collected data from 319 overweight or obese undergraduate students attending one of 4 Texas colleges/universities. Hierarchical multiple regression analyses determined the association between the outcome variable, fruits and vegetables (F&V) consumption and physical activity (PA), and TA. Demographic characteristics were entered at step 1, explaining 7% of variance in F&V consumption and 6% in PA. After TA was entered in block 2, the total variance explained changed by only .008% for F&V consumption and .009% for PA. TA did not predict T2D protective behaviors and reduced variability in the model. Being female, as well as having a T2D family history, was significantly associated with increased TA. Results can inform the planning, implementing, and evaluating of health promotion programs.

  3. Health and environmental threats associated with the destruction of chemical weapons.

    Science.gov (United States)

    Matousek, Jirí

    2006-09-01

    Still existing arsenals of chemical weapons (CW) pose not only security threats for possible use in hostilities by state actors or misuse by terrorists but also safety threats to humans and biota due to leakages and possible accidents. The Chemical Weapons Convention (CWC) commits the States Parties (SPs) to destroy CW using technologies taking into consideration human health and environmental protection. It does not allow methods, routinely used up to the 1970s, such as earth burial, open-pit burning, and sea dumping. Long-term health and environmental threats and some accidents that have already occurred in the known localities of the sea-dumped and earth-buried arsenals of Nazi-German armed forces in the Baltic Region and of Imperial Japanese forces in the Far East Region are analyzed according to the impact of major CW and ammunition types (i.e., sulfur mustard--HD, tabun--GA, arsenicals--DA, DC, DM, arsine oil, and chloroacetophenone--CN). Any possible operations and handling with CW envisaged by the CWC as well as their verification are summarized taking into account the health threat they pose. CW and toxic armament waste to be destroyed and applied technologies (both developed and under current use in operational CW destruction facilities [CWDF]) are reviewed as are systems of health safety and environmental protection of the destruction/demilitarization stems from the extraordinary high toxicity of supertoxic lethal agents in man and biota. Problems of currently used Russian and U.S. standards for maximum allowable workplace concentrations and general population limits and possibilities of their determination by available analytical instrumentation are discussed.

  4. Laboratory Activity on Sample Handling and Maintaining a Laboratory Notebook through Simple pH Measurements

    Science.gov (United States)

    Erdmann, Mitzy A.; March, Joe L.

    2016-01-01

    Sample handling and laboratory notebook maintenance are necessary skills but can seem abstract if not presented to students in context. An introductory exercise focusing on proper sample handling, data collection and laboratory notebook keeping for the general chemistry laboratory was developed to emphasize the importance of keeping an accurate…

  5. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  6. Swazi Journalism and the 'Muslim Threat' | Rooney | Lwati: A ...

    African Journals Online (AJOL)

    ... Swaziland constitution; (ii) a report that Muslims were enticing university students to convert to Islam in return for scholarships; and (iii) a public symposium run on the subject of Islam. It concludes that Swazi newspapers frame Muslims as warlike people who are plotting against the kingdom and who pose a threat to Swazi ...

  7. Degrees of Integrity: The Threat of Corruption in Higher Education

    Science.gov (United States)

    Chapman, David W.; Lindner, Samira

    2016-01-01

    Corruption in higher education is the focus of growing international concern among governments, educators, students, and other stakeholders. Those working in higher education institutions now face a unique convergence of pressures that is creating a heightened threat to the integrity of the higher education enterprise worldwide. This paper draws…

  8. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    Science.gov (United States)

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  9. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  10. Hope, connectedness, and action: responses of adolescents and young adults to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Fernald, M.C.

    1985-01-01

    This study undertook to assess the degree to which a person's sense of interconnectedness with others may have a mediating effect on whether one reacts to the consciousness of nuclear threat with feelings of despair (helplessness and hopelessness) or with a sense of empowerment (hope, efficacy, and action for change). Subjects included 119 public high school students and 14 Friends' school students, ranging from 12-18 years of age; 58 university students ranging from 18-25 years of age; and 24 parents of public school students, 10 adult Friends, and 38 members of Physicians for Social Responsibility, ranging from 20-83 years of age. A self-rating questionnaire was administered to assess subjects' conscious level of concern about nuclear issues, feelings of connectedness with others in general and about nuclear concerns, feelings of hope and efficacy in general and with regard to nuclear issues, and participation in activities reflecting concerns about nuclear threat. Correlational analyses (multiple regression, Spearman Rho, Kendall's Tau) showed that general feelings of hope, level of activity, and feelings of connectedness about nuclear concerns were the best predictors of hope about nuclear concerns. Conscious level of concern and feelings of connectedness about nuclear concerns, along with age and SES were the best predictors of an active response to nuclear threat; additionally, parents' level of concern about nuclear issues was predictive of their children's degree of activity in response to nuclear threat. Adolescents' level of concern and degree of connectedness with others was predicted by their parents' degree of connectedness.

  11. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  12. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  13. We can do it: the interplay of construal orientation and social comparisons under threat.

    Science.gov (United States)

    Marx, David M; Stapel, Diederik A; Muller, Dominique

    2005-03-01

    The authors investigated how a collective self-construal orientation in combination with positive social comparisons "turns off" the negative effects of stereotype threat. Specifically, Experiment 1 demonstrated that stereotype threat led to increased accessibility of participants' collective self ("we"). Experiment 2 showed that this feeling of "we-ness" in the stereotype threat condition centered on the participants' stereotyped group membership and not on other important social groups (e.g., students). Experiment 3 indicated that in threat situations, when participants' collective self is accessible, positive social comparison information led to improved math test performance and less concern, whereas in nonthreat situations, when the collective self is less accessible, positive comparison information led to worse test performance and more concern. Our final experiment revealed that under stereotype threat, only those comparison targets who are competent in the relevant domain (math), rather than in domains unrelated to math (athletics), enhanced participants' math test performance. ((c) 2005 APA, all rights reserved).

  14. Safety in Elevators and Grain Handling Facilities. Module SH-27. Safety and Health.

    Science.gov (United States)

    Center for Occupational Research and Development, Inc., Waco, TX.

    This student module on safety in elevators and grain handling facilities is one of 50 modules concerned with job safety and health. Following the introduction, 15 objectives (each keyed to a page in the text) the student is expected to accomplish are listed (e.g., Explain how explosion suppression works). Then each objective is taught in detail,…

  15. Handling of multiassembly sealed baskets between reactor storage and a remote handling facility

    International Nuclear Information System (INIS)

    Massey, J.V.; Kessler, J.H.; McSherry, A.J.

    1989-06-01

    The storage of multiple fuel assemblies in sealed (welded) dry storage baskets is gaining increasing use to augment at-reactor fuel storage capacity. Since this increasing use will place a significant number of such baskets on reactor sites, some initial downstream planning for their future handling scenarios for retrieving multi-assembly sealed baskets (MSBs) from onsite storage and transferring and shipping the fuel (and/or the baskets) to a federally operated remote handling facility (RHF). Numerous options or at-reactor and away-from-reactor handling were investigated. Materials handling flowsheets were developed along with conceptual designs for the equipment and tools required to handle and open the MSBs. The handling options were evaluated and compared to a reference case, fuel handling sequence (i.e., fuel assemblies are taken from the fuel pool, shipped to a receiving and handling facility and placed into interim storage). The main parameters analyzed are throughout, radiation dose burden and cost. In addition to evaluating the handling of MSBs, this work also evaluated handling consolidated fuel canisters (CFCs). In summary, the handling of MSBs and CFCs in the store, ship and bury fuel cycle was found to be feasible and, under some conditions, to offer significant benefits in terms of throughput, cost and safety. 14 refs., 20 figs., 24 tabs

  16. Threats of Violence in Schools: The Dallas Independent School District's Response.

    Science.gov (United States)

    Ryan-Arrendondo, Kim; Renouf, Kristin; Egyed, Carla; Doxey, Meredith; Dobbins, Maria; Sanchez, Serafin; Rakowitz, Bert

    2001-01-01

    Discusses the Dallas Public Schools' procedures for assessing the potential for violence among children who express intent to harm others. The Dallas Violence Risk Assessment (DVRA) was developed to evaluate students who have made threats of violence, and to assist school staff in determining appropriate intervention strategies. Describes the…

  17. Are College Students' Assessments of Threat Shaped by the Dangers of Their Childhood Environment?

    Science.gov (United States)

    Sherman, Amanda K; Minich, Steven H; Langen, Tom A; Skufca, Joseph; Wilke, Andreas

    2016-07-01

    Humans internalize environmental cues of mortality risk at an early age, which influences subsequent risk perceptions and behavior. In this respect, an individual's current risk assessment may be viewed as an adaptive response to the dangers present within his or her early local environment. Here we examine the relationship between several variables indicating threat within an individual's early environment (e.g., prevalence of violent and property crimes, registered sex offenders) and their perception of crime risk within both the childhood and current adult environments. We recruited a group of 657 students who hail from diverse geographic backgrounds to provide the zip code location of their childhood residence along with subjective ratings of danger of that and their current location, which enabled us to compare their ratings of risk/danger with the federally reported crime statistics of each setting. Our results indicate that the early prevalence of registered sex offenders indeed influences an individual's risk perception in adulthood, and that these factors have a differential effect on males and females. Our findings provide support for the theory that early environmental factors signaling danger affect how individuals assess risk within their adult environment. © The Author(s) 2015.

  18. Nuclear fuel handling apparatus

    International Nuclear Information System (INIS)

    Andrea, C.; Dupen, C.F.G.; Noyes, R.C.

    1977-01-01

    A fuel handling machine for a liquid metal cooled nuclear reactor in which a retractable handling tube and gripper are lowered into the reactor to withdraw a spent fuel assembly into the handling tube. The handling tube containing the fuel assembly immersed in liquid sodium is then withdrawn completely from the reactor into the outer barrel of the handling machine. The machine is then used to transport the spent fuel assembly directly to a remotely located decay tank. The fuel handling machine includes a decay heat removal system which continuously removes heat from the interior of the handling tube and which is capable of operating at its full cooling capacity at all times. The handling tube is supported in the machine from an articulated joint which enables it to readily align itself with the correct position in the core. An emergency sodium supply is carried directly by the machine to provide make up in the event of a loss of sodium from the handling tube during transport to the decay tank. 5 claims, 32 drawing figures

  19. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  20. Contextual Factors Related to Stereotype Threat and Student Success in Science Technology Engineering Mathematics Education: A Mixed Methods Study

    Science.gov (United States)

    Leker, Lindsey Beth

    Stereotype threat is a widely researched phenomenon shown to impact performance in testing and evaluation situations (Katz, Roberts, & Robinson, 1965; Steele & Aronson, 1995). When related to gender, stereotype threat can lead women to score lower than men on standardized math exams (Spencer, Steele, & Quinn, 1999). Stereotype threat may be one reason women have lower enrollment in most science, technology, engineering, and mathematics (STEM) majors, hold a smaller number of STEM careers than men, and have a higher attrition rate in STEM professions (Hill, Corbet, & Rose, 2010; Picho & Brown 2011; Sorby & Baartmans, 2000). Most research has investigated stereotype threat using experiments yielding mixed results (Stoet & Geary, 2012). Thus, there is a need to explore stereotype threat using quantitative surveys and qualitative methods to examine other contextual factors that contribute to gender difference in STEM fields. This dissertation outlined a mixed methods study designed to, first, qualitatively explore stereotype threat and contextual factors related to high achieving women in STEM fields, as well as women who have failed and/or avoided STEM fields. Then, the quantitative portion of the study used the themes from the qualitative phase to create a survey that measured stereotype threat and other contextual variables related to STEM success and failure/avoidance. Fifteen participants were interviewed for the qualitative phase of the study and six themes emerged. The quantitative survey was completed 242 undergraduate participants. T-tests, correlations, regressions, and mediation analyses were used to analyze the data. There were significant relationships between stereotype threat and STEM confidence, STEM anxiety, giving up in STEM, and STEM achievement. Overall, this mixed methods study advanced qualitative research on stereotype threat, developed a much-needed scale for the measurement of stereotype threat, and tested the developed scale.

  1. Threat Perception Bias and Anxiety among Chinese School Children and Adolescents

    Science.gov (United States)

    Lu, Weili; Daleiden, Eric; Lu, Shou-En

    2007-01-01

    This study evaluated the relationship between threat perception bias and anxiety among children and adolescents in China. A sample of 1,004 elementary, middle and high school students aged 9 to 19 years listened to stories containing themes of generalized anxiety, social anxiety and separation anxiety in either an ambiguous or non-ambiguous…

  2. Cybersecurity in healthcare: A systematic review of modern threats and trends.

    Science.gov (United States)

    Kruse, Clemens Scott; Frederick, Benjamin; Jacobson, Taylor; Monticone, D Kyle

    2017-01-01

    The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats. The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. The reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review. The analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code. The healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.

  3. System simulation on fractionation radiation doses and radioisotope handling in Nuclear medicine

    International Nuclear Information System (INIS)

    Dytz, Aline Guerra; Dullius, Marcos Alexandre; Gomes, Camila e Silva

    2008-01-01

    This paper describes the practical and theoretical learning of students from Medical Physics course at the Fundacao Universidade Federal do Rio Grande (FURG) on fractionation radiation doses, radioisotope handling and elution of molybdenum generators (Mo-99) / technetium (Tc -99m)

  4. Stereotype threat and lift effects in motor task performance: the mediating role of somatic and cognitive anxiety.

    Science.gov (United States)

    Laurin, Raphael

    2013-01-01

    The aim of this investigation was to replicate the stereotype threat and lift effects in a motor task in a neutral sex-typed activity, using somatic and cognitive anxiety as key mediators of these phenomena. It was hypothesized that an ingroup/outgroup social categorization based on gender would have distinctive effects for female and male participants. A total of 161 French physical education students were randomly assigned to three threat conditions--no threat, female threat, and male threat--thus leading to a 3 x 2 (threat by gender) design. The analyses revealed a stereotype lift effect on the performances for both male and female participants, as well as a stereotype threat effect only for female participants. They also indicated that somatic anxiety had a mediating effect on the performance of female participants targeted by a negative stereotype, but that it had a facilitating effect on their performance. The stereotype threat and lift effects on motor tasks were replicated in a neutral sex-typed activity and somatic anxiety seems to have a facilitating mediating effect of the relationships between the gender-conditions (control or female threat) interaction and free-throw performance. The model used to distinguish somatic and cognitive anxiety appeared to be a relevant means of explaining the stereotype threat and lift mechanisms.

  5. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  6. Narcissism and other-derogation in the absence of ego threat.

    Science.gov (United States)

    Park, Sun W; Colvin, C Randall

    2015-06-01

    The relation between narcissism and other-derogation has been examined primarily in the context of ego threat. In three studies, we investigated whether narcissistic individuals derogate others in the absence of ego threat. In Study 1, 79 judges watched four videotaped dyadic interactions and rated the personality of the same four people. In Study 2, 66 judges rated the personality of a friend. In Study 3, 72 judges considered the average Northeastern University student and rated the personality of this hypothetical person. Across the three studies, targets' personality characteristics were described on the 100-item California Adult Q-Sort (CAQ; Block, 2008). Judges' ratings of targets were compared to a CAQ prototype of the optimally adjusted person to assess target-derogation. Judges' narcissism and other-derogation were positively related in Studies 1 and 2. Narcissism positively predicted and self-esteem negatively predicted target-derogation after controlling for each other in Study 3. Narcissistic individuals derogate others more than non-narcissistic individuals regardless of whether ego threat is present or absent. © 2014 Wiley Periodicals, Inc.

  7. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  8. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  9. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  10. Thinking about the threat of nuclear war: relevance to mental health

    International Nuclear Information System (INIS)

    Goldenberg, S.; LaCombe, S.; Levinson, D.; Parker, K.R.; Ross, C.; Sommers, F.

    1985-01-01

    Ontario students in grades 7-13 responded to open-ended and multiple-choice questions about future concerns, particularly unemployment, job/career plans, and the nuclear threat. Although worries about nuclear war were more frequent than those in other areas, their expression was associated with a sense of social efficacy rather than with feelings of helplessness

  11. Self-esteem, authoritarianism, and democratic values in the face of threat.

    Science.gov (United States)

    Shaffer, Barbara A; Hastings, Brad M

    2004-08-01

    This study investigated the associations among terrorist threat, right-wing authoritarianism, self-esteem, and their relations in support for democratic values. Students (n = 140) completed Altemeyer's Right-Wing Authoritarianism Scale, Rosenberg's Self-esteem Scale, and the Democratic Values Scale. The participants also read an editorial regarding the events of 9/11/01 and completed two mortality-salience questions to induce a sense of threat. Results showed that self-esteem was a significant contributor to the prediction of scores on the Democratic Values Scale. Furthermore, the interaction between self-esteem and right-wing authoritarianism explained significant variance in the Democratic Values Scale scores. The results are interpreted in light of theories addressing authoritarianism and self-esteem.

  12. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    Energy Technology Data Exchange (ETDEWEB)

    Pederson, Ann C. [ORNL; Snow, Catherine L. [ORNL; Townsend, Jeremy [ORNL; Shannon, Michael [ORNL

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  13. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  14. To What Degree Does Handling Concrete Molecular Models Promote the Ability to Translate and Coordinate between 2D and 3D Molecular Structure Representations? A Case Study with Algerian Students

    Science.gov (United States)

    Mohamed-Salah, Boukhechem; Alain, Dumon

    2016-01-01

    This study aims to assess whether the handling of concrete ball-and-stick molecular models promotes translation between diagrammatic representations and a concrete model (or vice versa) and the coordination of the different types of structural representations of a given molecular structure. Forty-one Algerian undergraduate students were requested…

  15. Women and Computers: Effects of Stereotype Threat on Attribution of Failure

    Science.gov (United States)

    Koch, Sabine C.; Muller, Stephanie M.; Sieverding, Monika

    2008-01-01

    This study investigated whether stereotype threat can influence women's attributions of failure in a computer task. Male and female college-age students (n = 86, 16-21 years old) from Germany were asked to work on a computer task and were hinted beforehand that in this task, either (a) men usually perform better than women do (negative threat…

  16. Safe Handling and Use of Flammable and Combustible Materials. Module SH-30. Safety and Health.

    Science.gov (United States)

    Center for Occupational Research and Development, Inc., Waco, TX.

    This student module on safe handling and use of flammable and combustible materials is one of 50 modules concerned with job safety and health. This module introduces the student to the hazards of flammable and combustible materials and the measures necessary to control those hazards. Following the introduction, 14 objectives (each keyed to a page…

  17. Recommendations for cask features for robotic handling from the Advanced Handling Technology Project

    International Nuclear Information System (INIS)

    Drotning, W.

    1991-02-01

    This report describes the current status and recent progress in the Advanced Handling Technology Project (AHTP) initiated to explore the use of advanced robotic systems and handling technologies to perform automated cask handling operations at radioactive waste handling facilities, and to provide guidance to cask designers on the impact of robotic handling on cask design. Current AHTP tasks have developed system mock-ups to investigate robotic manipulation of impact limiters and cask tiedowns. In addition, cask uprighting and transport, using computer control of a bridge crane and robot, were performed to demonstrate the high speed cask transport operation possible under computer control. All of the current AHTP tasks involving manipulation of impact limiters and tiedowns require robotic operations using a torque wrench. To perform these operations, a pneumatic torque wrench and control system were integrated into the tool suite and control architecture of the gantry robot. The use of captured fasteners is briefly discussed as an area where alternative cask design preferences have resulted from the influence of guidance for robotic handling vs traditional operations experience. Specific robotic handling experiences with these system mock-ups highlight a number of continually recurring design principles: (1) robotic handling feasibility is improved by mechanical designs which emphasize operation with limited dexterity in constrained workspaces; (2) clearances, tolerances, and chamfers must allow for operations under actual conditions with consideration for misalignment and imprecise fixturing; (3) successful robotic handling is enhanced by including design detail in representations for model-based control; (4) robotic handling and overall quality assurance are improved by designs which eliminate the use of loose, disassembled parts. 8 refs., 15 figs

  18. The role of ingroup threat and conservative ideologies on prejudice against immigrants in two samples of Italian adults.

    Science.gov (United States)

    Caricati, Luca; Mancini, Tiziana; Marletta, Giuseppe

    2017-01-01

    This research investigated the relationship among perception of ingroup threats (realistic and symbolic), conservative ideologies (social dominance orientation [SDO] and right-wing authoritarianism [RWA]), and prejudice against immigrants. Data were collected with a cross-sectional design in two samples: non-student Italian adults (n = 223) and healthcare professionals (n = 679). Results were similar in both samples and indicated that symbolic and realistic threats, as well as SDO and RWA, positively and significantly predicted anti-immigrant prejudice. Moreover, the model considering SDO and RWA as mediators of threats' effects on prejudice showed a better fit than the model in which ingroup threats mediated the effects of SDO and RWA on prejudice against immigrants. Accordingly, SDO and RWA partially mediated the effect of both symbolic and realistic threats, which maintained a significant effect on prejudice against immigrants, however.

  19. Stereotype Threat Vulnerability: A Psychometric Investigation of the Social Identities and Attitudes Scale

    Science.gov (United States)

    Smith, Leann V.; Cokley, Kevin

    2016-01-01

    The authors investigated the psychometric properties of the Social Identities and Attitudes Scale developed by Picho and Brown, which captures an individual's vulnerability to Stereotype Threat effects. Confirmatory factor analyses and group invariance tests conducted on a diverse sample of 516 college students revealed adequate reliability and…

  20. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  1. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  2. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  3. Threats of school violence in Pennsylvania after media coverage of the Columbine High School massacre: examining the role of imitation.

    Science.gov (United States)

    Kostinsky, S; Bixler, E O; Kettl, P A

    2001-09-01

    Following the April 20, 1999, massacre at Columbine High School, Littleton, Colo, school administrators, law enforcement officials, and the media reported a rash of successive bomb threats and threats of school violence that were attributed to imitation. To establish that the clustering of threats of school violence following the Columbine massacre was initiated by imitation. A database of threats of school violence reported to the Pennsylvania Emergency Management Agency, Harrisburg, during the 50 days following the Columbine incident was examined to determine the daily frequency of threats. To determine factors that predict the occurrence of these threats, counties and school districts in which threats occurred were noted. Pennsylvania school districts reported 354 threats of school violence during the 50 days after the Columbine massacre, far exceeding the 1 or 2 threats per year estimated by school administrators before 1999. The frequency of these threats over time demonstrated a crescendo-decrescendo pattern. Fifty-six percent of the threats were made on or before day 10 after the incident, and more than one third occurred on days 8, 9, and 10. Factors that predicted the likelihood of a school's receiving a threat after the massacre included a greater proportion of white students and larger school enrollment. Successive threats of violence follow a publicized act of school violence. The media should recognize that imitation threats can occur and craft their stories accordingly.

  4. Evaluating the police service quality for handling traffic crash reporting

    DEFF Research Database (Denmark)

    Janstrup, Kira Hyldekær; Kaplan, Sigal; Barfod, Michael Bruhn

    2017-01-01

    Purpose The phenomenon of traffic crash under-reporting has been extensively documented in terms of its extent, but not equally analysed in terms of its reasons. As police distrust has been recently identified as a major reason for crash under-reporting, the purpose of this paper is to look...... at the police service quality for handling the reporting of traffic crashes. Design/methodology/approach This study introduces a novel approach to evaluate service quality that combines multi-criteria decision analysis (MCDA) with latent class analysis (LCA). Moreover, this study presents the design of a web......-based survey on the basis of the SERVQUAL approach to detecting strengths, opportunities and threats with crash reporting to the police at a strategic level. Transportation stakeholders (e.g. researchers, authorities, consultants, NGO representatives, suppliers) with an interest in traffic safety in Denmark...

  5. Forewarning and Forearming Stereotype-Threatened Students

    Science.gov (United States)

    McGlone, Matthew S.; Aronson, Joshua

    2007-01-01

    This study investigated communicative strategies for helping female students cope with "stereotype threat". Participants completed a difficult math test after reading one of three coping messages: a control message encouraging perseverance, a "suppression" message describing stereotype threat and instructing participants to suppress associated…

  6. Threat-sensitive anti-intraguild predation behaviour: maternal strategies to reduce offspring predation risk in mites.

    Science.gov (United States)

    Walzer, Andreas; Schausberger, Peter

    2011-01-01

    Predation is a major selective force for the evolution of behavioural characteristics of prey. Predation among consumers competing for food is termed intraguild predation (IGP). From the perspective of individual prey, IGP differs from classical predation in the likelihood of occurrence because IG prey is usually more rarely encountered and less profitable because it is more difficult to handle than classical prey. It is not known whether IGP is a sufficiently strong force to evolve interspecific threat sensitivity in antipredation behaviours, as is known from classical predation, and if so whether such behaviours are innate or learned. We examined interspecific threat sensitivity in antipredation in a guild of predatory mite species differing in adaptation to the shared spider mite prey (i.e. Phytoseiulus persimilis, Neoseiulus californicus and Amblyseius andersoni). We first ranked the players in this guild according to the IGP risk posed to each other: A. andersoni was the strongest IG predator; P. persimilis was the weakest. Then, we assessed the influence of relative IGP risk and experience on maternal strategies to reduce offspring IGP risk: A. andersoni was insensitive to IGP risk. Threat sensitivity in oviposition site selection was induced by experience in P. persimilis but occurred independently of experience in N. californicus. Irrespective of experience, P. persimilis laid fewer eggs in choice situations with the high- rather than low-risk IG predator. Our study suggests that, similar to classical predation, IGP may select for sophisticated innate and learned interspecific threat-sensitive antipredation responses. We argue that such responses may promote the coexistence of IG predators and prey.

  7. Examining Recruitment and Retention Factors for Minority STEM Majors through a Stereotype Threat Lens

    Science.gov (United States)

    Meador, Audrey

    2018-01-01

    Prior research regarding minorities in the science, technology, engineering, and mathematics (STEM) fields indicated that the factors of peer support and participation in STEM-related activities contributed positively to minority students' recruitment and retention in these fields. Utilizing stereotype threat as a conceptual framework, this…

  8. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    Science.gov (United States)

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  9. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  10. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  11. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  12. Full scale tests on remote handled FFTF fuel assembly waste handling and packaging

    International Nuclear Information System (INIS)

    Allen, C.R.; Cash, R.J.; Dawson, S.A.; Strode, J.N.

    1986-01-01

    Handling and packaging of remote handled, high activity solid waste fuel assembly hardware components from spent FFTF reactor fuel assemblies have been evaluated using full scale components. The demonstration was performed using FFTF fuel assembly components and simulated components which were handled remotely using electromechanical manipulators, shielding walls, master slave manipulators, specially designed grapples, and remote TV viewing. The testing and evaluation included handling, packaging for current and conceptual shipping containers, and the effects of volume reduction on packing efficiency and shielding requirements. Effects of waste segregation into transuranic (TRU) and non-transuranic fractions also are discussed

  13. Minority Adolescents in Ethnically Diverse Schools: Perceptions of Equal Treatment Buffer Threat Effects

    Science.gov (United States)

    Baysu, Gülseli; Celeste, Laura; Brown, Rupert; Verschueren, Karine; Phalet, Karen

    2016-01-01

    Can perceptions of equal treatment buffer the negative effects of threat on the school success of minority students? Focusing on minority adolescents from Turkish and Moroccan heritage in Belgium (M[subscript age] = 14.5; N = 735 in 47 ethnically diverse schools), multilevel mediated moderation analyses showed: (a) perceived discrimination at…

  14. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  15. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  16. Law enforcers recognition level emerging threats based on physical appearance and behavior signs the enemy

    Directory of Open Access Journals (Sweden)

    R.M. Radzievskiy

    2015-02-01

    Full Text Available Purpose: examine the effectiveness of the training method of differential approach to the choice of means of influence on the action of law enforcers opponent with different levels of aggressiveness. Material : the experiment involved 15 students of the Kyiv National Academy of Internal Affairs and the 15 employees of the State Guard of Ukraine. Results : presented curriculum for special physical and tactical training. The program details the conceptual apparatus of THREATS and DANGERS manifestations of different levels of aggressiveness opponent (case analysis of its motor behavior. The study participants underwent 7 day course focused training. The basis of the course is an advanced theoretical base. The base is aimed at developing knowledge and skills of employees in determining the level of danger. Including threats from testing and modeling episodes of extreme situations the options cadets. Conclusions : In the simulated collision situations with aggressive opponent to the students significantly improved the adequacy of the response to the threat of execution time and within the legal grounds. Recognition was determined by the level of aggressiveness manifest manners enemy, his emotions, motivation, motor behavior, positional arrangement for 2 - 3 seconds. The program contributed to the development of qualities: attention, orientation, perception, motor lead.

  17. Ergonomic material-handling device

    Science.gov (United States)

    Barsnick, Lance E.; Zalk, David M.; Perry, Catherine M.; Biggs, Terry; Tageson, Robert E.

    2004-08-24

    A hand-held ergonomic material-handling device capable of moving heavy objects, such as large waste containers and other large objects requiring mechanical assistance. The ergonomic material-handling device can be used with neutral postures of the back, shoulders, wrists and knees, thereby reducing potential injury to the user. The device involves two key features: 1) gives the user the ability to adjust the height of the handles of the device to ergonomically fit the needs of the user's back, wrists and shoulders; and 2) has a rounded handlebar shape, as well as the size and configuration of the handles which keep the user's wrists in a neutral posture during manipulation of the device.

  18. Assessing Women's Responses to Sexual Threat: Validity of a Virtual Role-Play Procedure

    Science.gov (United States)

    Jouriles, Ernest N.; Rowe, Lorelei Simpson; McDonald, Renee; Platt, Cora G.; Gomez, Gabriella S.

    2011-01-01

    This study evaluated the validity of a role-play procedure that uses virtual reality technology to assess women's responses to sexual threat. Forty-eight female undergraduate students were randomly assigned to either a standard, face-to-face role-play (RP) or a virtual role-play (VRP) of a sexually coercive situation. A multimethod assessment…

  19. Design basis threat analysis and implementation of the physical protection system at Nuclear Facility of BATAN Yogyakarta

    International Nuclear Information System (INIS)

    Syarip

    2005-01-01

    An analysis to determine the design basis threat (DBT) and its follow-up through the implementation of physical protection system at the nuclear facility of BATAN Yogyakarta has been done. Methodology used for the analysis is based on the IAEA guidance for the development and maintenance of a DBT. Based on the analysis results, it can be concluded that the threat motivation is influenced by political situation (related to the government policy), criminal, sabotage and theft. The characteristics of threats are: not so well organized, terror, theft of materials information, involving insider (collusion), and intimidation to workers. Potential threat could from guests/students who take a practical job or laboratory exercise. Therefore, it is necessary to be anticipated the possibility and its impact of turmoil/demonstrators such as destruction of: lighting, road, fence, sabotage on the electric and communication lines, surrounding the Yogyakarta nuclear facility

  20. Stereotypes as stumbling-blocks: how coping with stereotype threat affects life outcomes for people with physical disabilities.

    Science.gov (United States)

    Silverman, Arielle M; Cohen, Geoffrey L

    2014-10-01

    Stereotype threat, the concern about being judged in light of negative stereotypes, causes underperformance in evaluative situations. However, less is known about how coping with stereotypes can aggravate underperformance over time. We propose a model in which ongoing stereotype threat experiences threaten a person's sense of self-integrity, which in turn prompts defensive avoidance of stereotype-relevant situations, impeding growth, achievement, and well-being. We test this model in an important but understudied population: the physically disabled. In Study 1, blind adults reporting higher levels of stereotype threat reported lower self-integrity and well-being and were more likely to be unemployed and to report avoiding stereotype-threatening situations. In Study 2's field experiment, blind students in a compensatory skill-training program made more progress if they had completed a values-affirmation, an exercise that bolsters self-integrity. The findings suggest that stereotype threat poses a chronic threat to self-integrity and undermines life outcomes for people with disabilities. © 2014 by the Society for Personality and Social Psychology, Inc.

  1. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  2. Layoffs and tradeoffs: production, quality, and safety demands under the threat of job loss.

    Science.gov (United States)

    Probst, Tahira M

    2002-07-01

    Employees often face a conflict between production targets, quality assurance, and adherence to safety policies. In a time when layoffs are on the rise, it is important to understand the effects of employee job insecurity on these potentially competing demands. A laboratory experiment manipulated the threat of layoffs in a simulated organization and assessed its effect on employee productivity, product quality, and adherence to safety policies. Results suggest that student participants faced with the threat of layoffs were more productive, yet violated more safety rules and produced lower quality outputs, than participants in the control condition. Implications for organizations contemplating layoffs and directions for future research are discussed.

  3. Threat-related amygdala activity is associated with peripheral CRP concentrations in men but not women

    Science.gov (United States)

    Swartz, Johnna R.; Prather, Aric A.; Hariri, Ahmad R.

    2017-01-01

    Increased levels of peripheral inflammatory markers, including C-Reactive Protein (CRP), are associated with increased risk for depression, anxiety, and suicidality. The brain mechanisms that may underlie the association between peripheral inflammation and internalizing problems remain to be determined. The present study examines associations between peripheral CRP concentrations and threat-related amygdala activity, a neural biomarker of depression and anxiety risk, in a sample of 172 young adult undergraduate students. Participants underwent functional MRI scanning while performing an emotional face matching task to obtain a measure of threat-related amygdala activity to angry and fearful faces; CRP concentrations were assayed from dried blood spots. Results indicated a significant interaction between CRP and sex: in men, but not women, higher CRP was associated with higher threat-related amygdala activity. These results add to the literature finding associations between systemic levels of inflammation and brain function and suggest that threat-related amygdala activity may serve as a potential pathway through which heightened chronic inflammation may increase risk for mood and anxiety problems. PMID:28183031

  4. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  5. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  6. Increased risk of sadness and suicidality among victims of bullying experiencing additional threats to physical safety.

    Science.gov (United States)

    Pham, Tammy B; Adesman, Andrew

    2017-11-23

    Objective To examine, in a nationally-representative sample of high school students, to what extent one or more additional threats to physical safety exacerbates the risk of sadness and suicidality among victims of school and/or cyber-bullying. Methods National data from the 2015 Youth Risk Behavior Survey (YRBS) were analyzed for grades 9-12 (n = 15,624). Victimization groups were characterized by school-bullying and cyber-bullying, with and without additional threats to physical safety: fighting at school, being threatened/injured at school, and skipping school out of fear for one's safety. Outcomes included 2-week sadness and suicidality. Outcomes for victimization groups were compared to non-victims using logistic regression adjusting for sex, grade and race/ethnicity. Results Overall, 20.2% of students were school-bullied, and 15.5% were cyber-bullied in the past year. Compared to non-victims, victims of school-bullying and victims of cyber-bullying (VoCBs) who did not experience additional threats to physical safety were 2.76 and 3.83 times more likely to report 2-week sadness, and 3.39 and 3.27 times more likely to exhibit suicidality, respectively. Conversely, victims of bullying who experienced one or more additional threats to physical safety were successively more likely to report these adverse outcomes. Notably, victims of school-bullying and VoCBs with all three additional risk factors were 13.13 and 17.75 times more likely to exhibit suicidality, respectively. Conclusion Risk of depression symptoms and suicidality among victims of school-bullying and/or cyber-bullying is greatly increased among those who have experienced additional threats to physical safety: fighting at school, being threatened/injured at school and skipping school out of fear for their safety.

  7. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  8. 30o inclination in handles of plastic boxes can reduce postural and muscular workload during handling

    Directory of Open Access Journals (Sweden)

    Luciana C. C. B. Silva

    2013-06-01

    Full Text Available BACKGROUND: The handling of materials, which occurs in the industrial sector, is associated with lesions on the lumbar spine and in the upper limbs. Inserting handles in industrial boxes is a way to reduce work-related risks. Although the position and angle of the handles are significant factors in comfort and safety during handling, these factors have rarely been studied objectively. OBJECTIVE: To compare the handling of a commercial box and prototypes with handles and to evaluate the effects on upper limb posture, muscle electrical activity, and perceived acceptability using different grips while handling materials from different heights. METHOD: Thirty-seven healthy volunteers evaluated the handles of prototypes that allowed for changes in position (top and bottom and angle (0°, 15°, and 30°. Wrist, elbow, and shoulder movements were evaluated using electrogoniometry and inclinometry. The muscle electrical activity in the wrist extensors, biceps brachii, and the upper portion of the trapezius was measured using a portable electromyographer. The recorded data on muscle movements and electrical activity were synchronized. Subjective evaluations of acceptability were evaluated using a visual analog scale. RESULTS AND CONCLUSIONS: The prototypes with handles at a 30° angle produced the highest acceptability ratings, more neutral wrist positions, lower levels of electromyographic activity for the upper trapezius, and lower elevation angles for the arms. The different measurement methods were complementary in evaluating the upper limbs during handling.

  9. New transport and handling contract

    CERN Multimedia

    SC Department

    2008-01-01

    A new transport and handling contract entered into force on 1.10.2008. As with the previous contract, the user interface is the internal transport/handling request form on EDH: https://edh.cern.ch/Document/TransportRequest/ To ensure that you receive the best possible service, we invite you to complete the various fields as accurately as possible and to include a mobile telephone number on which we can reach you. You can follow the progress of your request (schedule, completion) in the EDH request routing information. We remind you that the following deadlines apply: 48 hours for the transport of heavy goods (up to 8 tonnes) or simple handling operations 5 working days for crane operations, transport of extra-heavy goods, complex handling operations and combined transport and handling operations in the tunnel. For all enquiries, the number to contact remains unchanged: 72202. Heavy Handling Section TS-HE-HH 72672 - 160319

  10. Technology transfer - insider protection workshop (Safeguards Evaluation Method - Insider Threat)

    International Nuclear Information System (INIS)

    Strait, R.S.; Renis, T.A.

    1986-01-01

    The Safeguards Evaluation Method - Insider Threat, developed by Lawrence Livermore National Laboratory, is a field-applicable tool to evaluate facility safeguards against theft or diversion of special nuclear material (SNM) by nonviolent insiders. To ensure successful transfer of this technology from the laboratory to DOE field offices and contractors, LLNL developed a three-part package. The package includes a workbook, user-friendly microcomputer software, and a three-day training program. The workbook guides an evaluation team through the Safeguards Evaluation Method and provides forms for gathering data. The microcomputer software assists in the evaluation of safeguards effectiveness. The software is designed for safeguards analysts with no previous computer experience. It runs on an IBM Personal Computer or any compatible machine. The three-day training program is called the Insider Protection Workshop. The workshop students learn how to use the workbook and the computer software to assess insider vulnerabilities and to evaluate the benefits and costs of potential improvements. These activities increase the students' appreciation of the insider threat. The workshop format is informal and interactive, employing four different instruction modes: classroom presentations, small-group sessions, a practical exercise, and ''hands-on'' analysis using microcomputers. This approach to technology transfer has been successful: over 100 safeguards planners and analysts have been trained in the method, and it is being used at facilities through the DOE complex

  11. Being smart or getting smarter: Implicit theory of intelligence moderates stereotype threat and stereotype lift effects.

    Science.gov (United States)

    Froehlich, Laura; Martiny, Sarah E; Deaux, Kay; Goetz, Thomas; Mok, Sog Yee

    2016-09-01

    This research explores implicit theory of intelligence (TOI) as a moderator of stereotype activation effects on test performance for members of negatively stereotyped and of favourably stereotyped groups. In Germany, Turkish-origin migrants are stereotyped as low in verbal ability. We predicted that on a test diagnostic of verbal intelligence, endorsement of an entity TOI predicts stereotype threat effects for Turkish-origin students and stereotype lift effects for German students. This effect could account for some of the performance gap between immigrants and host society members after stereotype activation. Study 1 (N = 107) established structural equivalence of implicit theories across the ethnic groups. In two experimental studies (Study 2: N = 182, Study 3: N = 190), we tested the moderating effect of TOI in a 2 (stereotype activation: diagnostic vs. non-diagnostic test) × 2 (ethnicity: German vs. Turkish migration background) experimental design. The results showed that when the test was described as diagnostic of verbal intelligence, higher entity theory endorsement predicted stereotype threat effects for Turkish-origin students (Study 2 and Study 3) and stereotype lift effects for German students (Study 3). The results are discussed in terms of practical implications for educational settings and theoretical implications for processes underlying stereotype activation effects. © 2016 The British Psychological Society.

  12. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Teaching Positioning and Handling Techniques to Public School Personnel through Inservice Training. Brief Report.

    Science.gov (United States)

    Inge, Katherine J.; Snell, Martha E.

    1985-01-01

    Two teachers were taught positioning and handling techniques using written task analyses, demonstrations by an occupational therapist, verbal and modeling prompts, corrective feedback, and praise. Training took place in the natural school environment, during school hours, and with students that the teachers taught. A functional relationship…

  14. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  15. Trends in Modern Exception Handling

    Directory of Open Access Journals (Sweden)

    Marcin Kuta

    2003-01-01

    Full Text Available Exception handling is nowadays a necessary component of error proof information systems. The paper presents overview of techniques and models of exception handling, problems connected with them and potential solutions. The aspects of implementation of propagation mechanisms and exception handling, their effect on semantics and general program efficiency are also taken into account. Presented mechanisms were adopted to modern programming languages. Considering design area, formal methods and formal verification of program properties we can notice exception handling mechanisms are weakly present what makes a field for future research.

  16. Using the Internet, Online Social Networks and Potentially Incurred Risk: Student Opinions

    Directory of Open Access Journals (Sweden)

    Gintautė Žibėnienė

    2013-08-01

    Full Text Available Regulation of harmful content on the Internet is a soaring problem in the expansion of the information society, and it is being discussed in different European countries. Therefore, it is important to discuss the issue of being safe online: to do research on what children think about when using the Internet, threats experienced while online, to discuss ways of recognising and protecting children from online threats (such as cyber bullying, bullying, abuse, temptations with purpose of sexual harassment, leaking of personal information, spreading, harmful and illegal Internet content, etc.. The research objective of this paper is to present the opinion of gymnasium students on using the Internet, online social networks and likely experienced threats. The methodology—opinion research of the gymnasium students, which was carried out 17–21 December 2012; an analysis of professional target publications and a questionnaire survey were also applied. Analysis of the research findings was based on the analysis methods of quantity analysis (descriptive and analysis of quality content. Statistical findings were analysed applying the software “Statistical Package for the Social Sciences (SPSS 21.0 for Windows.” According to the research of student opinion, it was revealed that the most common student online activities are browsing of chat websites, exchange of videos and other material, viewing, listening and participating in social networks, whereas erotica and viewing of pornography are the rarest activities and are unimportant for students. Online social networks are especially popular among students, as most interviewed students (95.3% have their own profile in social networks. Students mostly visit social networks to communicate, to make friends (77.1% of respondents, however, every second student (60.7% visits them just to spend time, which can be assumed about the problems of students’ leisure time. The vast majority of students think that

  17. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  18. Remote handling machines

    International Nuclear Information System (INIS)

    Sato, Shinri

    1985-01-01

    In nuclear power facilities, the management of radioactive wastes is made with its technology plus the automatic techniques. Under the radiation field, the maintenance or aid of such systems is important. To cope with this situation, MF-2 system, MF-3 system and a manipulator system as remote handling machines are described. MF-2 system consists of an MF-2 carrier truck, a control unit and a command trailer. It is capable of handling heavy-weight objects. The system is not by hydraulic but by electrical means. MF-3 system consists of a four-crawler truck and a manipulator. The truck is versatile in its posture by means of the four independent crawlers. The manipulator system is bilateral in operation, so that the delicate handling is made possible. (Mori, K.)

  19. Threats and Supports to Female Students' Math Beliefs and Achievement.

    Science.gov (United States)

    McKellar, Sarah E; Marchand, Aixa D; Diemer, Matthew A; Malanchuk, Oksana; Eccles, Jacquelynne S

    2018-03-23

    This study examines how student perceptions of teacher practices contribute to female high school students' math beliefs and achievement. Guided by the expectancy-value framework, we hypothesized that students' motivation beliefs and achievement outcomes in mathematics are fostered by teachers' emphasis on the relevance of mathematics and constrained by gender-based differential treatment. To examine these questions, structural equation modeling was applied to a longitudinal panel of 518 female students from the Maryland Adolescent Development in Context Study. While controlling for prior achievement and race, gendered differential treatment was negatively associated with math beliefs and achievement, whereas relevant math instruction was positively associated with these outcomes. These findings suggest inroads that may foster positive math motivational beliefs and achievement among young women. © 2018 Society for Research on Adolescence.

  20. Food Insecurity as a Student Issue

    Science.gov (United States)

    Cady, Clare L.

    2014-01-01

    Food insecurity is a threat to student success on college campuses in the United States. It has the potential to impact academics, wellness, and behavior--all factors that have bearing on student retention and graduation rates. This article reviews the literature on food insecurity among college students, utilizing research on hunger and…

  1. "Sorry" does not pay my bills. The handling of complaints in everyday interaction and cross-cultural business interaction

    DEFF Research Database (Denmark)

    Trosborg, Anna; Shaw, Philip

    1998-01-01

    This article is concerned with the teaching of pragmatic functions when training students for a future career in intercultural business communications. Having outlined six important constellations likely to result in success or failure, we focus on strategies for the successful handling of custom...... complaints seen in comparison with responses to complaints in everyday interactions. It is suggested that transfer of behaviour considered suitable in everyday face-to-face interactions to business interaction may lead to unsuccessful processing of customer complaints.......This article is concerned with the teaching of pragmatic functions when training students for a future career in intercultural business communications. Having outlined six important constellations likely to result in success or failure, we focus on strategies for the successful handling of customer...

  2. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  3. Safety of Cargo Aircraft Handling Procedure

    Directory of Open Access Journals (Sweden)

    Daniel Hlavatý

    2017-07-01

    Full Text Available The aim of this paper is to get acquainted with the ways how to improve the safety management system during cargo aircraft handling. The first chapter is dedicated to general information about air cargo transportation. This includes the history or types of cargo aircraft handling, but also the means of handling. The second part is focused on detailed description of cargo aircraft handling, including a description of activities that are performed before and after handling. The following part of this paper covers a theoretical interpretation of safety, safety indicators and legislative provisions related to the safety of cargo aircraft handling. The fourth part of this paper analyzes the fault trees of events which might occur during handling. The factors found by this analysis are compared with safety reports of FedEx. Based on the comparison, there is a proposal on how to improve the safety management in this transportation company.

  4. Spontaneous default mode network phase-locking moderates performance perceptions under stereotype threat.

    Science.gov (United States)

    Forbes, Chad E; Leitner, Jordan B; Duran-Jordan, Kelly; Magerman, Adam B; Schmader, Toni; Allen, John J B

    2015-07-01

    This study assessed whether individual differences in self-oriented neural processing were associated with performance perceptions of minority students under stereotype threat. Resting electroencephalographic activity recorded in white and minority participants was used to predict later estimates of task errors and self-doubt on a presumed measure of intelligence. We assessed spontaneous phase-locking between dipole sources in left lateral parietal cortex (LPC), precuneus/posterior cingulate cortex (P/PCC), and medial prefrontal cortex (MPFC); three regions of the default mode network (DMN) that are integral for self-oriented processing. Results revealed that minorities with greater LPC-P/PCC phase-locking in the theta band reported more accurate error estimations. All individuals experienced less self-doubt to the extent they exhibited greater LPC-MPFC phase-locking in the alpha band but this effect was driven by minorities. Minorities also reported more self-doubt to the extent they overestimated errors. Findings reveal novel neural moderators of stereotype threat effects on subjective experience. Spontaneous synchronization between DMN regions may play a role in anticipatory coping mechanisms that buffer individuals from stereotype threat. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  5. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  6. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  7. Impact of Economic Hardship and Financial Threat on Suicide Ideation and Confusion.

    Science.gov (United States)

    Fiksenbaum, Lisa; Marjanovic, Zdravko; Greenglass, Esther; Garcia-Santos, Francisco

    2017-07-04

    The present study tested the extent to which perceived economic hardship is associated with psychological distress (suicide ideation and confusion) after controlling for personal characteristics. It also explored whether perceived financial threat (i.e., fearful anxious-uncertainty about the stability and security of one's personal financial situation) mediates the relationship between economic hardship and psychological distress outcomes. The theoretical model was tested in a sample of Canadian students (n = 211) and was validated in a community sample of employed Portuguese adults (n = 161). In both samples, the fit of the model was good. Parameter estimates indicated that greater experience of economic hardship increased with financial threat, which in turn increased with levels of suicide ideation and confusion. We discuss the practical implications of these results, such as for programs aimed at alleviating the burden of financial hardship, in our concluding remarks.

  8. Ergonomics and patient handling.

    Science.gov (United States)

    McCoskey, Kelsey L

    2007-11-01

    This study aimed to describe patient-handling demands in inpatient units during a 24-hour period at a military health care facility. A 1-day total population survey described the diverse nature and impact of patient-handling tasks relative to a variety of nursing care units, patient characteristics, and transfer equipment. Productivity baselines were established based on patient dependency, physical exertion, type of transfer, and time spent performing the transfer. Descriptions of the physiological effect of transfers on staff based on patient, transfer, and staff characteristics were developed. Nursing staff response to surveys demonstrated how patient-handling demands are impacted by the staff's physical exertion and level of patient dependency. The findings of this study describe the types of transfers occurring in these inpatient units and the physical exertion and time requirements for these transfers. This description may guide selection of the most appropriate and cost-effective patient-handling equipment required for specific units and patients.

  9. Equipment for the handling of thorium materials

    International Nuclear Information System (INIS)

    Heisler, S.W. Jr.; Mihalovich, G.S.

    1988-01-01

    The Feed Materials Production Center (FMPC) is the United States Department of Energy's storage facility for thorium. FMPC thorium handling and overpacking projects ensure the continued safe handling and storage of the thorium inventory until final disposition of the materials is determined and implemented. The handling and overpacking of the thorium materials requires the design of a system that utilizes remote handling and overpacking equipment not currently utilized at the FMPC in the handling of uranium materials. The use of remote equipment significantly reduces radiation exposure to personnel during the handling and overpacking efforts. The design system combines existing technologies from the nuclear industry, the materials processing and handling industry and the mining industry. The designed system consists of a modified fork lift truck for the transport of thorium containers, automated equipment for material identification and inventory control, and remote handling and overpacking equipment for material identification and inventory control, and remote handling and overpacking equipment for repackaging of the thorium materials

  10. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  11. How to Handle Abuse

    Science.gov (United States)

    ... Handle Abuse KidsHealth / For Kids / How to Handle Abuse What's in this article? Tell Right Away How Do You Know Something Is Abuse? ... babysitter, teacher, coach, or a bigger kid. Child abuse can happen anywhere — at ... building. Tell Right Away A kid who is being seriously hurt ...

  12. Nuclear threats in the vicinity of the Nordic countries. Supplementary final report of the Nordic Nuclear Safety research

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.

    2006-04-01

    The purpose of this project was to continue the cross-disciplinary study SBA-1 'base of knowledge' in the NKS research program 1998-2001 regarding possible nuclear threats in the vicinity of the Nordic countries. The main task for the project was to expand and envelope this database. Finding information to be placed in the database and identifying and filling gaps in knowledge were prioritised. This is a continuous process which extends beyond the end of this project, in order to have an operating and updated database also in the years to come. In this project work has been done making information systems in Norway that can take care of the database in the future. The scope of the preceding project was to prepare a base of knowledge regarding possible nuclear threats in the vicinity of the Nordic countries. The database, including a literature database, is presented on the website 'Nuclear threats in the vicinity of the Nordic Countries'. The utilisation of modern information technology gives the user of the database easy access to information on different types of nuclear installations and threats. The project focused on potential events at nuclear installations and the consequences for the Nordic countries, especially with regards to vulnerable food chains, doses to man, environmental contamination and emergency preparedness systems. The geographical area dealt with includes North-west Russia and the Baltic states and the nuclear installations investigated are nuclear power plants, ship reactors and storage and handling of used fuel and radioactive waste. (au)

  13. Waste Handling Building Conceptual Study

    International Nuclear Information System (INIS)

    G.W. Rowe

    2000-01-01

    The objective of the ''Waste Handling Building Conceptual Study'' is to develop proposed design requirements for the repository Waste Handling System in sufficient detail to allow the surface facility design to proceed to the License Application effort if the proposed requirements are approved by DOE. Proposed requirements were developed to further refine waste handling facility performance characteristics and design constraints with an emphasis on supporting modular construction, minimizing fuel inventory, and optimizing facility maintainability and dry handling operations. To meet this objective, this study attempts to provide an alternative design to the Site Recommendation design that is flexible, simple, reliable, and can be constructed in phases. The design concept will be input to the ''Modular Design/Construction and Operation Options Report'', which will address the overall program objectives and direction, including options and issues associated with transportation, the subsurface facility, and Total System Life Cycle Cost. This study (herein) is limited to the Waste Handling System and associated fuel staging system

  14. Practices of Handling

    DEFF Research Database (Denmark)

    Ræbild, Ulla

    to touch, pick up, carry, or feel with the hands. Figuratively it is to manage, deal with, direct, train, or control. Additionally, as a noun, a handle is something by which we grasp or open up something. Lastly, handle also has a Nordic root, here meaning to trade, bargain or deal. Together all four...... meanings seem to merge in the fashion design process, thus opening up for an embodied engagement with matter that entails direction giving, organizational management and negotiation. By seeing processes of handling as a key fashion methodological practice, it is possible to divert the discourse away from...... introduces four ways whereby fashion designers apply their own bodies as tools for design; a) re-activating past garment-design experiences, b) testing present garment-design experiences c) probing for new garment-design experiences and d) design of future garment experiences by body proxy. The paper...

  15. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  16. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  17. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  18. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  19. Didactical Handling of Students' Reasoning Processes in Problem Solving Situations

    Science.gov (United States)

    Brousseau, Guy; Gibel, Patrick

    2005-01-01

    In this paper, we analyze an investigative situation proposed to a class of 5th graders in a primary school. The situation is based on the following task: In a sale with group rates on a sliding scale, the students must find the lowest possible purchase price for a given number of tickets. A study of students' arguments made it possible to…

  20. SRV-automatic handling device

    International Nuclear Information System (INIS)

    Yamada, Koji

    1987-01-01

    Automatic handling device for the steam relief valves (SRV's) is developed in order to achieve a decrease in exposure of workers, increase in availability factor, improvement in reliability, improvement in safety of operation, and labor saving. A survey is made during a periodical inspection to examine the actual SVR handling operation. An SRV automatic handling device consists of four components: conveyor, armed conveyor, lifting machine, and control/monitoring system. The conveyor is so designed that the existing I-rail installed in the containment vessel can be used without any modification. This is employed for conveying an SRV along the rail. The armed conveyor, designed for a box rail, is used for an SRV installed away from the rail. By using the lifting machine, an SRV installed away from the I-rail is brought to a spot just below the rail so that the SRV can be transferred by the conveyor. The control/monitoring system consists of a control computer, operation panel, TV monitor and annunciator. The SRV handling device is operated by remote control from a control room. A trial equipment is constructed and performance/function testing is carried out using actual SRV's. As a result, is it shown that the SRV handling device requires only two operators to serve satisfactorily. The required time for removal and replacement of one SRV is about 10 minutes. (Nogami, K.)

  1. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  2. Grain Handling and Storage.

    Science.gov (United States)

    Harris, Troy G.; Minor, John

    This text for a secondary- or postecondary-level course in grain handling and storage contains ten chapters. Chapter titles are (1) Introduction to Grain Handling and Storage, (2) Elevator Safety, (3) Grain Grading and Seed Identification, (4) Moisture Control, (5) Insect and Rodent Control, (6) Grain Inventory Control, (7) Elevator Maintenance,…

  3. Communicating Gender-Equality Progress, Reduces Social Identity Threats for Women Considering a Research Career

    Directory of Open Access Journals (Sweden)

    Una Tellhed

    2018-01-01

    Full Text Available Since the majority of top-level researchers are men, how does this vertical gender-segregation affect students’ perceptions of a research career? In the current study, an experimental manipulation either reminded students of academia’s current dominance of men or of its improving gender-balance. The results showed that women primed with the dominance of men anticipated much higher social identity threats (e.g., fear of discrimination in a future research career as compared to a control group. In contrast, women primed with the improving gender-balance anticipated much lower threat. Further, the dominance of men prime increased men’s interest in the PhD program, as compared to controls. Women’s interest was unaffected by the prime, but their lower interest as compared to men’s across conditions was mediated by their lower research self-efficacy (i.e., competence beliefs. The results imply that communicating gender-equality progress may allow women to consider a career in research without the barrier of social identity threat.

  4. Students' experiences of challenges and threats in changing ...

    African Journals Online (AJOL)

    Students at higher education institutions in South Africa are exposed to changing epistemic contexts and postures. The concept "epistemic posture" refers to the ways in which human beings "do knowing" and the presuppositions they have about the "epistemic meta-narrative" (Newman & Holzman 1997:7). Not taking it for ...

  5. TRANSPORT/HANDLING REQUESTS

    CERN Multimedia

    Groupe ST/HM

    2002-01-01

    A new EDH document entitled 'Transport/Handling Request' will be in operation as of Monday, 11th February 2002, when the corresponding icon will be accessible from the EDH desktop, together with the application instructions. This EDH form will replace the paper-format transport/handling request form for all activities involving the transport of equipment and materials. However, the paper form will still be used for all vehicle-hire requests. The introduction of the EDH transport/handling request form is accompanied by the establishment of the following time limits for the various services concerned: 24 hours for the removal of office items, 48 hours for the transport of heavy items (of up to 6 metric tons and of standard road width), 5 working days for a crane operation, extra-heavy transport operation or complete removal, 5 working days for all transport operations relating to LHC installation. ST/HM Group, Logistics Section Tel: 72672 - 72202

  6. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  7. Recruitment Of International Students Into Cameroon Tertiary ...

    African Journals Online (AJOL)

    Recruitment Of International Students Into Cameroon Tertiary Institutions In The Absence Of International Offices. ... The present system of recruiting international students is haphazardly been handled by ... AJOL African Journals Online.

  8. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  9. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  10. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  11. Sexual-Reproductive Health Belief Model of college students

    Directory of Open Access Journals (Sweden)

    Masoomeh Simbar

    2004-09-01

    Full Text Available Sexual- reproductive health of youth is one of the most unknown aspects of our community, while the world, including our country is faced with the risk of AIDS spreading. The aim of this study was to describe Health Belief Model (HBM of the students about sexual-reproductive health behaviors and evaluate the ability of the model in predicting related behaviors. By using quota sampling, 1117 male and female students of Qazvin Medical Science and International universities were included in the study in 1991. A self-completed questionnaire was prepared containing close questions based on HBM components including perceived threats (susceptibility and severity of related diseases, perceived reproductive benefits and barriers and self efficacy of youth about reproductive health. A total of 645 of participants were female and 457 were male (Mean age 21.4±2.4 and 22.7±3.5, respectively. The Health Belief Model of the students showed that they perceived a moderate threat for AIDS and venereal diseases and their health outcomes. Most of them perceived the benefits of reproductive health behaviors. They believed that the ability of youth in considering reproductive health is low or moderate. However, they noted to some barriers for spreading of reproductive health in youth including inadequacy of services. Boys felt a higher level of threat for acquiring the AIDS and venereal diseases in compare to girls, but girls had a higher knowledge about these diseases and their complications. The Health Belief Model of the students with premarital intercourse behavior was not significantly different with the students without this behavior (Mann-Withney, P<0.05. Female students and the students without the history of premarital intercourse had significantly more positive attitude towards abstinence, comparing to male students and students with the history of premarital intercourse, respectively (Mann-Withney, P<0.05. Seventy five percent of students believed in

  12. Cask system design guidance for robotic handling

    International Nuclear Information System (INIS)

    Griesmeyer, J.M.; Drotning, W.D.; Morimoto, A.K.; Bennett, P.C.

    1990-10-01

    Remote automated cask handling has the potential to reduce both the occupational exposure and the time required to process a nuclear waste transport cask at a handling facility. The ongoing Advanced Handling Technologies Project (AHTP) at Sandia National Laboratories is described. AHTP was initiated to explore the use of advanced robotic systems to perform cask handling operations at handling facilities for radioactive waste, and to provide guidance to cask designers regarding the impact of robotic handling on cask design. The proof-of-concept robotic systems developed in AHTP are intended to extrapolate from currently available commercial systems to the systems that will be available by the time that a repository would be open for operation. The project investigates those cask handling operations that would be performed at a nuclear waste repository facility during cask receiving and handling. The ongoing AHTP indicates that design guidance, rather than design specification, is appropriate, since the requirements for robotic handling do not place severe restrictions on cask design but rather focus on attention to detail and design for limited dexterity. The cask system design features that facilitate robotic handling operations are discussed, and results obtained from AHTP design and operation experience are summarized. The application of these design considerations is illustrated by discussion of the robot systems and their operation on cask feature mock-ups used in the AHTP project. 11 refs., 11 figs

  13. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  14. Production management of window handles

    Directory of Open Access Journals (Sweden)

    Manuela Ingaldi

    2014-12-01

    Full Text Available In the chapter a company involved in the production of aluminum window and door handles was presented. The main customers of the company are primarily companies which produce PCV joinery and wholesalers supplying these companies. One chosen product from the research company - a single-arm pin-lift window handle - was described and its production process depicted technologically. The chapter also includes SWOT analysis conducted in the research company and the value stream of the single-arm pin-lift window handle.

  15. 7 CFR 58.443 - Whey handling.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Whey handling. 58.443 Section 58.443 Agriculture... Procedures § 58.443 Whey handling. (a) Adequate sanitary facilities shall be provided for the handling of whey. If outside, necessary precautions shall be taken to minimize flies, insects and development of...

  16. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  17. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  18. Strengths Weaknesses Opportunities and Threats of Blended Learning: Students’ Perceptions

    Science.gov (United States)

    Hande, S

    2014-01-01

    Background: Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. Aim: The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. Subjects and Methods: It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students’ perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. Results: The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. Conclusions: The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach. PMID:24971204

  19. Development of commercial robots for radwaste handling

    International Nuclear Information System (INIS)

    Colborn, K.A.

    1988-01-01

    The cost and dose burden associated with low level radwaste handling activities is a matter of increasing concern to the commercial nuclear power industry. This concern is evidenced by the fact that many utilities have begun to revaluate waste generation, handling, and disposal activities at their plants in an effort to improve their overall radwaste handling operations. This paper reports on the project Robots for Radwaste Handling, to identify the potential of robots to improve radwaste handling operations. The project has focussed on the potential of remote or automated technology to improve well defined, recognizable radwaste operations. The project focussed on repetitive, low skill level radwaste handling and decontamination tasks which involve significant radiation exposure

  20. Association of life threat and betrayal with posttraumatic stress disorder symptom severity.

    Science.gov (United States)

    Kelley, Lance P; Weathers, Frank W; Mason, Elizabeth A; Pruneau, Genevieve M

    2012-08-01

    The Diagnostic and Statistical Manual of Mental Disorders (4th ed., text rev.; DSM-IV-TR; American Psychiatric Association [APA], 2000) emphasizes life threat as the defining feature of psychological trauma. Recent theoretical and empirical work, however, indicates the need to identify and evaluate other key aspects of trauma. Betrayal has been proposed as a pertinent, distinct, and complementary factor that can explain effects of trauma not accounted for by life threat alone. This study examined the relationship between injury, perceived life threat (PLT), and betrayal with posttraumatic stress disorder (PTSD) symptom severity. Trauma-exposed college students (N = 185) completed self-report measures of trauma exposure and PTSD, as well as items regarding life threat, betrayal, and level of medical care received. In hierarchical regressions incorporating injury, PLT, and betrayal, betrayal was associated with all PTSD symptom clusters and PTSD total severity (f(2) = .08), whereas PLT was associated with hyperarousal (f(2) = .05) and PTSD total (f(2) = .03), and injury had no association with PTSD symptoms. In a revised model with trauma type as an additional variable, betrayal was associated with avoidance (f(2) = .03), numbing (f(2) = .04), and PTSD total (f(2) = .03), whereas PLT was associated with reexperiencing (f(2) = .04), hyperarousal (f(2) = .04), and PTSD total (f(2) = .03), and injury was associated with avoidance (f(2) = .03). These findings support the idea that betrayal is a core dimension of psychological trauma that may play an important role in the etiology of PTSD. Copyright © 2012 International Society for Traumatic Stress Studies.

  1. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  2. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  3. Preoperational checkout of the remote-handled transuranic waste handling at the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    1987-09-01

    This plan describes the preoperational checkout for handling Remote-Handled Transuranic (RH-TRU) Wastes from their receipt at the Waste Isolation Pilot Plant (WIPP) to their emplacement underground. This plan identifies the handling operations to be performed, personnel groups responsible for executing these operations, and required equipment items. In addition, this plan describes the quality assurance that will be exercised throughout the checkout, and finally, it establishes criteria by which to measure the success of the checkout. 7 refs., 5 figs

  4. Preference Handling for Artificial Intelligence

    OpenAIRE

    Goldsmith, Judy; University of Kentucky; Junker, Ulrich; ILOG

    2009-01-01

    This article explains the benefits of preferences for AI systems and draws a picture of current AI research on preference handling. It thus provides an introduction to the topics covered by this special issue on preference handling.

  5. Religious Serpent Handling and Community Relations.

    Science.gov (United States)

    Williamson, W Paul; Hood, Ralph W

    2015-01-01

    Christian serpent handling sects of Appalachia comprise a community that has long been mischaracterized and marginalized by the larger communities surrounding them. To explore this dynamic, this article traces the emergence of serpent handling in Appalachia and the emergence of anti-serpent-handling state laws, which eventually failed to curb the practice, as local communities gave serpent handling groups support. We present two studies to consider for improving community relations with serpent handling sects. In study 1, we present data relating the incidence of reported serpent-bite deaths with the rise of anti-serpent-handling laws and their eventual abatement, based on increasing acceptance of serpent handlers by the larger community. Study 2 presents interview data on serpent bites and death that provide explanations for these events from the cultural and religious perspective. We conclude that first-hand knowledge about serpent handlers, and other marginalized groups, helps to lessen suspicion and allows them to be seen as not much different, which are tendencies that are important for promoting inter-community harmony.

  6. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  7. Safe handling of tritium

    International Nuclear Information System (INIS)

    1991-01-01

    The main objective of this publication is to provide practical guidance and recommendations on operational radiation protection aspects related to the safe handling of tritium in laboratories, industrial-scale nuclear facilities such as heavy-water reactors, tritium removal plants and fission fuel reprocessing plants, and facilities for manufacturing commercial tritium-containing devices and radiochemicals. The requirements of nuclear fusion reactors are not addressed specifically, since there is as yet no tritium handling experience with them. However, much of the material covered is expected to be relevant to them as well. Annex III briefly addresses problems in the comparatively small-scale use of tritium at universities, medical research centres and similar establishments. However, the main subject of this publication is the handling of larger quantities of tritium. Operational aspects include designing for tritium safety, safe handling practice, the selection of tritium-compatible materials and equipment, exposure assessment, monitoring, contamination control and the design and use of personal protective equipment. This publication does not address the technologies involved in tritium control and cleanup of effluents, tritium removal, or immobilization and disposal of tritium wastes, nor does it address the environmental behaviour of tritium. Refs, figs and tabs

  8. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  9. How Retailers Handle Complaint Management

    DEFF Research Database (Denmark)

    Hansen, Torben; Wilke, Ricky; Zaichkowsky, Judy

    2009-01-01

    This article fills a gap in the literature by providing insight about the handling of complaint management (CM) across a large cross section of retailers in the grocery, furniture, electronic and auto sectors. Determinants of retailers’ CM handling are investigated and insight is gained as to the......This article fills a gap in the literature by providing insight about the handling of complaint management (CM) across a large cross section of retailers in the grocery, furniture, electronic and auto sectors. Determinants of retailers’ CM handling are investigated and insight is gained...... as to the links between CM and redress of consumers’ complaints. The results suggest that retailers who attach large negative consequences to consumer dissatisfaction are more likely than other retailers to develop a positive strategic view on customer complaining, but at the same time an increase in perceived...

  10. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  11. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  12. 7 CFR 926.9 - Handle.

    Science.gov (United States)

    2010-01-01

    ... the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE DATA COLLECTION, REPORTING AND RECORDKEEPING REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.9 Handle. Handle...

  13. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  14. the role of counselling as a tool in addressing adult students' need

    African Journals Online (AJOL)

    Elizabeth

    Key words: Adult students, Adult education, Challenges, Counselling. ... which pose greater threat for students facing the “physio-psychological, .... profile of adult students and lifelong learning. ... Effective of Adult Learning and Teaching.

  15. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  16. Remote handling at LAMPF

    International Nuclear Information System (INIS)

    Grisham, D.L.; Lambert, J.E.

    1983-01-01

    Experimental area A at the Clinton P. Anderson Meson Physics Facility (LAMPF) encompasses a large area. Presently there are four experimental target cells along the main proton beam line that have become highly radioactive, thus dictating that all maintenance be performed remotely. The Monitor remote handling system was developed to perform in situ maintenance at any location within area A. Due to the complexity of experimental systems and confined space, conventional remote handling methods based upon hot cell and/or hot bay concepts are not workable. Contrary to conventional remote handling which require special tooling for each specifically planned operation, the Monitor concept is aimed at providing a totally flexible system capable of remotely performing general mechanical and electrical maintenance operations using standard tools. The Monitor system is described

  17. Emotional Valence, Arousal, and Threat Ratings of 160 Chinese Words among Adolescents.

    Science.gov (United States)

    Ho, Samuel M Y; Mak, Christine W Y; Yeung, Dannii; Duan, Wenjie; Tang, Sandy; Yeung, June C; Ching, Rita

    2015-01-01

    This study was conducted to provide ratings of valence/pleasantness, arousal/excitement, and threat/potential harm for 160 Chinese words. The emotional valence classification (positive, negative, or neutral) of all of the words corresponded to that of the equivalent English language words. More than 90% of the participants, junior high school students aged between 12 and 17 years, understood the words. The participants were from both mainland China and Hong Kong, thus the words can be applied to adolescents familiar with either simplified (e.g. in mainland China) or traditional Chinese (e.g. in Hong Kong) with a junior secondary school education or higher. We also established eight words with negative valence, high threat, and high arousal ratings to facilitate future research, especially on attentional and memory biases among individuals prone to anxiety. Thus, the new emotional word list provides a useful source of information for affective research in the Chinese language.

  18. MRI of meniscal bucket-handle tears

    Energy Technology Data Exchange (ETDEWEB)

    Magee, T.H.; Hinson, G.W. [Menorah Medical Center, Overland Park, KS (United States). Dept. of Radiology

    1998-09-01

    A meniscal bucket-handle tear is a tear with an attached fragment displaced from the meniscus of the knee joint. Low sensitivity of MRI for detection of bucket-handle tears (64% as compared with arthroscopy) has been reported previously. We report increased sensitivity for detecting bucket-handle tears with the use of coronal short tau inversion recovery (STIR) images. Results. By using four criteria for diagnosis of meniscal bucket-handle tears, our overall sensitivity compared with arthroscopy was 93% (28 of 30 meniscal bucket-handle tears seen at arthroscopy were detected by MRI). The meniscal fragment was well visualized in all 28 cases on coronal STIR images. The double posterior cruciate ligament sign was seen in 8 of 30 cases, the flipped meniscus was seen in 10 of 30 cases and a fragment in the intercondylar notch was seen in 18 of 30 cases. (orig.)

  19. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  20. Sophisticated fuel handling system evolved

    International Nuclear Information System (INIS)

    Ross, D.A.

    1988-01-01

    The control systems at Sellafield fuel handling plant are described. The requirements called for built-in diagnostic features as well as the ability to handle a large sequencing application. Speed was also important; responses better than 50ms were required. The control systems are used to automate operations within each of the three main process caves - two Magnox fuel decanners and an advanced gas-cooled reactor fuel dismantler. The fuel route within the fuel handling plant is illustrated and described. ASPIC (Automated Sequence Package for Industrial Control) which was developed as a controller for the plant processes is described. (U.K.)

  1. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  2. psycho-social correlates of students' involvement in secret cults

    African Journals Online (AJOL)

    PROF EKWUEME

    as constituting general threat to peace in institutions of higher learning. (Fawole ... involvement in secret cults, and to investigate if peer group do influence students involvement in secret cults. .... be of benefit to students, teachers, parents,.

  3. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  4. The natural angle between the hand and handle and the effect of handle orientation on wrist radial/ulnar deviation during maximal push exertions.

    Science.gov (United States)

    Young, Justin G; Lin, Jia-Hua; Chang, Chien-Chi; McGorry, Raymond W

    2013-01-01

    The purpose of this experiment was to quantify the natural angle between the hand and a handle, and to investigate three design factors: handle rotation, handle tilt and between-handle width on the natural angle as well as resultant wrist radial/ulnar deviation ('RUD') for pushing tasks. Photographs taken of the right upper limb of 31 participants (14 women and 17 men) performing maximal seated push exertions on different handles were analysed. Natural hand/handle angle and RUD were assessed. It was found that all of the three design factors significantly affected natural handle angle and wrist RUD, but participant gender did not. The natural angle between the hand and the cylindrical handle was 65 ± 7°. Wrist deviation was reduced for handles that were rotated 0° (horizontal) and at the narrow width (31 cm). Handles that were tilted forward 15° reduced radial deviation consistently (12-13°) across handle conditions. Manual materials handling (MMH) tasks involving pushing have been related to increased risk of musculoskeletal injury. This study shows that handle orientation influences hand and wrist posture during pushing, and suggests that the design of push handles on carts and other MMH aids can be improved by adjusting their orientation to fit the natural interface between the hand and handle.

  5. Low Back Pain in Student Nurses: Literature Review and Prospective Cohort Study.

    Science.gov (United States)

    Menzel, Nancy; Feng, Du; Doolen, Jessica

    2016-05-13

    There is consensus that registered nurses worldwide have a high prevalence of work-related musculoskeletal disorders, particularly of the back. Patient handling activities such as lifting present the highest risk of injury, activities that begin in nursing school. A literature review identified 21 studies of back pain in nursing students, indicating a wide range of prevalence rates. A prospective cohort study of nursing students in a United States baccalaureate program followed 119 students who completed the Nordic Musculoskeletal Questionnaire upon beginning the 16 month upper division major and then a year later. There was no statistically significant change in low back pain prevalence over time. While nursing students have intermittent and brief exposure to patient handling activities, nursing schools must nevertheless protect them before they enter the high risk profession of nursing by teaching evidence-based safe patient handling techniques, empowering students to refuse unsafe manual lifts, and ensuring that the clinical settings with which they affiliate have adequate mechanical equipment available.

  6. 9 CFR 3.118 - Handling.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Handling. 3.118 Section 3.118 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE STANDARDS Specifications for the Humane Handling, Care, Treatment, and Transportation of Marine...

  7. Safety measuring for sodium handling

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Ji Young; Jeong, K C; Kim, T J; Kim, B H; Choi, J H

    2001-09-01

    This is the report for the safety measures of sodium handling. These contents are prerequisites for the development of sodium technology and thus the workers participate in sodium handling and experiments have to know them perfectly. As an appendix, the relating parts of the laws are presented.

  8. A Perspective on Remote Handling Operations and Human Machine Interface for Remote Handling in Fusion

    International Nuclear Information System (INIS)

    Haist, B.; Hamilton, D.; Sanders, St.

    2006-01-01

    A large-scale fusion device presents many challenges to the remote handling operations team. This paper is based on unique operational experience at JET and gives a perspective on remote handling task development, logistics and resource management, as well as command, control and human-machine interface systems. Remote operations require an accurate perception of a dynamic environment, ideally providing the operators with the same unrestricted knowledge of the task scene as would be available if they were actually at the remote work location. Traditional camera based systems suffer from a limited number of viewpoints and also degrade quickly when exposed to high radiation. Virtual Reality and Augmented Reality software offer great assistance. The remote handling system required to maintain a tokamak requires a large number of different and complex pieces of equipment coordinating to perform a large array of tasks. The demands on the operator's skill in performing the tasks can escalate to a point where the efficiency and safety of operations are compromised. An operations guidance system designed to facilitate the planning, development, validation and execution of remote handling procedures is essential. Automatic planning of motion trajectories of remote handling equipment and the remote transfer of heavy loads will be routine and need to be reliable. This paper discusses the solutions developed at JET in these areas and also the trends in management and presentation of operational data as well as command, control and HMI technology development offering the potential to greatly assist remote handling in future fusion machines. (author)

  9. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  10. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  11. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  12. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  13. Cognitive Dissonance or Revenge? Student Grades and Course Evaluations

    Science.gov (United States)

    Maurer, Trent W.

    2006-01-01

    I tested 2 competing theories to explain the connection between students' expected grades and ratings of instructors: cognitive dissonance and revenge. Cognitive dissonance theory holds that students who expect poor grades rate instructors poorly to minimize ego threat whereas the revenge theory holds that students rate instructors poorly in an…

  14. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  15. The relationship between manual handling performance and recent flying experience in air transport pilots.

    Science.gov (United States)

    Ebbatson, Matt; Harris, Don; Huddlestone, John; Sears, Rodney

    2010-02-01

    Modern jet transport aircraft are typically flown using the on-board automation by the pilot programming commands into the auto-flight systems. Anecdotal evidence exists suggesting that pilots of highly automated aircraft experience manual flying skills decay as a result of a lack of opportunity to practise hand-flying during line operations. The ability of a pilot to revert to basic manual control is essential, for example, in cases where the aircraft's automatic capability is diminished or when reconfiguring the automatics is an ineffective use of crew capacity. However, there is a paucity of objective data to substantiate this perceived threat to flight safety. Furthermore, traditional performance measurement techniques may lack the ability to identify subtle but significant differences in pilots' manual handling ability in large transport aircraft. This study examines the relationship between pilot manual handling performance and their recent flying experience using both traditional flight path tracking measures and frequency-based control strategy measures. Significant relationships are identified between pilots' very recent flying experience and their manual control strategy. Statement of Relevance: The study demonstrates a novel application of frequency analysis, which produces a broader and more sensitive analysis of pilot performance than has been offered in previous research. Additionally, the relationships that are found to exist between recent flying experience and manual flying performance will help to guide future pilot assessment and training.

  16. Asthma, guides for diagnostic and handling

    International Nuclear Information System (INIS)

    Salgado, Carlos E; Caballero A, Andres S; Garcia G, Elizabeth

    1999-01-01

    The paper defines the asthma, includes topics as diagnostic, handling of the asthma, special situations as asthma and pregnancy, handling of the asthmatic patient's perioperatory and occupational asthma

  17. Neural responses to threat and reward interact to predict stress-related problem drinking: A novel protective role of the amygdala

    Science.gov (United States)

    2012-01-01

    Background Research into neural mechanisms of drug abuse risk has focused on the role of dysfunction in neural circuits for reward. In contrast, few studies have examined the role of dysfunction in neural circuits of threat in mediating drug abuse risk. Although typically regarded as a risk factor for mood and anxiety disorders, threat-related amygdala reactivity may serve as a protective factor against substance use disorders, particularly in individuals with exaggerated responsiveness to reward. Findings We used well-established neuroimaging paradigms to probe threat-related amygdala and reward-related ventral striatum reactivity in a sample of 200 young adult students from the ongoing Duke Neurogenetics Study. Recent life stress and problem drinking were assessed using self-report. We found a significant three-way interaction between threat-related amygdala reactivity, reward-related ventral striatum reactivity, and recent stress, wherein individuals with higher reward-related ventral striatum reactivity exhibit higher levels of problem drinking in the context of stress, but only if they also have lower threat-related amygdala reactivity. This three-way interaction predicted both contemporaneous problem drinking and problem drinking reported three-months later in a subset of participants. Conclusions These findings suggest complex interactions between stress and neural responsiveness to both threat and reward mediate problem drinking. Furthermore, they highlight a novel protective role for threat-related amygdala reactivity against drug use in individuals with high neural reactivity to reward. PMID:23151390

  18. Remote-handled transuranic system assessment appendices. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-11-01

    Volume 2 of this report contains six appendices to the report: Inventory and generation of remote-handled transuranic waste; Remote-handled transuranic waste site storage; Characterization of remote-handled transuranic waste; RH-TRU waste treatment alternatives system analysis; Packaging and transportation study; and Remote-handled transuranic waste disposal alternatives.

  19. Remote-handled transuranic system assessment appendices. Volume 2

    International Nuclear Information System (INIS)

    1995-11-01

    Volume 2 of this report contains six appendices to the report: Inventory and generation of remote-handled transuranic waste; Remote-handled transuranic waste site storage; Characterization of remote-handled transuranic waste; RH-TRU waste treatment alternatives system analysis; Packaging and transportation study; and Remote-handled transuranic waste disposal alternatives

  20. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  1. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  2. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  3. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  5. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  6. Ergonomics of disposable handles for minimally invasive surgery.

    Science.gov (United States)

    Büchel, D; Mårvik, R; Hallabrin, B; Matern, U

    2010-05-01

    The ergonomic deficiencies of currently available minimally invasive surgery (MIS) instrument handles have been addressed in many studies. In this study, a new ergonomic pistol handle concept, realized as a prototype, and two disposable ring handles were investigated according to ergonomic properties set by new European standards. In this study, 25 volunteers performed four practical tasks to evaluate the ergonomics of the handles used in standard operating procedures (e.g., measuring a suture and cutting to length, precise maneuvering and targeting, and dissection of a gallbladder). Moreover, 20 participants underwent electromyography (EMG) tests to measure the muscle strain they experienced while carrying out the basic functions (grasp, rotate, and maneuver) in the x, y, and z axes. The data measured included the number of errors, the time required for task completion, perception of pressure areas, and EMG data. The values for usability in the test were effectiveness, efficiency, and user satisfaction. Surveys relating to the subjective rating were completed after each task for each of the three handles tested. Each handle except the new prototype caused pressure areas and pain. Extreme differences in muscle strain could not be observed for any of the three handles. Experienced surgeons worked more quickly with the prototype when measuring and cutting a suture (approximately 20%) and during precise maneuvering and targeting (approximately 20%). On the other hand, they completed the dissection task faster with the handle manufactured by Ethicon. Fewer errors were made with the prototype in dissection of the gallbladder. In contrast to the handles available on the market, the prototype was always rated as positive by the volunteers in the subjective surveys. None of the handles could fulfil all of the requirements with top scores. Each handle had its advantages and disadvantages. In contrast to the ring handles, the volunteers could fulfil most of the tasks more

  7. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  8. Stereotype threat? Effects of inquiring about test takers' gender on conceptual test performance in physics

    Science.gov (United States)

    Maries, Alexandru; Singh, Chandralekha

    2015-12-01

    It has been found that activation of a stereotype, for example by indicating one's gender before a test, typically alters performance in a way consistent with the stereotype, an effect called "stereotype threat." On a standardized conceptual physics assessment, we found that asking test takers to indicate their gender right before taking the test did not deteriorate performance compared to an equivalent group who did not provide gender information. Although a statistically significant gender gap was present on the standardized test whether or not students indicated their gender, no gender gap was observed on the multiple-choice final exam students took, which included both quantitative and conceptual questions on similar topics.

  9. Radiological safety aspects of handling plutonium

    International Nuclear Information System (INIS)

    Sundararajan, A.R.

    2016-01-01

    Department of Atomic Energy in its scheme of harnessing the nuclear energy for electrical power generation and strategic applications has given a huge role to utilization of plutonium. In the power production programme, fast reactors with plutonium as fuel are expected to play a major role. This would require establishing fuel reprocessing plants to handle both thermal and fast reactor fuels. So in the nuclear fuel cycle facilities variety of chemical, metallurgical, mechanical operations have to be carried out involving significant inventories of "2"3"9 Pu and associated radionuclides. Plutonium is the most radiotoxic radionuclide and therefore any facility handling it has to be designed and operated with utmost care. Two problems of major concern in the protection of persons working in plutonium handling facilities are the internal exposure to the operating personnel from uptake of plutonium and transplutonic nuclides as they are highly radiotoxic and the radiation exposure of hands and eye lens during fuel fabrication operations especially while handling recycled high burn up plutonium. In view of the fact that annual limit for intake is very small for "2"3"9Pu and its radiation emission characteristics are such that it is a huge challenge for the health physicists to detect Pu in air and in workers. This paper discusses the principles and practices followed in providing radiological surveillance to workers in plutonium handling areas. The challenges in protecting the workers from receiving exposures to hands and eye lens in handling high burn up plutonium are also discussed. The sites having Pu fuel cycle facilities should have trained medical staff to handle cases involving excessive intake of plutonium. (author)

  10. Enclosure for handling high activity materials

    International Nuclear Information System (INIS)

    Jimeno de Osso, F.

    1977-01-01

    One of the most important problems that are met at the laboratories producing and handling radioisotopes is that of designing, building and operating enclosures suitable for the safe handling of active substances. With this purpose in mind, an enclosure has been designed and built for handling moderately high activities under a shielding made of 150 mm thick lead. In this report a description is given of those aspects that may be of interest to people working in this field. (Author)

  11. Enclosure for handling high activity materials

    Energy Technology Data Exchange (ETDEWEB)

    Jimeno de Osso, F

    1977-07-01

    One of the most important problems that are met at the laboratories producing and handling radioisotopes is that of designing, building and operating enclosures suitable for the safe handling of active substances. With this purpose in mind, an enclosure has been designed and built for handling moderately high activities under a shielding made of 150 mm thick lead. In this report a description is given of those aspects that may be of interest to people working in this field. (Author)

  12. Beyond Performance: A Motivational Experiences Model of Stereotype Threat

    Science.gov (United States)

    Thoman, Dustin B.; Smith, Jessi L.; Brown, Elizabeth R.; Chase, Justin; Lee, Joo Young K.

    2013-01-01

    The contributing role of stereotype threat (ST) to learning and performance decrements for stigmatized students in highly evaluative situations has been vastly documented and is now widely known by educators and policy makers. However, recent research illustrates that underrepresented and stigmatized students’ academic and career motivations are influenced by ST more broadly, particularly through influences on achievement orientations, sense of belonging, and intrinsic motivation. Such a focus moves conceptualizations of ST effects in education beyond the influence on a student’s performance, skill level, and feelings of self-efficacy per se to experiencing greater belonging uncertainty and lower interest in stereotyped tasks and domains. These negative experiences are associated with important outcomes such as decreased persistence and domain identification, even among students who are high in achievement motivation. In this vein, we present and review support for the Motivational Experience Model of ST, a self-regulatory model framework for integrating research on ST, achievement goals, sense of belonging, and intrinsic motivation to make predictions for how stigmatized students’ motivational experiences are maintained or disrupted, particularly over long periods of time. PMID:23894223

  13. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  14. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  15. Specialization and Flexibility in Port Cargo Handling

    Directory of Open Access Journals (Sweden)

    Hakkı KİŞİ

    2016-11-01

    Full Text Available Cargo handling appears to be the fundamental function of ports. In this context, the question of type of equipment and capacity rate need to be tackled with respect to cargo handling principles. The purpose of this study is to discuss the types of equipment to be used in ports, relating the matter to costs and capacity. The question is studied with a basic economic theoretical approach. Various conditions like port location, size, resources, cargo traffic, ships, etc. are given parameters to dictate the type and specification of the cargo handling equipment. Besides, a simple approach in the context of cost capacity relation can be useful in deciding whether to use specialized or flexible equipment. Port equipment is sometimes expected to be flexible to handle various types of cargo as many as possible and sometimes to be specialized to handle one specific type of cargo. The cases that might be suitable for those alternatives are discussed from an economic point of view in this article. Consequently, effectiveness and efficiency criteria play important roles in determining the handling equipment in ports.

  16. HMSRP Hawaiian Monk Seal Handling Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains records for all handling and measurement of Hawaiian monk seals since 1981. Live seals are handled and measured during a variety of events...

  17. Assessment of the threat from diverted radioactive material and 'orphan sources' - An international comparison

    International Nuclear Information System (INIS)

    Steinhausler, F.

    2001-01-01

    Full text: Multiple international activities have been undertaken to contain the trafficking of weapons-usable material in order to reduce the risk from the proliferation of such material. In addition, over the past decade the issue of unintended handling and transport of radioactive material has become increasingly important. Concurrent with the growing number of radioactive sources in industry, medicine, agriculture and research, the probability for losing control over such sources increases as well ('orphan sources'). The potential impact on society and the environment from these two categories of threat has been documented extensively in the literature. In this study representatives from 11 countries in the Americas, Europe and Asia-Pacific formed a network to exchange information concerning nuclear and other radioactive material on the following topic areas: Legislation and regulatory practices for the production, processing, handling, use, holding, storage, transport, import, and export; History of site-specific non-compliance and enforcement actions, as well as punitive actions; National approach for handling the issue of orphan sources; The role of national security forces; Managerial and technical procedures to ensure material inventory control and accountancy; Aspects of physical protection on-site and during transport; Technical/scientific expertise and equipment available at the national level to detect, identify and quantify such material in the field; Level of practical implementation of technical equipment to detect such material at border crossings, airports, railway stations, and mail distribution centres; Cases of seizure of nuclear and contaminated materials, illegal sales and fraud; Training programmes available for preventing, detecting and responding to the loss of control. The results of the analysis show that, despite several international consensus documents and supporting legislation, in several cases major additional efforts are needed

  18. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  19. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  20. Liquid-handling Lego robots and experiments for STEM education and research.

    Directory of Open Access Journals (Sweden)

    Lukas C Gerber

    2017-03-01

    Full Text Available Liquid-handling robots have many applications for biotechnology and the life sciences, with increasing impact on everyday life. While playful robotics such as Lego Mindstorms significantly support education initiatives in mechatronics and programming, equivalent connections to the life sciences do not currently exist. To close this gap, we developed Lego-based pipetting robots that reliably handle liquid volumes from 1 ml down to the sub-μl range and that operate on standard laboratory plasticware, such as cuvettes and multiwell plates. These robots can support a range of science and chemistry experiments for education and even research. Using standard, low-cost household consumables, programming pipetting routines, and modifying robot designs, we enabled a rich activity space. We successfully tested these activities in afterschool settings with elementary, middle, and high school students. The simplest robot can be directly built from the widely used Lego Education EV3 core set alone, and this publication includes building and experiment instructions to set the stage for dissemination and further development in education and research.

  1. Liquid-handling Lego robots and experiments for STEM education and research.

    Science.gov (United States)

    Gerber, Lukas C; Calasanz-Kaiser, Agnes; Hyman, Luke; Voitiuk, Kateryna; Patil, Uday; Riedel-Kruse, Ingmar H

    2017-03-01

    Liquid-handling robots have many applications for biotechnology and the life sciences, with increasing impact on everyday life. While playful robotics such as Lego Mindstorms significantly support education initiatives in mechatronics and programming, equivalent connections to the life sciences do not currently exist. To close this gap, we developed Lego-based pipetting robots that reliably handle liquid volumes from 1 ml down to the sub-μl range and that operate on standard laboratory plasticware, such as cuvettes and multiwell plates. These robots can support a range of science and chemistry experiments for education and even research. Using standard, low-cost household consumables, programming pipetting routines, and modifying robot designs, we enabled a rich activity space. We successfully tested these activities in afterschool settings with elementary, middle, and high school students. The simplest robot can be directly built from the widely used Lego Education EV3 core set alone, and this publication includes building and experiment instructions to set the stage for dissemination and further development in education and research.

  2. Facilitating women's success in business: Interrupting the process of stereotype threat through affirmation of personal values.

    Science.gov (United States)

    Kinias, Zoe; Sim, Jessica

    2016-11-01

    Two field experiments examined if and how values affirmations can ameliorate stereotype threat-induced gender performance gaps in an international competitive business environment. Based on self-affirmation theory (Steele, 1988), we predicted that writing about personal values unrelated to the perceived threat would attenuate the gender performance gap. Study 1 found that an online assignment to write about one's personal values (but not a similar writing assignment including organizational values) closed the gender gap in course grades by 89.0% among 423 Masters of Business Administration students (MBAs) at an international business school. Study 2 replicated this effect among 396 MBAs in a different cohort with random assignment and tested 3 related mediators (self-efficacy, self-doubt, and self-criticism). Personal values reflection (but not reflecting on values including those of the organization or writing about others' values) reduced the gender gap by 66.5%, and there was a significant indirect effect through reduced self-doubt. These findings show that a brief personal values writing exercise can dramatically improve women's performance in competitive environments where they are negatively stereotyped. The results also demonstrate that stereotype threat (Steele & Aronson, 1995) can occur within a largely non-American population with work experience and that affirming one's core personal values (without organizational values) can ameliorate the threat. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  3. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  4. Motivation and Prior Animal Experience of Newly Enrolled Veterinary Nursing Students at two Irish Third-Level Institutions.

    Science.gov (United States)

    Dunne, Karen; Brereton, Bernadette; Duggan, Vivienne; Campion, Deirdre

    2017-11-03

    Veterinary nurses report an intrinsic desire to work with animals. However, this motivation may be eroded by poor working conditions and low pay, resulting in the exit of experienced veterinary nurses from clinical practice. This study sought to quantify the level of animal-handling experience students possessed at the start of their training and to explore the factors motivating them to enter veterinary nurse training in two Irish third-level institutions. The authors had noted a tendency for veterinary nursing students to possess limited animal-handling skills, despite their obvious motivation to work with animals. The study explores possible reasons for this, as it mirrors previous reports in relation to students of veterinary medicine. First-year veterinary nursing students at Dundalk Institute of Technology and University College Dublin were surveyed and a focus group was held in each institution to explore student motivations for choosing this career and their prior animal-handling experience and workplace exposure. The results show that veterinary nursing students are highly intrinsically motivated to work with and care for animals. The majority had spent time in the veterinary workplace before starting their studies but they had limited animal-handling experience beyond that of family pets, primarily dogs. The study also revealed potential tensions between the veterinary nursing and veterinary medical students at University College Dublin: a hitherto unexposed aspect of the hidden curriculum in this institution. The results of this study highlight the need for ongoing investment in practical animal-handling training for veterinary nursing students.

  5. Management of transport and handling contracts

    CERN Document Server

    Rühl, I

    2004-01-01

    This paper shall outline the content, application and management strategies for the various contracts related to transport and handling activities. In total, the two sections Logistics and Handling Maintenance are in charge of 27 (!) contracts ranging from small supply contracts to big industrial support contracts. The activities as well as the contracts can generally be divided into four main topics "Vehicle Fleet Management"; "Supply, Installation and Commissioning of Lifting and Hoisting Equipment"; "Equipment Maintenance" and "Industrial Support for Transport and Handling". Each activity and contract requires different approaches and permanent adaptation to the often changing CERN's requirements. In particular, the management and the difficulties experienced with the contracts E072 "Maintenance of lifting and hoisting equipment", F420 "Supply of seven overhead traveling cranes for LHC" and S090/S103 "Industrial support for transport and handling" will be explained in detail.

  6. Ergonomics: safe patient handling and mobility.

    Science.gov (United States)

    Hallmark, Beth; Mechan, Patricia; Shores, Lynne

    2015-03-01

    This article reviews and investigates the issues surrounding ergonomics, with a specific focus on safe patient handling and mobility. The health care worker of today faces many challenges, one of which is related to the safety of patients. Safe patient handling and mobility is on the forefront of the movement to improve patient safety. This article reviews the risks associated with patient handling and mobility, and informs the reader of current evidence-based practice relevant to this area of care. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Remote handling equipment

    International Nuclear Information System (INIS)

    Clement, G.

    1984-01-01

    After a definition of intervention, problems encountered for working in an adverse environment are briefly analyzed for development of various remote handling equipments. Some examples of existing equipments are given [fr

  8. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  9. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  10. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  11. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  12. Welding method by remote handling

    International Nuclear Information System (INIS)

    Hashinokuchi, Minoru.

    1994-01-01

    Water is charged into a pit (or a water reservoir) and an article to be welded is placed on a support in the pit by remote handling. A steel plate is disposed so as to cover the article to be welded by remote handling. The welding device is positioned to the portion to be welded and fixed in a state where the article to be welded is shielded from radiation by water and the steel plate. Water in the pit is drained till the portion to be welded is exposed to the atmosphere. Then, welding is conducted. After completion of the welding, water is charged again to the pit and the welding device and fixing jigs are decomposed in a state where the article to be welded is shielded again from radiation by water and the steel plate. Subsequently, the steel plate is removed by remote handling. Then, the article to be welded is returned from the pit to a temporary placing pool by remote handling. This can reduce operator's exposure. Further, since the amount of the shielding materials can be minimized, the amount of radioactive wastes can be decreased. (I.N.)

  13. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  14. The Effect of Stereotype Threat on Undergraduates in AN Introductory Astronomy Class

    Science.gov (United States)

    Hufnagel, Beth; Deming, Grace L.; Landato, Janet M.; Hodari, Apriel K.

    This quantitative study tests the hypothesis that undergraduates taking an introductory astronomy class for nonscience majors are susceptible to stereotype threat (ST). The Astronomy Diagnostic Test (ADT), a conceptual survey designed for introductory astronomy classes, was administered pre- and postcourse to two pairs (control and threatened) of the same class taught by the same professors, one pair at a public, suburban community college and the other pair at a large, state research university. One class of each pair was threatened postcourse by telling the students that their gender mattered on the ADT. The results showed no ST effect on the women in the university class. The college women underperformed and the men overperformed at a low statistical significance. The authors infer that Steele's requirement for domain identification as a condition is also required to strongly invoke ST for this sample of nonscience students.

  15. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  16. Actinide-handling experience for training and education of future expert under J-ACTINET

    International Nuclear Information System (INIS)

    Osaka, Masahiko; Sato, Isamu; Miwa, Shuhei; Konashi, Kenji; Li, Dexin; Homma, Yoshiya; Yamamura, Tomoo; Hayashi, Hirokazu; Minato, Kazuo; Sekimoto, Syun; Kubota, Takumi; Fukutani, Satoshi; Hori, Junichi; Okumura, Ryo; Uehara, Akihiro; Fujii, Toshiyuki; Yamana, Hajimu; Kurosaki, Ken; Muta, Hiroaki; Ohishi, Yuji; Yamanaka, Shinsuke; Uno, Masayoshi; Yaita, Tsuyoshi

    2011-01-01

    Summer schools for future experts have successfully been completed under Japan Actinide Network (J-ACTINET) for the purpose of development of human resources who are expected to be engaged in every areas of actinide-research/engineering. The first summer school was held in Ibaraki-area in August 2009, followed by the second one in Kansai-area in August 2010. Two summer schools have focused on actual experiences of actinides in actinide-research fields for university students and young researchers/engineers as an introductory course of actinide-researches. Many efforts were made to awaken interests into actinide-researches inside the participants during short periods of schools, 3 to 4 days. As actinides must be handled inside special apparatuses such as an air-tight globe-box with well-trained and qualified technicians, programs were optimized for effective experiences of actinides-handling. Several quasi actinide-handling experiences at the actinide-research fields have attracted attentions of participants at the first school in Ibaraki-area. The actual experiments using actinides-containing solutions have been carried out at the second school in Kansai-area. Future summer schools will be held every year for the sustainable human resource development in various actinide-research fields, together with other training and education programs conducted by the J-ACTINET. (author)

  17. Mediation of Conflict Handling Styles in the Relation between Virtues and Marital Satisfaction

    Directory of Open Access Journals (Sweden)

    حسین نادری

    2016-03-01

    Full Text Available Despite awareness of the adjusted conflict tactics, sometimes there is no motivation for proper behavior. It is expected that virtues increase the likelihood of adaptive behaviors by affecting motivation for ethical behaviors. This research studied the relation between marital satisfaction, character and its underlying virtues that are the internal elements necessary for adjusted life from a positive psychology perspective. It is assumed that spouse's conflict handling styles is a mediator that play a role between character, virtues, and marital satisfaction. In a correlation plan, the married university students living in dormitories were asked to complete three questionnaires: Character Strengths, Conflict Management Style, and Marital Satisfaction. Finally, the data was analyzed based on SEM method. The courage and transcendence are found as predictors of marital satisfaction and adaptive conflict handling tactics; The Humanity doesn't show a significant relationship with satisfaction. Results also support the mediating role of adaptive conflict handling styles in relation between virtues and satisfaction. It seems that marital satisfaction stems basically from the individual's inner characteristics rather than love between spouses. Virtues affect marital outcomes through their impact on spouses' interaction styles during conflicts. Clinical implications of these results are discussed as suggestions for family therapy interventions based on a positive perspective.

  18. Civilsamfundets ABC: H for Handling

    DEFF Research Database (Denmark)

    Lund, Anker Brink; Meyer, Gitte

    2015-01-01

    Hvad er civilsamfundet? Anker Brink Lund og Gitte Meyer fra CBS Center for Civil Society Studies gennemgår civilsamfundet bogstav for bogstav. Vi er nået til H for Handling.......Hvad er civilsamfundet? Anker Brink Lund og Gitte Meyer fra CBS Center for Civil Society Studies gennemgår civilsamfundet bogstav for bogstav. Vi er nået til H for Handling....

  19. The technique on handling radiation

    International Nuclear Information System (INIS)

    1997-11-01

    This book describes measurement of radiation and handling radiation. The first part deals with measurement of radiation. The contents of this part are characteristic on measurement technique of radiation, radiation detector, measurement of energy spectrum, measurement of radioactivity, measurement for a level of radiation and county's statistics on radiation. The second parts explains handling radiation with treating of sealed radioisotope, treating unsealed source and radiation shield.

  20. Uranium hexafluoride handling

    International Nuclear Information System (INIS)

    1991-01-01

    The United States Department of Energy, Oak Ridge Field Office, and Martin Marietta Energy Systems, Inc., are co-sponsoring this Second International Conference on Uranium Hexafluoride Handling. The conference is offered as a forum for the exchange of information and concepts regarding the technical and regulatory issues and the safety aspects which relate to the handling of uranium hexafluoride. Through the papers presented here, we attempt not only to share technological advances and lessons learned, but also to demonstrate that we are concerned about the health and safety of our workers and the public, and are good stewards of the environment in which we all work and live. These proceedings are a compilation of the work of many experts in that phase of world-wide industry which comprises the nuclear fuel cycle. Their experience spans the entire range over which uranium hexafluoride is involved in the fuel cycle, from the production of UF 6 from the naturally-occurring oxide to its re-conversion to oxide for reactor fuels. The papers furnish insights into the chemical, physical, and nuclear properties of uranium hexafluoride as they influence its transport, storage, and the design and operation of plant-scale facilities for production, processing, and conversion to oxide. The papers demonstrate, in an industry often cited for its excellent safety record, continuing efforts to further improve safety in all areas of handling uranium hexafluoride

  1. A Longitudinal Examination of the Role of Stereotype Threat and Racial Climate on College Outcomes for Minorities at Elite Institutions

    Science.gov (United States)

    Fischer, Mary J.

    2010-01-01

    This paper employs hierarchical linear models to explore the long-term effects of stereotype threat on college outcomes for students in the National Longitudinal Survey of Freshmen. Performance burden was negatively related to both grades and social satisfaction with college. Social satisfaction with college was also significantly impacted by…

  2. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  3. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  4. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  5. Handling Pyrophoric Reagents

    Energy Technology Data Exchange (ETDEWEB)

    Alnajjar, Mikhail S.; Haynie, Todd O.

    2009-08-14

    Pyrophoric reagents are extremely hazardous. Special handling techniques are required to prevent contact with air and the resulting fire. This document provides several methods for working with pyrophoric reagents outside of an inert atmosphere.

  6. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  7. ATA diagnostic data handling system: an overview

    International Nuclear Information System (INIS)

    Chambers, F.W.; Kallman, J.; McDonald, J.; Slominski, M.

    1984-01-01

    The functions to be performed by the ATA diagnostic data handling system are discussed. The capabilities of the present data acquisition system (System 0) are presented. The goals for the next generation acquisition system (System 1), currently under design, are discussed. Facilities on the Octopus system for data handling are reviewed. Finally, we discuss what has been learned about diagnostics and computer based data handling during the past year

  8. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  9. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  10. Intracerebral beta-endorphin, met-enkephalin and morphine: kindling of seizures and handling-induced potentiation of epileptiform effects.

    Science.gov (United States)

    Cain, D P; Corcoran, M E

    1984-06-18

    The effects of repeated infusion of small, initially subconvulsive amounts of beta-endorphin, met-enkephalin or morphine sulfate into the amygdala and hippocampus were investigated. beta-endorphin and met-enkephalin evoked epileptiform spiking when infused into the posterior amygdala or ventral hippocampus. Morphine evoked epileptiform spiking when infused into the anterior amygdala. Naloxone blocked or terminated the spiking. Repetition of the infusions led to the gradual development of bilateral generalized convulsions by beta-endorphin and met-enkephalin and to the development of tolerance to morphine. An unexpected observation was that handling, immobilization or conspecific threat potentiated the epileptiform effects of beta-endorphin and morphine in many cases. These results suggest that endogenous opiate mechanisms might play a role in convulsive seizures and that stressful stimuli can exacerbate opiate seizures.

  11. Automation of 3D micro object handling process

    DEFF Research Database (Denmark)

    Gegeckaite, Asta; Hansen, Hans Nørgaard

    2007-01-01

    Most of the micro objects in industrial production are handled with manual labour or in semiautomatic stations. Manual labour usually makes handling and assembly operations highly flexible, but slow, relatively imprecise and expensive. Handling of 3D micro objects poses special challenges due to ...

  12. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  13. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  14. Scheduling of outbound luggage handling at airports

    DEFF Research Database (Denmark)

    Barth, Torben C.; Pisinger, David

    2012-01-01

    This article considers the outbound luggage handling problem at airports. The problem is to assign handling facilities to outbound flights and decide about the handling start time. This dynamic, near real-time assignment problem is part of the daily airport operations. Quality, efficiency......). Another solution method is a decomposition approach. The problem is divided into different subproblems and solved in iterative steps. The different solution approaches are tested on real world data from Frankfurt Airport....

  15. Sequence trajectory generation for garment handling systems

    OpenAIRE

    Liu, Honghai; Lin, Hua

    2008-01-01

    This paper presents a novel generic approach to the planning strategy of garment handling systems. An assumption is proposed to separate the components of such systems into a component for intelligent gripper techniques and a component for handling planning strategies. Researchers can concentrate on one of the two components first, then merge the two problems together. An algorithm is addressed to generate the trajectory position and a clothes handling sequence of clothes partitions, which ar...

  16. Enhanced wood fuel handling: market and design studies

    Energy Technology Data Exchange (ETDEWEB)

    Landen, R.; Rippengal, R.; Redman, A.N.

    1997-09-01

    This report examines the potential for the manufacture and sale of novel wood fuel handling systems as a means of addressing users' concerns regarding current capital costs and potential high labour costs of non-automated systems. The report considers fuel handling technology that is basically appropriate for wood-fired heating systems of between c.100kW and c.1MW maximum continuous rating. This report details work done by the project collaborators in order to: (1) assess the current status of wood fuel handling technology; (2) evaluate the market appetite for improved wood fuel handling technology; (3) derive capital costs which are acceptable to customers; (4) review design options; and (5) select one or more design options worthy of further development. The current status of wood fuel handling technology is determined, and some basic modelling to give guidance on acceptable capital costs of 100-1000kW wood fuel handling systems is undertaken. (author)

  17. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-12-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST conditions. The conditions included an explicit ST condition, an implicit ST condition, and a nullified condition. Results indicated that males in all three conditions performed similarly on a set of physics problems. Females in the nullified condition outperformed females in the explicit ST condition and females in the implicit and explicit conditions performed similarly. Males performed better than females in the implicit and explicit ST conditions, but male and female performance on the physics problems was not significantly different in the nullified condition. The implications of these findings for physics instruction and future research on gender differences in physics and ST in science are discussed.

  18. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  19. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  20. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  1. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  2. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  3. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  4. Remote handling for an ISIS target change

    International Nuclear Information System (INIS)

    Broome, T.A.; Holding, M.

    1989-01-01

    During 1987 two ISIS targets were changed. This document describes the main features of the remote handling aspects of the work. All the work has to be carried out using remote handling techniques. The radiation level measured on the surface of the reflector when the second target had been removed was about 800 mGy/h demonstrating that hands on operations on any part of the target reflector moderator assembly is not practical. The target changes were the first large scale operations in the Target Station Remote Handling Cell and a great deal was learned about both equipment and working practices. Some general principles emerged which are applicable to other active handling tasks on facilities like ISIS and these are discussed below. 8 figs

  5. Low-level radioactive wastes: Their treatment, handling, disposal

    Energy Technology Data Exchange (ETDEWEB)

    Straub, Conrad P [Robert A. Taft Sanitary Engineering Center, Radiological Health Research Activities, Cincinnati, OH(United States)

    1964-07-01

    The release of low level wastes may result in some radiation exposure to man and his surroundings. This book describes techniques of handling, treatment, and disposal of low-level wastes aimed at keeping radiation exposure to a practicable minimum. In this context, wastes are considered low level if they are released into the environment without subsequent control. This book is concerned with practices relating only to continuous operations and not to accidental releases of radioactive materials. It is written by use for those interested in low level waste disposal problems and particularly for the health physicist concerned with these problems in the field. It should be helpful also to water and sewage works personnel concerned with the efficiency of water and sewage treatment processes for the removal of radioactive materials; the personnel engaged in design, construction, licensing, and operation of treatment facilities; and to student of nuclear technology. After an introduction the following areas are discussed: sources, quantities and composition of radioactive wastes; collection, sampling and measurement; direct discharge to the water, soil and air environment; air cleaning; removal of radioactivity by water-treatment processes and biological processes; treatment on site by chemical precipitation , ion exchange and absorption, electrodialysis, solvent extraction and other methods; treatment on site including evaporation and storage; handling and treatment of solid wastes; public health implications. Appendices include a glossary; standards for protection against radiation; federal radiation council radiation protection guidance for federal agencies; site selection criteria for nuclear energy facilities.

  6. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  7. Incorporating Handling Qualities Analysis into Rotorcraft Conceptual Design

    Science.gov (United States)

    Lawrence, Ben

    2014-01-01

    This paper describes the initial development of a framework to incorporate handling qualities analyses into a rotorcraft conceptual design process. In particular, the paper describes how rotorcraft conceptual design level data can be used to generate flight dynamics models for handling qualities analyses. Also, methods are described that couple a basic stability augmentation system to the rotorcraft flight dynamics model to extend analysis to beyond that of the bare airframe. A methodology for calculating the handling qualities characteristics of the flight dynamics models and for comparing the results to ADS-33E criteria is described. Preliminary results from the application of the handling qualities analysis for variations in key rotorcraft design parameters of main rotor radius, blade chord, hub stiffness and flap moment of inertia are shown. Varying relationships, with counteracting trends for different handling qualities criteria and different flight speeds are exhibited, with the action of the control system playing a complex part in the outcomes. Overall, the paper demonstrates how a broad array of technical issues across flight dynamics stability and control, simulation and modeling, control law design and handling qualities testing and evaluation had to be confronted to implement even a moderately comprehensive handling qualities analysis of relatively low fidelity models. A key outstanding issue is to how to 'close the loop' with an overall design process, and options for the exploration of how to feedback handling qualities results to a conceptual design process are proposed for future work.

  8. Enclosure for handling high activity materials abstract

    International Nuclear Information System (INIS)

    Jimeno de Osso, F.; Dominguez Rodriguez, G.; Cruz Castillo, F. de la; Rodriguez Esteban, A.

    1977-01-01

    One of the most important problems that are met at the laboratories producing and handling radioisotopes is that of designing, building and operating enclosures suitable for the safe handling of active substances. With that purpose in mind, an enclosure has been designed and built for handling moderately high activities under a shielding made of 150 mm thick lead. A description is given of those aspects that may be of interest to people working in this field. (author) [es

  9. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  10. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  11. Participation Apprehensive Students: The Influence of Face Support and Instructor-Student Rapport on Classroom Participation

    Science.gov (United States)

    Frisby, Brandi N.; Berger, Erin; Burchett, Molly; Herovic, Emina; Strawser, Michael G.

    2014-01-01

    Participation is considered a positive student classroom behavior that can also create a face-threatening classroom climate that may be alleviated through interpersonal relationships with the instructor. Participants (N?=?189) categorized as low apprehensives perceived less face threat and more face support when participating; moderate…

  12. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  13. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  14. Development of tritium-handling technique

    International Nuclear Information System (INIS)

    Ohmura, Hiroshi; Hosaka, Akio; Okamoto, Takahumi

    1988-01-01

    The overview of developing activities for tritium-handling techniques in IHI are presented. To establish a fusion power plant, tritium handling is one of the key technologies. Recently in JAERI, conceptual design of FER (Fusion Experimental Reactor) has been carried out, and the FER system requires a processing system for a large amount of tritium. IHI concentrate on investigation of fuel gas purification, isotope separation and storage systems under contract with Toshiba Corporation. Design results of the systems and each components are reviewed. IHI has been developing fundamental handling techniques which are the ZrNi bed for hydrogen isotope storage and isotope separation by laser. The ZrNi bed with a tritium storage capacity of 1000 Ci has been constructed and recovery capability of the hydrogen isotope until 10 -4 Torr {0.013 Pa} was confirmed. In laser isotope separation, the optimum laser wave length has been determined. (author)

  15. Handling of waste in ports

    International Nuclear Information System (INIS)

    Olson, P.H.

    1994-01-01

    The regulations governing the handling of port-generated waste are often national and/or local legislation, whereas the handling of ship-generated waste is governed by the MARPOL Convention in most parts of the world. The handling of waste consists of two main phases -collection and treatment. Waste has to be collected in every port and on board every ship, whereas generally only some wastes are treated and to a certain degree in ports and on board ships. This paper considers the different kinds of waste generated in both ports and on board ships, where and how it is generated, how it could be collected and treated. The two sources are treated together to show how some ship-generated waste may be treated in port installations primarily constructed for the treatment of the port-generated waste, making integrated use of the available treatment facilities. (author)

  16. Magnetic resonance imaging of meniscal bucket-handle tears

    International Nuclear Information System (INIS)

    Dfouni, N.; Garcia, J.; Kindynis, Ph.; Bosson, D.

    1997-01-01

    To define MR signs of meniscal bucket-handle tears and evaluate the diagnostic efficiency of this technique. Retrospective study of 30 patients with a meniscal bucket-handle tear and 30 with a different type of tear, all proven by arthroscopy. The following MR signs of a bucket-handle tear were evaluated: 'separate meniscal fragment, 'double posterior cruciate ligament', 'snake sign' and 'double anterior horn'. A correct diagnosis of a bucket-handle tear was only made in 18/30 of patients. Several of the MR signs were seen in the same patient in 17 cases. A double posterior cruciate ligament was present only in cases of medial meniscus tears. The 12 menisci without these signs, and therefore not diagnosed as bucket-handle tears, were all classified as meniscal tears on the basis of signal extending to the meniscal surface. Nine of these were not displaced into the inter-condylar notch at arthroscopy. The interobserver agreement was excellent: kappa 0.88. The diagnosis of a bucket-handle meniscal tear, if it is displaced, can be made when one or more of the four MR evaluated signs are present. Other forms of meniscal tears are only exceptionally diagnosed as bucket-handle tears. (authors)

  17. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  18. How to Handle Impasses in Bargaining.

    Science.gov (United States)

    Durrant, Robert E.

    Guidelines in an outline format are presented to school board members and administrators on how to handle impasses in bargaining. The following two rules are given: there sometimes may be strikes, but there always will be settlements; and on the way to settlements, there always will be impasses. Suggestions for handling impasses are listed under…

  19. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  20. Mental health of recently resettled refugees from the Middle East in Sweden: the impact of pre-resettlement trauma, resettlement stress and capacity to handle stress.

    Science.gov (United States)

    Lindencrona, Fredrik; Ekblad, Solvig; Hauff, Edvard

    2008-02-01

    The pathways to symptoms of common mental disorder and post-traumatic stress symptoms among refugees during resettlement need to be better specified. We aim to identify models of these different mental health outcomes among refugees during resettlement, taking pre-migration, migration and post-migration stress conditions, a person's capacity to handle such stress and socio-demographic variables into consideration. A new questionnaire developed to better cover resettlement stress, as well as pre-resettlement trauma exposures and different measures of a person's capacity to handle stress, was administered to 124 Middle Eastern refugees that had been granted permanent residency in Sweden only a few months before responding. We found four dimensions of resettlement stress: social and economic strain, alienation, discrimination and status loss and violence and threats in Sweden, that account for 62% of the total variance in resettlement stress. Social and economic strain and alienation are important for explaining symptoms of common mental disorder. In the model of core post-traumatic stress symptoms, pre-resettlement trauma exposure seems to have the strongest impact. A person's capacity to handle stress plays significant, direct and mediating roles in both models. The impact of resettlement stressors in the context of the whole migration process for different mental health outcomes is discussed.

  1. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  2. Food safety knowledge, attitudes and self-reported practices among Ontario high school students.

    Science.gov (United States)

    Majowicz, Shannon E; Diplock, Kenneth J; Leatherdale, Scott T; Bredin, Chad T; Rebellato, Steven; Hammond, David; Jones-Bitton, Andria; Dubin, Joel A

    2016-03-16

    To measure the food safety knowledge, attitudes and self-reported practices of high school students in Ontario. We administered a school-wide paper survey to the student body (n = 2,860) of four Ontario high schools. We developed the survey by selecting questions from existing, validated questionnaires, prioritizing questions that aligned with the Canadian Partnership for Consumer Food Safety Education's educational messages and the food safety objectives from the 2013 Ontario High School Curriculum. One in five students reported currently handling food in commercial or public-serving venues; of these, 45.1% had ever taken a course that taught them how to prepare food (e.g., food and nutrition classes, food handler certification). Food safety knowledge among respondents was low. For example, 17.3% knew that the best way to determine whether hamburgers were cooked enough to eat was to measure the temperature with a food thermometer. Despite low knowledge, most respondents (72.7%) reported being confident that they could cook safe, healthy meals for themselves and their families. Safe food handling practices were frequently self-reported. Most students (86.5%) agreed that being able to cook safe, healthy meals was an important life skill, although their interest in learning about safe food handling and concern about foodborne disease were less pronounced. Our findings suggest that food safety knowledge is low, yet confidence in preparing safe, healthy meals is high, among high school students. Because work and volunteer opportunities put students in contact with both the public and food, this group is important to target for increased education about safe food handling.

  3. Threat Perception and Attitudes of Adolescents Towards Re-Introduced Wild Animals: A qualitative study of young learners from affected regions in Germany

    Science.gov (United States)

    Hermann, Nadin; Menzel, Susanne

    2013-12-01

    Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German adolescents' (n = 31, Mage = 16.6 years) attitudes towards animal reintroduction, their threat and coping appraisal about wildlife and their knowledge of local endangered species. We found that students had rather limited knowledge of local endangered species. After Kellert's categories of animal attitudes, the adolescents showed a strong moralistic view on wildlife return. Naturalistic, ecologistic and utilitarian views were also strongly apparent. According to the Protection Motivation Theory, perceived threats could be identified as threats to animals on the one hand and threats to human interests on the other. Such threat perceptions often lead to a dilemma, which made it difficult to decide upon the priorities of wildlife protection versus protection of human interests. Coping mechanism to reduce threats to human interests as mentioned by the participants included restrictions of the animal as well as strategies that focused on responsibility by humans. Regarding coping mechanism to prevent the species' extinction, participants showed a relatively superficial understanding. Furthermore, we found that participants from regions where wolves are currently immigrating or European bison are being reintroduced showed a more positive understanding of the respective animal. Our findings are discussed in the light of this topic's potential as an example of a real-life socio-scientific issue in classroom discussions.

  4. WASTE HANDLING BUILDING FIRE PROTECTION SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    J. D. Bigbee

    2000-06-21

    The Waste Handling Building Fire Protection System provides the capability to detect, control, and extinguish fires and/or mitigate explosions throughout the Waste Handling Building (WHB). Fire protection includes appropriate water-based and non-water-based suppression, as appropriate, and includes the distribution and delivery systems for the fire suppression agents. The Waste Handling Building Fire Protection System includes fire or explosion detection panel(s) controlling various detectors, system actuation, annunciators, equipment controls, and signal outputs. The system interfaces with the Waste Handling Building System for mounting of fire protection equipment and components, location of fire suppression equipment, suppression agent runoff, and locating fire rated barriers. The system interfaces with the Waste Handling Building System for adequate drainage and removal capabilities of liquid runoff resulting from fire protection discharges. The system interfaces with the Waste Handling Building Electrical Distribution System for power to operate, and with the Site Fire Protection System for fire protection water supply to automatic sprinklers, standpipes, and hose stations. The system interfaces with the Site Fire Protection System for fire signal transmission outside the WHB as needed to respond to a fire emergency, and with the Waste Handling Building Ventilation System to detect smoke and fire in specific areas, to protect building high-efficiency particulate air (HEPA) filters, and to control portions of the Waste Handling Building Ventilation System for smoke management and manual override capability. The system interfaces with the Monitored Geologic Repository (MGR) Operations Monitoring and Control System for annunciation, and condition status.

  5. WASTE HANDLING BUILDING FIRE PROTECTION SYSTEM DESCRIPTION DOCUMENT

    International Nuclear Information System (INIS)

    J. D. Bigbee

    2000-01-01

    The Waste Handling Building Fire Protection System provides the capability to detect, control, and extinguish fires and/or mitigate explosions throughout the Waste Handling Building (WHB). Fire protection includes appropriate water-based and non-water-based suppression, as appropriate, and includes the distribution and delivery systems for the fire suppression agents. The Waste Handling Building Fire Protection System includes fire or explosion detection panel(s) controlling various detectors, system actuation, annunciators, equipment controls, and signal outputs. The system interfaces with the Waste Handling Building System for mounting of fire protection equipment and components, location of fire suppression equipment, suppression agent runoff, and locating fire rated barriers. The system interfaces with the Waste Handling Building System for adequate drainage and removal capabilities of liquid runoff resulting from fire protection discharges. The system interfaces with the Waste Handling Building Electrical Distribution System for power to operate, and with the Site Fire Protection System for fire protection water supply to automatic sprinklers, standpipes, and hose stations. The system interfaces with the Site Fire Protection System for fire signal transmission outside the WHB as needed to respond to a fire emergency, and with the Waste Handling Building Ventilation System to detect smoke and fire in specific areas, to protect building high-efficiency particulate air (HEPA) filters, and to control portions of the Waste Handling Building Ventilation System for smoke management and manual override capability. The system interfaces with the Monitored Geologic Repository (MGR) Operations Monitoring and Control System for annunciation, and condition status

  6. Quinone-induced protein handling changes: Implications for major protein handling systems in quinone-mediated toxicity

    International Nuclear Information System (INIS)

    Xiong, Rui; Siegel, David; Ross, David

    2014-01-01

    Para-quinones such as 1,4-Benzoquinone (BQ) and menadione (MD) and ortho-quinones including the oxidation products of catecholamines, are derived from xenobiotics as well as endogenous molecules. The effects of quinones on major protein handling systems in cells; the 20/26S proteasome, the ER stress response, autophagy, chaperone proteins and aggresome formation, have not been investigated in a systematic manner. Both BQ and aminochrome (AC) inhibited proteasomal activity and activated the ER stress response and autophagy in rat dopaminergic N27 cells. AC also induced aggresome formation while MD had little effect on any protein handling systems in N27 cells. The effect of NQO1 on quinone induced protein handling changes and toxicity was examined using N27 cells stably transfected with NQO1 to generate an isogenic NQO1-overexpressing line. NQO1 protected against BQ–induced apoptosis but led to a potentiation of AC- and MD-induced apoptosis. Modulation of quinone-induced apoptosis in N27 and NQO1-overexpressing cells correlated only with changes in the ER stress response and not with changes in other protein handling systems. These data suggested that NQO1 modulated the ER stress response to potentiate toxicity of AC and MD, but protected against BQ toxicity. We further demonstrated that NQO1 mediated reduction to unstable hydroquinones and subsequent redox cycling was important for the activation of the ER stress response and toxicity for both AC and MD. In summary, our data demonstrate that quinone-specific changes in protein handling are evident in N27 cells and the induction of the ER stress response is associated with quinone-mediated toxicity. - Highlights: • Unstable hydroquinones contributed to quinone-induced ER stress and toxicity

  7. Quinone-induced protein handling changes: Implications for major protein handling systems in quinone-mediated toxicity

    Energy Technology Data Exchange (ETDEWEB)

    Xiong, Rui; Siegel, David; Ross, David, E-mail: david.ross@ucdenver.edu

    2014-10-15

    Para-quinones such as 1,4-Benzoquinone (BQ) and menadione (MD) and ortho-quinones including the oxidation products of catecholamines, are derived from xenobiotics as well as endogenous molecules. The effects of quinones on major protein handling systems in cells; the 20/26S proteasome, the ER stress response, autophagy, chaperone proteins and aggresome formation, have not been investigated in a systematic manner. Both BQ and aminochrome (AC) inhibited proteasomal activity and activated the ER stress response and autophagy in rat dopaminergic N27 cells. AC also induced aggresome formation while MD had little effect on any protein handling systems in N27 cells. The effect of NQO1 on quinone induced protein handling changes and toxicity was examined using N27 cells stably transfected with NQO1 to generate an isogenic NQO1-overexpressing line. NQO1 protected against BQ–induced apoptosis but led to a potentiation of AC- and MD-induced apoptosis. Modulation of quinone-induced apoptosis in N27 and NQO1-overexpressing cells correlated only with changes in the ER stress response and not with changes in other protein handling systems. These data suggested that NQO1 modulated the ER stress response to potentiate toxicity of AC and MD, but protected against BQ toxicity. We further demonstrated that NQO1 mediated reduction to unstable hydroquinones and subsequent redox cycling was important for the activation of the ER stress response and toxicity for both AC and MD. In summary, our data demonstrate that quinone-specific changes in protein handling are evident in N27 cells and the induction of the ER stress response is associated with quinone-mediated toxicity. - Highlights: • Unstable hydroquinones contributed to quinone-induced ER stress and toxicity.

  8. Survey of tritiated oil sources and handling practices

    International Nuclear Information System (INIS)

    Miller, J.M.

    1994-08-01

    Tritium interactions with oil sources (primarily associated with pumps) in tritium-handling facilities can lead to the incorporation of tritium in the oil and the production of tritiated hydrocarbons. This results in a source of radiological hazard and the need for special handling considerations during maintenance, decontamination, decommissioning and waste packaging and storage. The results of a general survey of tritiated-oil sources and their associated characteristics, handling practices, analysis techniques and waste treatment/storage methods are summarized here. Information was obtained from various tritium-handling laboratories, fusion devices, and CANDU plants. 38 refs., 1 fig

  9. Effects of handling on fear reactions in young Icelandic horses

    DEFF Research Database (Denmark)

    Marsbøll, Anna Feldberg; Christensen, Janne Winther

    2015-01-01

    To investigate the effect of a short-term standardised handling procedure on reactions of young horses in 2 types of fear tests (including and excluding human handling). Study design An experimental study with 3-year-old Icelandic horses (n = 24). Methods Handled horses (n = 12) were trained according...... to a standardised handling procedure whereas controls (n = 12) remained untrained. Behavioural and heart rate responses in a novel object test and 2 handling fear tests (HFTs) were measured. The HFTs were conducted with both an unknown (HFT-unknown) and a known handler (HFT-known). Results There was no effect...... correlated significantly between tests. Conclusions Previous handling may affect the behavioural fear response of horses when handled by their usual handler, whereas this effect did not apply to an unknown handler. Heart rates appeared unaffected by handling and may be a more reliable indicator...

  10. Coping with stereotype threat: denial as an impression management strategy.

    Science.gov (United States)

    von Hippel, William; von Hippel, Courtney; Conway, Leanne; Preacher, Kristopher J; Schooler, Jonathan W; Radvansky, Gabriel A

    2005-07-01

    Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype of incompetence (Study 1) and hostel-dwelling older adults (Study 2) were more likely to deny incompetence if they were high in impression management. African Americans (Study 3) showed a similar pattern of denying cognitive incompetence, which emerged primarily when they were interviewed by a White experimenter and had attended a predominantly Black high school. In Study 4, White students who expected to take an IQ test and were threatened by a stereotype of being less intelligent than Asians were more likely to deny that intelligence is important if they were high in impression management.

  11. Dark Triad of Croatian Management Students

    Directory of Open Access Journals (Sweden)

    Mario Bogdanovic

    2015-12-01

    Full Text Available This paper researches the so-called “dark triad” personality traits of management student populations, because of their potential to generate dysfunctional organizational behavior and processes. Namely, the dark triad with characteristics such as lack of empathy, willingness to manipulate others (for self-betterment, antagonism, and belief in one’s own superiority can represent a real organizational threat. The goal of this paper is to stimulate thinking and discussion around this issue. The paper is based on questionnaire measurement that adopts the standardized short dark triad measurement instrument of Jones and Paulhus (2012 who measure the scales of Machiavellianism (9 items, narcissism (9 items and psychopathy (9 items. The sample included 150 students of professional management studies at the Faculty of Economics, University of Split in Croatia. Results of the Croatian students are compared with the results of 387 students in Canada. The results suggest significant statistical differences in the “dark triad” variables between the Canadian and Croatian samples. The practical implications of this paper are in raising awareness and stimulating the thinking of managers around the potential of the “dark triad” traits of engaged human resources to create organizational crisis, and to make preventive and responsive actions to manage the “toxic triad” threat.

  12. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  13. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  14. Handling wood shavings

    Energy Technology Data Exchange (ETDEWEB)

    1974-09-18

    Details of bulk handling equipment suitable for collection and compressing wood waste from commercial joinery works are discussed. The Redler Bin Discharger ensures free flow of chips from storage silo discharge prior to compression into briquettes for use as fuel or processing into chipboard.

  15. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  16. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  17. Swine flu. Mexico's handling of A/H1N1 in comparative perspective.

    Science.gov (United States)

    Ear, Sophal

    2012-01-01

    Emerging infectious diseases (EIDs) pose international security threats because of their potential to inflict harm upon humans, crops, livestock, health infrastructure, and economies. Despite the scale of this threat, there are inherent limitations in preventing and controlling EIDs, including the scope of current disease surveillance efforts. All of this leads to the following questions in the context of Mexico's recent swine flu experience: What were the cultural, political, and economic challenges to Influenza A/H1N1 virus response in Mexico? By way of comparison, what can we learn from the U.S. experience in 1976 with A/New Jersey/76 (Hsw1N1), later referred to as H1N1? This article explores the comparative political economy of Mexico's handling of influenza virus A/H1N1 outbreak in 2009. Research provides notable observations-based on the strengths and weaknesses of each country's response--that can be used as a starting point of discussion for the design of effective EIDs surveillance programs in developing and middle-income countries. In the U.S., the speed and efficiency of the 1976 U.S. mobilization against H1N1 was laudable. Although the U.S. response to the outbreak is seldom praised, the unity of the scientific and political communities demonstrated the national ability to respond to the situation. Mexico's strongest characteristics were its transparency, as well as the cooperation the country exhibited with other nations, particularly the U.S. and Canada. While Mexico showed savvy in its effective management of public and media relations, as the article details, political, economic, and cultural problems persisted.

  18. Handling of bulk solids theory and practice

    CERN Document Server

    Shamlou, P A

    1990-01-01

    Handling of Bulk Solids provides a comprehensive discussion of the field of solids flow and handling in the process industries. Presentation of the subject follows classical lines of separate discussions for each topic, so each chapter is self-contained and can be read on its own. Topics discussed include bulk solids flow and handling properties; pressure profiles in bulk solids storage vessels; the design of storage silos for reliable discharge of bulk materials; gravity flow of particulate materials from storage vessels; pneumatic transportation of bulk solids; and the hazards of solid-mater

  19. Torus sector handling system

    International Nuclear Information System (INIS)

    Grisham, D.L.

    1981-01-01

    A remote handling system is proposed for moving a torus sector of the accelerator from under the cryostat to a point where it can be handled by a crane and for the reverse process for a new sector. Equipment recommendations are presented, as well as possible alignment schemes. Some general comments about future remote-handling methods and the present capabilities of existing systems will also be included. The specific task to be addressed is the removal and replacement of a 425 to 450 ton torus sector. This requires a horizontal movement of approx. 10 m from a normal operating position to a point where its further transport can be accomplished by more conventional means (crane or floor transporter). The same horizontal movement is required for reinstallation, but a positional tolerance of 2 cm is required to allow reasonable fit-up for the vacuum seal from the radial frames to the torus sector. Since the sectors are not only heavy but rather tall and narrow, the transport system must provide a safe, stable, and repeatable method fo sector movement. This limited study indicates that the LAMPF-based method of transporting torus sectors offers a proven method of moving heavy items. In addition, the present state of the art in remote equipment is adequate for FED maintenance

  20. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  1. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  2. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  3. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  4. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  5. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  6. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  7. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  8. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  9. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  10. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  11. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  12. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  13. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  14. Getting to grips with remote handling and robotics

    Energy Technology Data Exchange (ETDEWEB)

    Mosey, D [Ontario Hydro, Toronto (Canada)

    1984-12-01

    A report on the Canadian Nuclear Society Conference on robotics and remote handling in the nuclear industry, September 1984. Remote handling in reactor operations, particularly in the Candu reactors is discussed, and the costs and benefits of use of remote handling equipment are considered. Steam generator inspection and repair is an area in which practical application of robotic technology has made a major advance.

  15. Responsibility/Threat Overestimation Moderates the Relationship Between Contamination-Based Disgust and Obsessive-Compulsive Concerns About Sexual Orientation.

    Science.gov (United States)

    Ching, Terence H W; Williams, Monnica T; Siev, Jedidiah; Olatunji, Bunmi O

    2018-05-01

    Disgust has been shown to perform a "disease-avoidance" function in contamination fears. However, no studies have examined the relevance of disgust to obsessive-compulsive (OC) concerns about sexual orientation (e.g., fear of one's sexual orientation transforming against one's will, and compulsive avoidance of same-sex and/or gay or lesbian individuals to prevent that from happening). Therefore, we investigated whether the specific domain of contamination-based disgust (i.e., evoked by the perceived threat of transmission of essences between individuals) predicted OC concerns about sexual orientation, and whether this effect was moderated/amplified by obsessive beliefs, in evaluation of a "sexual orientation transformation-avoidance" function. We recruited 283 self-identified heterosexual college students (152 females, 131 males; mean age = 20.88 years, SD = 3.19) who completed three measures assessing disgust, obsessive beliefs, and OC concerns about sexual orientation. Results showed that contamination-based disgust (β = .17), responsibility/threat overestimation beliefs (β = .15), and their interaction (β = .17) each uniquely predicted OC concerns about sexual orientation, ts = 2.22, 2.50, and 2.90, ps contamination-based disgust accompanied by strong responsibility/threat overestimation beliefs predicted more severe OC concerns about sexual orientation, β = .48, t = 3.24, p contamination-based disgust, and exacerbated by responsibility/threat overestimation beliefs. Treatment for OC concerns about sexual orientation should target such beliefs.

  16. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  17. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  18. When Virtual Muscularity Enhances Physical Endurance: Masculinity Threat and Compensatory Avatar Customization Among Young Male Adults.

    Science.gov (United States)

    Lee-Won, Roselyn J; Tang, Wai Yen; Kibbe, Mackenzie R

    2017-01-01

    Masculinity-threatened men attempt to resolve the negative states caused by the threat through compensatory behavior such as public display of muscularity, which constitutes one way in which men physically establish masculinity. Avatars serve as a key means for self-presentation in technology-mediated environments, and compensatory motives can drive avatar customization. Noting this, the present research examined whether masculinity-threatened young men engage in compensatory avatar customization and whether such customization can be self-affirming. Specifically, we conducted a laboratory experiment to investigate the effects of masculinity threat on customization of avatar muscularity and physical endurance on a task that represents behavioral self-regulation. Data from 238 male college students revealed that masculinity-threatened young men customized their avatar to have greater muscle definition than did their nonthreatened counterparts, and greater muscle definition of the customized avatar predicted greater physical endurance on a handgrip task. Furthermore, muscle definition of the customized avatar significantly mediated the relationship between masculinity threat and physical endurance. None of these effects were moderated by masculine norm conformity, which suggested that the effects overrode individual differences in the extent to which participants conformed to masculine norms and expectations. Theoretical and practical implications of these findings are discussed.

  19. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  20. Handling knowledge on osteoporosis - a qualitative study

    DEFF Research Database (Denmark)

    Nielsen, Dorthe; Huniche, Lotte; Brixen, Kim

    2013-01-01

    Scand J Caring Sci; 2012 Handling knowledge on osteoporosis - a qualitative study The aim of this qualitative study was to increase understanding of the importance of osteoporosis information and knowledge for patients' ways of handling osteoporosis in their everyday lives. Interviews were...

  1. Redefining NHS complaint handling--the real challenge.

    Science.gov (United States)

    Seelos, L; Adamson, C

    1994-01-01

    More and more organizations find that a constructive and open dialogue with their customers can be an effective strategy for building long-term customer relations. In this context, it has been recognized that effective complaint-contact handling can make a significant contribution to organizations' attempts to maximize customer satisfaction and loyalty. Within the NHS, an intellectual awareness exists that effective complaint/contact handling can contribute to making services more efficient and cost-effective by developing customer-oriented improvement initiatives. Recent efforts have focused on redefining NHS complaint-handling procedures to make them more user-friendly and effective for both NHS employees and customers. Discusses the challenges associated with opening up the NHS to customer feedback. Highlights potential weaknesses in the current approach and argues that the real challenge is for NHS managers to facilitate a culture change that moves the NHS away from a long-established defensive complaint handling practice.

  2. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  3. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  4. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  5. The Association Between Secondhand Harms From Alcohol and Mental Health Outcomes Among Postsecondary Students.

    Science.gov (United States)

    Thompson, Kara; Davis-MacNevin, Parnell; Teehan, Michael; Stewart, Sherry

    2017-01-01

    There is a paucity of research on the prevalence and consequences of secondhand harms from alcohol. The current study (a) investigated whether secondhand harms can be clustered into latent factors that reflect distinct but related types of harms and (b) examined the associations between experiencing secondhand harms and mental health outcomes, including anxiety, depression, and subjective mental well-being, among first-year Canadian postsecondary students. The moderating effect of living arrangement (i.e., living on campus or not) on the associations was also tested. The sample included 1,885 first-year undergraduate students (49.8% female; mean age = 18.31 years) from three Canadian universities. Exploratory and confirmatory factor analyses were used to determine the factor structure of the harms measure. Path analysis was used to assess the association between harms and mental health outcomes. Models accounted for age, sex, and frequency of heavy drinking. Seventy-one percent of the sample reported experiencing at least one type of secondhand harm. The harms examined clustered into two distinct but related factors: strains (e.g., interrupted sleep) and threats (e.g., being harassed or insulted). Both threats and strains were associated with higher levels of anxiety and depression and poorer subjective well-being. Associations were stronger for threats and did not differ by living arrangement. Experiencing secondhand harms from alcohol, particularly threats, may have negative implications for student mental health over and above students' own drinking. Programs and policies on university campuses targeting both alcohol use and mental health should consider how to reduce both the prevalence and impact of secondhand harms from alcohol on students.

  6. MHSS: a material handling system simulator

    Energy Technology Data Exchange (ETDEWEB)

    Pomernacki, L.; Hollstien, R.B.

    1976-04-07

    A Material Handling System Simulator (MHSS) program is described that provides specialized functional blocks for modeling and simulation of nuclear material handling systems. Models of nuclear fuel fabrication plants may be built using functional blocks that simulate material receiving, storage, transport, inventory, processing, and shipping operations as well as the control and reporting tasks of operators or on-line computers. Blocks are also provided that allow the user to observe and gather statistical information on the dynamic behavior of simulated plants over single or replicated runs. Although it is currently being developed for the nuclear materials handling application, MHSS can be adapted to other industries in which material accountability is important. In this paper, emphasis is on the simulation methodology of the MHSS program with application to the nuclear material safeguards problem. (auth)

  7. Development of Safe Food Handling Guidelines for Korean Consumers.

    Science.gov (United States)

    Kang, Hee-Jin; Lee, Min-Woo; Hwang, In-Kyeong; Kim, Jeong-Weon

    2015-08-01

    The purpose of this study was to develop guidelines for Korean consumers with regard to safe food handling practices at home by identifying current food handling issues. Korean consumers' behaviors regarding their safe food handling were identified via survey questionnaires that included items on individual hygiene practices, prepreparation steps when cooking, the cooking process, and the storage of leftover foods. The subjects were 417 Korean parents with elementary school children living in Seoul and Gyeonggi Province in the central area of Korea. The survey results revealed gaps between the knowledge or practices of Korean consumers and scientific evidence pertaining to safe food handling practices. Based on these findings, a leaflet on safe food handling guidelines was developed in accordance with Korean food culture. These guidelines suggest personal hygiene practices as well as fundamental principles and procedures for safe food handling from the stage of food purchase to that of keeping leftover dishes. A pilot application study with 50 consumers revealed that the guidelines effectively improved Korean consumers' safe food handling practices, suggesting that they can serve as practical educational material suitable for Korean consumers.

  8. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  9. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  10. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  11. Environmental and safety aspects. The best of 'powder handling and processing' 1989 - 1997. 'Bulk solids handling' 1992 - 1997 (H/2000)

    Energy Technology Data Exchange (ETDEWEB)

    Woehlbier, R.H. (ed.)

    2000-07-01

    The book contains articles published either during 1992-1997 in ''bulk solids handling'' or during 1989-1997 in ''powder handling and processing''. Main topics are aspects of safety and environmental protection in bulk solids handling: dusts, hazardous powders, prevention and mitigation of dust explosions, powdered coal handling, dedusting, filters, electrostatic precipitation, materials recovery, occupational safety.(uke)

  12. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  13. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  14. Connecting the Dots: Threat Assessment, Depression and the Troubled Student

    Science.gov (United States)

    Harwood, Valerie

    2011-01-01

    One of the numerous responses to the mass shooting at Virginia Tech in April 2007 has been the call for higher education institutions in the United States to take an increased role in identifying troubled students. This has had widely felt effects, with educational institutions across the United States developing mechanisms such as Threat…

  15. 7 CFR 959.126 - Handling of culls.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Handling of culls. 959.126 Section 959.126 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements...) Handled for canning or freezing. (b) As a safeguard against culls entering fresh market channels each...

  16. Survey of postharvest handling, preservation and processing ...

    African Journals Online (AJOL)

    Survey of postharvest handling, preservation and processing practices along the camel milk chain in Isiolo district, Kenya. ... Despite the important contribution of camel milk to food security for pastoralists in Kenya, little is known about the postharvest handling, preservation and processing practices. In this study, existing ...

  17. Handling uncertainty through adaptiveness in planning approaches

    NARCIS (Netherlands)

    Zandvoort, M.; Vlist, van der M.J.; Brink, van den A.

    2018-01-01

    Planners and water managers seek to be adaptive to handle uncertainty through the use of planning approaches. In this paper, we study what type of adaptiveness is proposed and how this may be operationalized in planning approaches to adequately handle different uncertainties. We took a

  18. PREPD O and VE remote handling system

    International Nuclear Information System (INIS)

    Theil, T.N.

    1985-01-01

    The Process Experimental Pilot Plant (PREPP) at the Idaho National Engineering Laboratory is designed for volume reduction and packaging of transuranic (TRU) waste. The PREPP opening and verification enclosure (O and VE) remote handling system, within that facility, is designed to provide examination of the contents of various TRU waste storage containers. This remote handling system will provide the means of performing a hazardous operation that is currently performed manually. The TeleRobot to be used in this system is a concept that will incorporate and develop man in the loop operation (manual mode), standardized automatic sequencing of end effector tools, increased payload and reach over currently available computer-controlled robots, and remote handling of a hazardous waste operation. The system is designed within limited space constraints and an operation that was originally planned, and is currently being manually performed at other plants. The PREPP O and VE remote handling system design incorporates advancing technology to improve the working environment in the nuclear field

  19. Harvesting and handling agricultural residues for energy

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, B.M.; Summer, H.R.

    1986-05-01

    Significant progress in understanding the needs for design of agricultural residue collection and handling systems has been made but additional research is required. Recommendations are made for research to (a) integrate residue collection and handling systems into general agricultural practices through the development of multi-use equipment and total harvest systems; (b) improve methods for routine evaluation of agricultural residue resources, possibly through remote sensing and image processing; (c) analyze biomass properties to obtain detailed data relevant to engineering design and analysis; (d) evaluate long-term environmental, social, and agronomic impacts of residue collection; (e) develop improved equipment with higher capacities to reduce residue collection and handling costs, with emphasis on optimal design of complete systems including collection, transportation, processing, storage, and utilization; and (f) produce standard forms of biomass fuels or products to enhance material handling and expand biomass markets through improved reliability and automatic control of biomass conversion and other utilization systems. 118 references.

  20. Investigation of Millennial Students' Responses to a Shelter-in-Place Experience

    Science.gov (United States)

    Johnson, Thomas C.; Frick, Melodie H.

    2016-01-01

    This study investigated millennial students' responses to an armed gunman threat and shelter-in-place warnings that occurred on a university campus. Using descriptive statistics and quantitative analysis, several significant differences were found for students' responses for sheltering-in-place and engaging in protective behaviors. Baxter Magolda'…

  1. 30 CFR 75.817 - Cable handling and support systems.

    Science.gov (United States)

    2010-07-01

    ... High-Voltage Longwalls § 75.817 Cable handling and support systems. Longwall mining equipment must be provided with cable-handling and support systems that are constructed, installed and maintained to minimize... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Cable handling and support systems. 75.817...

  2. Cooper-Harper Experience Report for Spacecraft Handling Qualities Applications

    Science.gov (United States)

    Bailey, Randall E.; Jackson, E. Bruce; Bilimoria, Karl D.; Mueller, Eric R.; Frost, Chad R.; Alderete, Thomas S.

    2009-01-01

    A synopsis of experience from the fixed-wing and rotary-wing aircraft communities in handling qualities development and the use of the Cooper-Harper pilot rating scale is presented as background for spacecraft handling qualities research, development, test, and evaluation (RDT&E). In addition, handling qualities experiences and lessons-learned from previous United States (US) spacecraft developments are reviewed. This report is intended to provide a central location for references, best practices, and lessons-learned to guide current and future spacecraft handling qualities RDT&E.

  3. Cellular Manufacturing System with Dynamic Lot Size Material Handling

    Science.gov (United States)

    Khannan, M. S. A.; Maruf, A.; Wangsaputra, R.; Sutrisno, S.; Wibawa, T.

    2016-02-01

    Material Handling take as important role in Cellular Manufacturing System (CMS) design. In several study at CMS design material handling was assumed per pieces or with constant lot size. In real industrial practice, lot size may change during rolling period to cope with demand changes. This study develops CMS Model with Dynamic Lot Size Material Handling. Integer Linear Programming is used to solve the problem. Objective function of this model is minimizing total expected cost consisting machinery depreciation cost, operating costs, inter-cell material handling cost, intra-cell material handling cost, machine relocation costs, setup costs, and production planning cost. This model determines optimum cell formation and optimum lot size. Numerical examples are elaborated in the paper to ilustrate the characterictic of the model.

  4. Biology Students Building Computer Simulations Using StarLogo TNG

    Science.gov (United States)

    Smith, V. Anne; Duncan, Ishbel

    2011-01-01

    Confidence is an important issue for biology students in handling computational concepts. This paper describes a practical in which honours-level bioscience students simulate complex animal behaviour using StarLogo TNG, a freely-available graphical programming environment. The practical consists of two sessions, the first of which guides students…

  5. Repository waste-handling operations, 1998

    International Nuclear Information System (INIS)

    Cottam, A.E.; Connell, L.

    1986-04-01

    The Civilian Radioactive Waste Management Program Mission Plan and the Generic Requirements for a Mined Geologic Disposal System state that beginning in 1998, commercial spent fuel not exceeding 70,000 metric tons of heavy metal, or a quantity of solidified high-level radioactive waste resulting from the reprocessing of such a quantity of spent fuel, will be shipped to a deep geologic repository for permanent storage. The development of a waste-handling system that can process 3000 metric tons of heavy metal annually will require the adoption of a fully automated approach. The safety and minimum exposure of personnel will be the prime goals of the repository waste handling system. A man-out-of-the-loop approach will be used in all operations including the receipt of spent fuel in shipping casks, the inspection and unloading of the spent fuel into automated hot-cell facilities, the disassembly of spent fuel assemblies, the consolidation of fuel rods, and the packaging of fuel rods into heavy-walled site-specific containers. These containers are designed to contain the radionuclides for up to 1000 years. The ability of a repository to handle more than 6000 pressurized water reactor spent-fuel rods per day on a production basis for approximately a 23-year period will require that a systems approach be adopted that combines space-age technology, robotics, and sophisticated automated computerized equipment. New advanced inspection techniques, maintenance by robots, and safety will be key factors in the design, construction, and licensing of a repository waste-handling facility for 1998

  6. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  7. University of Venda's male students' attitudes towards contraception and family planning.

    Science.gov (United States)

    Raselekoane, Nanga R; Morwe, Keamogetse G; Tshitangano, Takalani

    2016-07-08

    Many young men continue to disregard the importance of contraception and family planning in South Africa. The fact that even university students also do not take contraception and family planning seriously poses a serious threat to their own health and well-being. This paper aims at investigating the attitudes of male students towards contraception and the promotion of female students' sexual health rights and well-being at the University of Venda. Quantitative research method is used to determine how attitudes of 60 male students towards contraception can jeopardise the health and well-being of both male and female students. This study reveals that the majority of 60 male students at the University of Venda have a negative attitude towards contraceptives. As a result, male students at the University of Venda are not keen on using contraceptives. Male students' negative attitude and lack of interest in contraceptives and family planning also limit progress in achieving the Millennium Development Goals on primary health care, especially with regard to sexual and reproductive health and well-being of female students at the University of Venda. The fact that more than half of the male students interviewed did not take contraception and family planning seriously poses a serious threat to health and well-being of students, including violation of female students' sexual and reproductive health rights in South Africa. This calls for radical health promotion and sexual and reproductive rights programmes which should specifically target male students at the University of Venda.

  8. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  9. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  10. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  11. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  12. 20 CFR 658.421 - Handling of JS-related complaints.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Handling of JS-related complaints. 658.421... ADMINISTRATIVE PROVISIONS GOVERNING THE JOB SERVICE SYSTEM Job Service Complaint System Federal Js Complaint System § 658.421 Handling of JS-related complaints. (a) No JS-related complaint shall be handled at the...

  13. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  14. Fuel handling grapple for nuclear reactor plants

    International Nuclear Information System (INIS)

    Rousar, D.L.

    1992-01-01

    This patent describes a fuel handling system for nuclear reactor plants. It comprises: a reactor vessel having an openable top and removable cover and containing therein, submerged in water substantially filling the reactor vessel, a fuel core including a multiplicity of fuel bundles formed of groups of sealed tube elements enclosing fissionable fuel assembled into units, the fuel handling system consisting essentially of the combination of: a fuel bundle handling platform movable over the open top of the reactor vessel; a fuel bundle handling mast extendable downward from the platform with a lower end projecting into the open top reactor vessel to the fuel core submerged in water; a grapple head mounted on the lower end of the mast provided with grapple means comprising complementary hooks which pivot inward toward each other to securely grasp a bail handle of a nuclear reactor fuel bundle and pivot backward away from each other to release a bail handle; the grapple means having a hollow cylindrical support shaft fixed within the grapple head with hollow cylindrical sleeves rotatably mounted and fixed in longitudinal axial position on the support shaft and each sleeve having complementary hooks secured thereto whereby each hook pivots with the rotation of the sleeve secured thereto; and the hollow cylindrical support shaft being provided with complementary orifices on opposite sides of its hollow cylindrical and intermediate to the sleeves mounted thereon whereby the orifices on both sides of the hollow cylindrical support shaft are vertically aligned providing a direct in-line optical viewing path downward there-through and a remote operator positioned above the grapple means can observe from overhead the area immediately below the grapple hooks

  15. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  16. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  17. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  18. A student's perspective: are medical students adequately trained in BLS?

    Directory of Open Access Journals (Sweden)

    Oyewole T

    2016-11-01

    Full Text Available Tobi Oyewole,1 Folashade Oyewole2 1University of Liverpool – The School of Medicine, Liverpool, 2Imperial College London, London, UK We read with great interest the article by Lami et al regarding improving basic life support (BLS training for medical students.1 We agree that BLS skills are vital for junior doctors. The days of trial by fire have long gone away, and junior doctors and medical students need to feel that they are adequately trained to handle emergency situations they may face in hospital.  Read the original article

  19. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  20. Money handling influences BMI: a survey of cashiers

    OpenAIRE

    Shraddha Karve; Ketaki Shurpali; Neelesh Dahanukar; Maithili Jog; Milind Watve

    2008-01-01

    Money is a recent phenomenon in the evolutionary history of man and therefore no separate brain centre to handle money is likely to have evolved. The brain areas activated by food reward and money reward are extensively overlapping. In an experimental set-up, hunger was demonstrated to influence money related decisions and money related thoughts to influence hunger. This suggests that the brain areas evolved for handling food related emotions are exapted to handle money and therefore there co...

  1. Advanced handling-systems with enhanced performance flexibility

    International Nuclear Information System (INIS)

    1986-04-01

    This report describes the results of a project related to future applications and requirements for advanced handling systems. This report consists of six chapters. Following the description of the aims the tools for setting up the requirements for the handling systems including the experience during the data acquisition process is described. Furthermore some information is given about the current state of the art of robotics and manipulators. Of paramount importance are the descriptions of applications and related concepts in the following chapters leading to specific categories of advanced handling units. The paper closes with the description of the first concepts for realization. (orig./HP) [de

  2. How the NWC handles software as product

    Energy Technology Data Exchange (ETDEWEB)

    Vinson, D.

    1997-11-01

    This tutorial provides a hands-on view of how the Nuclear Weapons Complex project should be handling (or planning to handle) software as a product in response to Engineering Procedure 401099. The SQAS has published the document SQAS96-002, Guidelines for NWC Processes for Handling Software Product, that will be the basis for the tutorial. The primary scope of the tutorial is on software products that result from weapons and weapons-related projects, although the information presented is applicable to many software projects. Processes that involve the exchange, review, or evaluation of software product between or among NWC sites, DOE, and external customers will be described.

  3. Conceptual design of CFETR divertor remote handling compatible structure

    International Nuclear Information System (INIS)

    Dai, Huaichu; Yao, Damao; Cao, Lei; Zhou, Zibo; Li, Lei

    2016-01-01

    Highlights: • Conceptual design for the CFETR divertor have been proposed, especially the divertor remote handling compatible structure. • The degrees of freedom of the divertor are analyzed in order to validate the design the divertor supports structure. • Besides the ITER-like scheme, a new scheme for the divertor remote handling compatible supports is proposed, that is the rack and pinion mechanism. • The installation/removel process is verified through simulation in Delmia in order to check design quality for remote handling requirements. - Abstract: Divertor is one of key components of tokamak fusion reactor. The CFETR is China Fusion Engineering Test Reactor. Its divertor will expose to tritium environment and neutron radiation. Materials of the divertor will be radioactived, and cannot be handled by personnel directly. To develop structure which compatible with robots handle for installation, maintenance and removing is required. This paper introduces a conceptual design of CFETR divertor module which compatible with remote handling end-effectors. The divertor module is confined by inner and outer support. The inner support is only confined divertor module radial, toroidal and vertical moving freedom degrees, but not confined rotating freedom degrees. The outer support is the structure that can confine rotating freedom degrees and should also be compatible with remote handling end-effectors.

  4. Conceptual design of CFETR divertor remote handling compatible structure

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Huaichu, E-mail: yaodm@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); University of Science and Technology of China, Hefei (China); Yao, Damao; Cao, Lei; Zhou, Zibo; Li, Lei [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China)

    2016-11-15

    Highlights: • Conceptual design for the CFETR divertor have been proposed, especially the divertor remote handling compatible structure. • The degrees of freedom of the divertor are analyzed in order to validate the design the divertor supports structure. • Besides the ITER-like scheme, a new scheme for the divertor remote handling compatible supports is proposed, that is the rack and pinion mechanism. • The installation/removel process is verified through simulation in Delmia in order to check design quality for remote handling requirements. - Abstract: Divertor is one of key components of tokamak fusion reactor. The CFETR is China Fusion Engineering Test Reactor. Its divertor will expose to tritium environment and neutron radiation. Materials of the divertor will be radioactived, and cannot be handled by personnel directly. To develop structure which compatible with robots handle for installation, maintenance and removing is required. This paper introduces a conceptual design of CFETR divertor module which compatible with remote handling end-effectors. The divertor module is confined by inner and outer support. The inner support is only confined divertor module radial, toroidal and vertical moving freedom degrees, but not confined rotating freedom degrees. The outer support is the structure that can confine rotating freedom degrees and should also be compatible with remote handling end-effectors.

  5. 21 CFR 58.107 - Test and control article handling.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Test and control article handling. 58.107 Section... GOOD LABORATORY PRACTICE FOR NONCLINICAL LABORATORY STUDIES Test and Control Articles § 58.107 Test and control article handling. Procedures shall be established for a system for the handling of the test and...

  6. 9 CFR 2.131 - Handling of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Handling of animals. 2.131 Section 2.131 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Miscellaneous § 2.131 Handling of animals. (a) All licensees who maintain wild...

  7. ITER L 6 equatorial maintenance duct remote handling study

    International Nuclear Information System (INIS)

    Millard, J.

    1996-09-01

    The status and conclusions of a preliminary study of equatorial maintenance duct remote handling is reported. Due to issues with the original duct design a significant portion of the study had to be refocused on equatorial duct layout studies. The study gives an overview of some of the options for design of these ducts and the impact of the design on the equipment to work in the duct. To develop a remote handling concept for creating access through the ducts the following design tasks should be performed: define the operations sequences for equatorial maintenance duct opening and closing; review the remote handling requirements for equatorial maintenance duct opening and closing; design concept for door and pipe handling equipment and to propose preliminary procedures for material handling outsides the duct. 35 figs

  8. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    Science.gov (United States)

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  9. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  10. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  11. Ergonomic design and evaluation of the handle for an endoscopic dissector.

    Science.gov (United States)

    Shimomura, Yoshihiro; Minowa, Keita; Kawahira, Hiroshi; Katsuura, Tetsuo

    2016-05-01

    The purpose of this study was to design an endoscopic dissector handle and objectively assess its usability. The handles were designed with increased contact area between the fingers and thumb and the eye rings, and the eye rings were modified to have a more perpendicular insertion angle to the finger midline. Four different handle models were compared, including a conventional product. Subjects performed dissection, exclusion, grasping, precision manipulation and precision handling tasks. Electromyography and subjective evaluations were measured. Compared to conventional handles, the designated handle reduced the muscle load in the extensor and flexor muscles of the forearm and increased subjective stability. The activity of the first dorsal interosseous muscle was sometimes influenced by the shape of the other parts. The ergonomically designed endoscopic dissector handle used in this study achieved high usability. Medical instrument designs based on ergonomic concepts should be assessed with objective indices. Practitioner Summary: The endoscopic dissector handles were designed with increased contact area and more suitable insertion angle between the fingers and thumb and the eye rings. Compared to conventional handles, the designated handle reduced the muscle load in the extensor and flexor muscles of the forearm and increased subjective stability.

  12. The space between us: stereotype threat and distance in interracial contexts.

    Science.gov (United States)

    Goff, Phillip Atiba; Steele, Claude M; Davies, Paul G

    2008-01-01

    Four studies investigate the role that stereotype threat plays in producing racial distancing behavior in an anticipated conversation paradigm. It was hypothesized that the threat of appearing racist may have the ironic effect of causing Whites to distance themselves from Black conversation partners. In Study 1, participants distanced themselves more from Black partners under conditions of threat, and this distance correlated with the activation of a "White racist" stereotype. In Study 2, it was demonstrated that Whites' interracial distancing behavior was not predicted by explicit or implicit prejudice. Study 3 provides evidence that conceiving of interracial interactions as opportunities to learn may attenuate the negative consequences of threat for Whites. Study 4 found that Whites have conscious access to their experience of stereotype threat and that this awareness may mediate the relationship between threat and distance. These results are discussed within a broader discourse of racial distancing and the possibility that certain identity threats may be as important as prejudice in determining the outcomes of interracial interactions. Copyright 2008 APA, all rights reserved.

  13. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  14. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  15. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  16. Single-molecule mechanics of protein-labelled DNA handles

    Directory of Open Access Journals (Sweden)

    Vivek S. Jadhav

    2016-01-01

    Full Text Available DNA handles are often used as spacers and linkers in single-molecule experiments to isolate and tether RNAs, proteins, enzymes and ribozymes, amongst other biomolecules, between surface-modified beads for nanomechanical investigations. Custom DNA handles with varying lengths and chemical end-modifications are readily and reliably synthesized en masse, enabling force spectroscopic measurements with well-defined and long-lasting mechanical characteristics under physiological conditions over a large range of applied forces. Although these chemically tagged DNA handles are widely used, their further individual modification with protein receptors is less common and would allow for additional flexibility in grabbing biomolecules for mechanical measurements. In-depth information on reliable protocols for the synthesis of these DNA–protein hybrids and on their mechanical characteristics under varying physiological conditions are lacking in literature. Here, optical tweezers are used to investigate different protein-labelled DNA handles in a microfluidic environment under different physiological conditions. Digoxigenin (DIG-dsDNA-biotin handles of varying sizes (1000, 3034 and 4056 bp were conjugated with streptavidin or neutravidin proteins. The DIG-modified ends of these hybrids were bound to surface-modified polystyrene (anti-DIG beads. Using different physiological buffers, optical force measurements showed consistent mechanical characteristics with long dissociation times. These protein-modified DNA hybrids were also interconnected in situ with other tethered biotinylated DNA molecules. Electron-multiplying CCD (EMCCD imaging control experiments revealed that quantum dot–streptavidin conjugates at the end of DNA handles remain freely accessible. The experiments presented here demonstrate that handles produced with our protein–DNA labelling procedure are excellent candidates for grasping single molecules exposing tags suitable for molecular

  17. 45 CFR 650.19 - Electronic invention handling.

    Science.gov (United States)

    2010-10-01

    ... Report or a Final Invention Statement and Certification. (b) Questions on use of iEdison and requests for... 45 Public Welfare 3 2010-10-01 2010-10-01 false Electronic invention handling. 650.19 Section 650... PATENTS § 650.19 Electronic invention handling. (a) Grantees must use the iEdison Invention Information...

  18. Age differences in the underlying mechanisms of stereotype threat effects.

    Science.gov (United States)

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  19. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  20. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  1. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  2. Career Development with Transgender College Students: Implications for Career and Employment Counselors

    Science.gov (United States)

    Scott, David A.; Belke, Stephanie L.; Barfield, Hannah G.

    2011-01-01

    The number of transgender college students continues to increase every year. These students face unique challenges that many college and university career centers are not prepared to handle. This article describes some of the challenges facing transgender students and college career centers. A professional development design is proposed to assist…

  3. Threatening the heart and mind of gender stereotypes: Can imagined contact influence the physiology of stereotype threat?

    Science.gov (United States)

    Allen, Ben; Friedman, Bruce H

    2016-01-01

    Research shows that when a gender stereotype is made salient and the target of the stereotype is asked to perform in the stereotyped domain, targets of the stereotype often perform at a lower level compared to situations when the stereotype was not made salient. The noticeable absence of female faculty and students in math and science departments at coed universities throughout the United States may increase the belief in gender stereotypes and discourage women from pursuing careers in these fields. Contact with counterstereotypical exemplars, such as female science experts, decreases belief in gender stereotypes and increases women's motivation to pursue careers in science. Thus, the present study examined whether imagining an interpersonal interaction with a counterstereotypical exemplar removes the physiological and performance effects of stereotype threat. Subjects were asked to imagine either a nature scene or meeting a female math professor, and were also assigned to either a control or stereotype threat condition. Imagination was used because studies have shown it to be an effective method of simulating interpersonal contact. Subjects were 139 young women (mean age 19 years) recruited from a pool of undergraduates. Results showed that the stereotype threat manipulation elicited greater vagal withdrawal and poorer working memory capacity during the n-back, and that vagal withdrawal was attenuated when the stereotype threat manipulation was preceded by a brief imagined interaction with a counterstereotypical exemplar. This study provides novel evidence that exposure to counterstereotypical exemplars can diminish cardiovascular reactions to salient information about threatening gender stereotypes. © 2015 Society for Psychophysiological Research.

  4. Regulatory process for material handling equipment

    International Nuclear Information System (INIS)

    Rajendran, S.; Agarwal, Kailash

    2017-01-01

    Atomic Energy (Factories) Rules (AEFR) 1996, Rule 35 states, 'Thorough inspection and load testing of a Crane shall be done by a Competent Person at least once every 12 months'. To adhere to this rule, BARC Safety Council constituted 'Material Handling Equipment Committee (MHEC)' under the aegis of Conventional Fire and Safety Review Committee (CFSRC) to carry out periodical inspection and certification of Material Handling Equipment (MHE), tools and tackles used in BARC Facilities at Trombay, Tarapur and Kalpakkam

  5. Testing of FFTF fuel handling equipment

    International Nuclear Information System (INIS)

    Coleman, D.W.; Grazzini, E.D.; Hill, L.F.

    1977-07-01

    The Fast Flux Test Facility has several manual/computer controlled fuel handling machines which are exposed to severe environments during plant operation but still must operate reliably when called upon for reactor refueling. The test programs for two such machines--the Closed Loop Ex-Vessel Machine and the In-Vessel Handling Machine--are described. The discussion centers on those areas where design corrections or equipment repairs substantiated the benefits of a test program prior to plant operation

  6. PND fuel handling decontamination: facilities and techniques

    International Nuclear Information System (INIS)

    Pan, R.Y.

    1996-01-01

    The use of various decontamination techniques and equipment has become a critical part of Fuel Handling maintenance work at Ontario Hydro's Pickering Nuclear Division. This paper presents an overview of the set up and techniques used for decontamination in the PND Fuel Handling Maintenance Facility and the effectiveness of each. (author). 1 tab., 9 figs

  7. The Management Challenge: Handling Exams Involving Large Quantities of Students, on and off Campus--A Design Concept

    Science.gov (United States)

    Larsson, Ken

    2014-01-01

    This paper looks at the process of managing large numbers of exams efficiently and secure with the use of a dedicated IT support. The system integrates regulations on different levels, from national to local, (even down to departments) and ensures that the rules are employed in all stages of handling the exams. The system has a proven record of…

  8. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  9. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal; Pernici, B; Gulla, J.A.

    2007-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not

  10. Perfectionism moderates stereotype threat effects on STEM majors' academic performance.

    Science.gov (United States)

    Rice, Kenneth G; Lopez, Frederick G; Richardson, Clarissa M E; Stinson, Jennifer M

    2013-04-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of freshmen students (N = 294) was recruited from 2 major universities. Students were blocked by gender and race/ethnicity and randomly assigned to experience subtle ST or no ST. Participants in the subtle ST condition were primed to consider their gender, race, and ethnicity prior to completing measures of science self-efficacy. Those in the control condition completed the measures without such priming. Controlling for prior academic performance and university context, ST priming significantly interacted (a) with self-critical perfectionism to predict coping self-efficacy scores and (b) with race/ethnicity to predict end-of-semester STEM grades. A 3-way interaction of ST priming, sex, and self-critical perfectionism also predicted students' grades in courses wherein women and men were more proportionally represented. The Sex × Self-Critical Perfectionism interaction was not significant for those in the ST group but was for those in the control group. Men in the control group had higher grade-point averages (GPAs) at low levels of self-critical perfectionism than they had at higher levels of perfectionism. In contrast, women had lower GPAs when self-critical perfectionism was low, but their GPAs were higher when self-critical perfectionism was high. The findings are discussed in terms of their implications for self-efficacy and performance in the pursuit of a STEM major.

  11. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  12. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    Science.gov (United States)

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  13. Uranium hexafluoride handling. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    1991-12-31

    The United States Department of Energy, Oak Ridge Field Office, and Martin Marietta Energy Systems, Inc., are co-sponsoring this Second International Conference on Uranium Hexafluoride Handling. The conference is offered as a forum for the exchange of information and concepts regarding the technical and regulatory issues and the safety aspects which relate to the handling of uranium hexafluoride. Through the papers presented here, we attempt not only to share technological advances and lessons learned, but also to demonstrate that we are concerned about the health and safety of our workers and the public, and are good stewards of the environment in which we all work and live. These proceedings are a compilation of the work of many experts in that phase of world-wide industry which comprises the nuclear fuel cycle. Their experience spans the entire range over which uranium hexafluoride is involved in the fuel cycle, from the production of UF{sub 6} from the naturally-occurring oxide to its re-conversion to oxide for reactor fuels. The papers furnish insights into the chemical, physical, and nuclear properties of uranium hexafluoride as they influence its transport, storage, and the design and operation of plant-scale facilities for production, processing, and conversion to oxide. The papers demonstrate, in an industry often cited for its excellent safety record, continuing efforts to further improve safety in all areas of handling uranium hexafluoride. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  14. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    Science.gov (United States)

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  15. Collective action on the western range: coping with external and internal threats

    Directory of Open Access Journals (Sweden)

    Abigail M. York

    2011-09-01

    Full Text Available Collaborative natural resource management institutions enable agents with diverse interests to come together to solve complex problems. These actors must overcome a series of collective action problems to create, maintain, and evolve these institutions. In addition to the challenge of heterogeneous actors, these commons social-ecological systems often face internal and external threats or disturbances. The institutional arrangements may be effective with problems that are internal to a social-ecological system – ones that they are designed to handle, but how do these arrangements cope with external disturbances, especially ones caused by large-scale political and economic decisions, events, and processes. Using ethnographic and archival data we conduct an institutional analysis outlining the existing and emerging collaboratives, the important actors, and ongoing efforts to cope with the five major challenges identified by rangeland actors. We trace the evolution of institutions on the western range with a focus on their ability to cope with challenges that are largely within the system – biodiversity, fire, and water management, and those that are driven externally by actors who are largely absent – border militarization and violence and exurbanization.

  16. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  17. Phishing - A Growing Threat to E-Commerce

    OpenAIRE

    Banday, M. Tariq; Qadri, Jameel A.

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyl...

  18. Exciting fear in adolescence: Does pubertal development alter threat processing?

    Directory of Open Access Journals (Sweden)

    Jeffrey M. Spielberg

    2014-04-01

    Full Text Available Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala, but also regions associated with reward pursuit (i.e., nucleus accumbens. These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues—which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences.

  19. Exciting fear in adolescence: does pubertal development alter threat processing?

    Science.gov (United States)

    Spielberg, Jeffrey M; Olino, Thomas M; Forbes, Erika E; Dahl, Ronald E

    2014-04-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues--which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  20. A multi-component patient-handling intervention improves attitudes and behaviors for safe patient handling and reduces aggression experienced by nursing staff

    DEFF Research Database (Denmark)

    Risør, Bettina Wulff; Casper, Sven Dalgas; Andersen, Lars L.

    2017-01-01

    This study evaluated an intervention for patient-handling equipment aimed to improve nursing staffs' use of patient handling equipment and improve their general health, reduce musculoskeletal problems, aggressive episodes, days of absence and work-related accidents. As a controlled before......-after study, questionnaire data were collected at baseline and 12-month follow-up among nursing staff at intervention and control wards at two hospitals. At 12-month follow-up, the intervention group had more positive attitudes towards patient-handling equipment and increased use of specific patient......-handling equipment. In addition, a lower proportion of nursing staff in the intervention group had experienced physically aggressive episodes. No significant change was observed in general health status, musculoskeletal problems, days of absence or work-related accidents. The intervention resulted in more positive...

  1. PND fuel handling decontamination: facilities and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Pan, R Y [Ontario Hydro, Toronto, ON (Canada)

    1997-12-31

    The use of various decontamination techniques and equipment has become a critical part of Fuel Handling maintenance work at Ontario Hydro`s Pickering Nuclear Division. This paper presents an overview of the set up and techniques used for decontamination in the PND Fuel Handling Maintenance Facility and the effectiveness of each. (author). 1 tab., 9 figs.

  2. A combined constraint handling framework: an empirical study

    DEFF Research Database (Denmark)

    Si, Chengyong; Hu, Junjie; Lan, Tian

    2017-01-01

    This paper presents a new combined constraint handling framework (CCHF) for solving constrained optimization problems (COPs). The framework combines promising aspects of different constraint handling techniques (CHTs) in different situations with consideration of problem characteristics. In order...

  3. Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2016-09-01

    Full Text Available Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft. 

  4. Experience of safety and performance improvement for fuel handling equipment

    International Nuclear Information System (INIS)

    Gyoon Chang, Sang; Hee Lee, Dae

    2014-01-01

    The purpose of this study is to provide experience of safety and performance improvement of fuel handling equipment for nuclear power plants in Korea. The fuel handling equipment, which is used as an important part of critical processes during the refueling outage, has been improved to enhance safety and to optimize fuel handling procedures. Results of data measured during the fuel reloading are incorporated into design changes. The safety and performance improvement for fuel handling equipment could be achieved by simply modifying the components and improving the interlock system. The experience provided in this study can be useful lessons for further improvement of the fuel handling equipment. (authors)

  5. Viewing behaviour of spider phobics and non-phobics in the presence of threat and safety stimuli.

    Science.gov (United States)

    Lange, W G T; Tierney, K J; Reinhardt-Rutland, A H; Vivekananda-Schmidt, P

    2004-09-01

    To determine whether spider phobics and spider non-phobics differ in attending to threat and safety stimuli in close proximity, or spatially separated. A sample group of 16 spider-phobic and 16 spider-non-phobic volunteers were drawn from a student population on the basis of their scores on Watts and Sharrock's Spider Phobia Questionnaire. Attention was assessed by way of participants' viewing behaviour using an ASL 501 head-mounted eye-tracking system. In a control condition, participants viewed a neutral stimulus (a TV video) in the absence of the threat stimulus. In two experimental conditions, the threat stimulus (a live Chilean rose tarantula) was introduced (a) immediately beside the safety stimulus (the only exit of the experimental room), or (b) away from the safety stimulus. In the experimental conditions, phobics reduced their viewing of the TV and increased their viewing of the tarantula and of the exit; the biggest changes occurred when tarantula and exit were together. Phobics also made more eye motions across the experimental room. Our results are consistent with previous research employing reaction time to a neutral stimulus as dependent measure. In addition, our results suggest that phobics scan the environment as part of safety behaviour. We suggest that exposure treatments to reduce spider phobia may be facilitated by encouraging patients to stop environmental scanning. Copyright 2004 The British Psychological Society

  6. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  7. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  8. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    Science.gov (United States)

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Neonatal handling induces anovulatory estrous cycles in rats

    Directory of Open Access Journals (Sweden)

    Gomes C.M.

    1999-01-01

    Full Text Available Since previous work has shown that stimulation early in life decreases sexual receptiveness as measured by the female lordosis quotient, we suggested that neonatal handling could affect the function of the hypothalamus-pituitary-gonadal axis. The effects of neonatal handling on the estrous cycle and ovulation were analyzed in adult rats. Two groups of animals were studied: intact (no manipulation, N = 10 and handled (N = 11. Pups were either handled daily for 1 min during the first 10 days of life or left undisturbed. At the age of 90 days, a vaginal smear was collected daily at 9:00 a.m. and analyzed for 29 days; at 9:00 a.m. on the day of estrus, animals were anesthetized with thiopental (40 mg/kg, ip, the ovaries were removed and the oviduct was dissected and squashed between 2 glass slides. The number of oocytes of both oviductal ampullae was counted under the microscope. The average numbers for each phase of the cycle (diestrus I, diestrus II, proestrus and estrus during the period analyzed were compared between the two groups. There were no significant differences between intact and handled females during any of the phases. However, the number of handled females that showed anovulatory cycles (8 out of 11 was significantly higher than in the intact group (none out of 10. Neonatal stimulation may affect not only the hypothalamus-pituitary-adrenal axis, as previously demonstrated, but also the hypothalamus-pituitary-gonadal axis in female rats.

  10. Effective Teaching Practices in Handling Non Readers

    Directory of Open Access Journals (Sweden)

    Jacklyn S. Dacalos

    2016-08-01

    Full Text Available The study determined the effective teaching practices in handling nonreaders. This seeks to answer the following objectives: describe the adjustments, effective strategies, and scaffolds utilized by teachers in handling nonreaders; differentiate the teachers’ reading adjustments, strategies and scaffolds in teaching nonreaders; analyze the teaching reading efficiency of nonreaders using effective teaching reading strategies; and find significant correlation of nonreaders’ grades and reading teachers’ reading adjustments, strategies and scaffolds. This study utilized mixed methods of research. Case studies of five public schools teachers were selected as primary subjects, who were interviewed in handling nonreaders in the areas of adjustments, strategies, and reading scaffolds. Actual teaching observation was conducted according to the five subjects’ most convenient time. In ascertaining the nonreaders’ academic performance, the students’ grades in English subject was analyzed using T-Test within subject design. Handling nonreaders in order to read and understand better in the lesson is an arduous act, yet; once done with effectiveness and passion, it yielded a great amount of learning success. Effective teaching practices in handling nonreaders comprised the use of teachers’ adjustments, strategies, and scaffolds to establish reading mastery, exposing them to letter sounds, short stories, and the use of follow-up. WH questions enhanced their reading performance significantly. Variations of reading teachers’ nature as: an enabler, a facilitator, a humanist, a behaviorist, and an expert, as regards to their teaching practices, were proven significant to students’ reading effectiveness.

  11. The training for nuclear fuel handling at EDF

    International Nuclear Information System (INIS)

    Marion, J.P.

    1999-01-01

    The handling of fuel assemblies in a nuclear power plant presents 3 types of work: the taking delivery of fresh fuel, the refueling and the disposal of spent fuel. These operations are realized by teams made up of 3 handling operators and a supervisor. The refueling is made by 3*8-hour teams. These handling operations are important for the nuclear safety, a mishandling can damage the fuel cladding which is the first containment barrier, so a training center (CETIC) has been created. This center was founded in 1986 by EDF and Framatome, the purpose was to validate maintenance procedures, to test handling equipment and to train the teams which work on site. Various training programmes have been set up and a system of qualification degrees has been organized. The CETIC is fitted up with equipment that are full-sized mockups of real installations. Fuel assemblies don't react in a similar way to the different mechanical and neutronic stresses they undergo while they are in the core, they get deformed and the handling operations become more delicate. The mockup fuel assemblies are quite deformed to train the teams and prepare them to face any real situation. (A.C.)

  12. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  13. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  14. Human factors issues in fuel handling

    International Nuclear Information System (INIS)

    Beattie, J.D.; Iwasa-Madge, K.M.; Tucker, D.A.

    1994-01-01

    The staff of the Atomic Energy Control Board wish to further their understanding of human factors issues of potential concern associated with fuel handling in CANDU nuclear power stations. This study contributes to that objective by analysing the role of human performance in the overall fuel handling process at Ontario Hydro's Darlington Nuclear Generating Station, and reporting findings in several areas. A number of issues are identified in the areas of design, operating and maintenance practices, and the organizational and management environment

  15. The cyber threat landscape: Challenges and future research directions

    Science.gov (United States)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  16. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  17. Development of high intensity beam handling system, 4

    International Nuclear Information System (INIS)

    Yamanoi, Yutaka; Tanaka, Kazuhiro; Minakawa, Michifumi

    1992-01-01

    We have constructed the new counter experimental hall at the KEK 12 GeV Proton Synchrotron (KEK-PS) in order to handle high intensity primary proton beams of up to 1x10 3 pps (protons per second), which is one order of magnitude greater than the present beam intensity of the KEK-PS, 1x10 12 pps. New technologies for handling high-intensity beams have, then, been developed and employed in the construction of the new hall. A part of our R/D work on handling high intensity beams will be reported. (author)

  18. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  19. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  20. Cultural adaptations to the differential threats posed by hot versus cold climates.

    Science.gov (United States)

    Murray, Damian R

    2013-10-01

    Hot and cold climates have posed differential threats to human survival throughout history. Cold temperatures can pose direct threats to survival in themselves, whereas hot temperatures may pose threats indirectly through higher prevalence of infectious disease. These differential threats yield convergent predictions for the relationship between more demanding climates and freedom of expression, but divergent predictions for freedom from discrimination.

  1. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  2. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  3. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  4. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  5. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  6. Threat driven modeling framework using petri nets for e-learning system.

    Science.gov (United States)

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  7. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    Science.gov (United States)

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  8. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  9. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    Science.gov (United States)

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  10. Execution Constraint Verification of Exception Handling on UML Sequence Diagrams

    NARCIS (Netherlands)

    Ciraci, S.; Sözer, Hasan; Aksit, Mehmet; Havinga, W.K.

    2011-01-01

    Exception handling alters the control flow of the program. As such, errors introduced in exception handling code may influence the overall program in undesired ways. To detect such errors early and thereby decrease the programming costs, it is worthwhile to consider exception handling at design

  11. Strategic threat management: an exploration of nursing strategies in the pediatric intensive care unit.

    Science.gov (United States)

    Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina

    2015-03-01

    Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  12. Attentional bias towards health-threat information in chronic fatigue syndrome.

    Science.gov (United States)

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  13. Threats to Validity When Using Open-Ended Items in International Achievement Studies: Coding Responses to the PISA 2012 Problem-Solving Test in Finland

    Science.gov (United States)

    Arffman, Inga

    2016-01-01

    Open-ended (OE) items are widely used to gather data on student performance in international achievement studies. However, several factors may threaten validity when using such items. This study examined Finnish coders' opinions about threats to validity when coding responses to OE items in the PISA 2012 problem-solving test. A total of 6…

  14. 7 CFR 1924.259 - Handling dwelling construction complaints.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Handling dwelling construction complaints. 1924.259 Section 1924.259 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING... Construction Defects § 1924.259 Handling dwelling construction complaints. This section describes the procedure...

  15. CANDU-9/480-SEU fuel handling system assessment document

    International Nuclear Information System (INIS)

    Hwang, Jeong Ki; Jo, C. H.; Kim, H. M.; Morikawa, D. T.

    1996-11-01

    This report summarize the rationale for the CANDU 9 fuel handling system, and the design choices recommended for components of the system. Some of the design requirements applicable to the CANDU 9 480-SEU fuel handling design choices are described. These requirements imposed by the CANDU 9 project. And the design features for the key components of fuel handling system, such as the fuelling machine, the carriage, the new fuel transfer system and the irradiated fuel transfer system, are described. The carriage seismic load evaluations relevant to the design are contained in the appendices. The majority of the carriage components are acceptable, or will likely be acceptable with some redesign. The concept for the CANDU 9 fuel handling system is based on proven CANDU designs, or on improved CANDU technology. Although some development work must be done, the fuel handling concept is judged to be feasible for the CANDU 9 480-SEU reactor. (author). 2 refs

  16. Player-Specific Conflict Handling Ontology

    Directory of Open Access Journals (Sweden)

    Charline Hondrou

    2014-09-01

    Full Text Available This paper presents an ontology that leads the player of a serious game - regarding conflict handling - to the educative experience from which they will benefit the most. It provides a clearly defined tree of axioms that maps the player’s visually manifested affective cues and emotional stimuli from the serious game to conflict handling styles and proposes interventions. The importance of this ontology lies in the fact that it promotes natural interaction (non-invasive methods and at the same time makes the game as player-specific as it can be for its educational goal. It is an ontology that can be adapted to different educational theories and serve various educational purposes.

  17. 340 Waste Handling Facility interim safety basis

    International Nuclear Information System (INIS)

    Bendixsen, R.B.

    1995-01-01

    This document establishes the interim safety basis (ISB) for the 340 Waste Handling Facility (340 Facility). An ISB is a documented safety basis that provides a justification for the continued operation of the facility until an upgraded final safety analysis report is prepared that complies with US Department of Energy (DOE) Order 5480.23, Nuclear Safety Analysis Reports. The ISB for the 340 Facility documents the current design and operation of the facility. The 340 Facility ISB (ISB-003) is based on a facility walkdown and review of the design and operation of the facility, as described in the existing safety documentation. The safety documents reviewed, to develop ISB-003, include the following: OSD-SW-153-0001, Operating Specification Document for the 340 Waste Handling Facility (WHC 1990); OSR-SW-152-00003, Operating Limits for the 340 Waste Handling Facility (WHC 1989); SD-RE-SAP-013, Safety Analysis Report for Packaging, Railroad Liquid Waste Tank Cars (Mercado 1993); SD-WM-TM-001, Safety Assessment Document for the 340 Waste Handling Facility (Berneski 1994a); SD-WM-SEL-016, 340 Facility Safety Equipment List (Berneski 1992); and 340 Complex Fire Hazard Analysis, Draft (Hughes Assoc. Inc. 1994)

  18. Encouraging students to ask right questions

    Indian Academy of Sciences (India)

    Lawrence

    of academics, right from formal teaching and handling research projects ... always thought that an ideal education system is one which strives ... of Applied Physics, Journal of Biomedical Technology, Applied ... students have attended many international and national confer- ... I dream of a vibrant, creative, knowledge-based.

  19. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  20. A simple strategy to reduce stereotype threat for orthopedic residents.

    Science.gov (United States)

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.