WorldWideScience

Sample records for integrated threat theory

  1. Prejudice towards Muslims in The Netherlands : Testing integrated threat theory

    NARCIS (Netherlands)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-01-01

    This study uses integrated threat theory to examine Dutch adolescents’ (N ¼ 1; 187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators

  2. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  3. Extending the amygdala in theories of threat processing

    Science.gov (United States)

    Fox, Andrew S.; Oler, Jonathan A.; Tromp, Do P.M.; Fudge, Julie L.; Kalin, Ned H.

    2015-01-01

    The central extended amygdala is an evolutionarily conserved set of interconnected brain regions that play an important role in threat processing to promote survival. Two core components of the central extended amygdala, the central nucleus of the amygdala (Ce) and the lateral bed nucleus of the stria terminalis (BST) are highly similar regions that serve complimentary roles by integrating fear- and anxiety-relevant information. Survival depends on the central extended amygdala's ability to rapidly integrate and respond to threats that vary in their immediacy, proximity, and characteristics. Future studies will benefit from understanding alterations in central extended amygdala function in relation to stress-related psychopathology. PMID:25851307

  4. Ionospheric threats to the integrity of airborne GPS users

    Science.gov (United States)

    Datta-Barua, Seebany

    The Global Positioning System (GPS) has both revolutionized and entwined the worlds of aviation and atmospheric science. As the largest and most unpredictable source of GPS positioning error, the ionospheric layer of the atmosphere, if left unchecked, can endanger the safety, or "integrity," of the single frequency airborne user. An augmentation system is a differential-GPS-based navigation system that provides integrity through independent ionospheric monitoring by reference stations. However, the monitor stations are not in general colocated with the user's GPS receiver. The augmentation system must protect users from possible ionosphere density variations occurring between its measurements and the user's. This study analyzes observations from ionospherically active periods to identify what types of ionospheric disturbances may cause threats to user safety if left unmitigated. This work identifies when such disturbances may occur using a geomagnetic measure of activity and then considers two disturbances as case studies. The first case study indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area Augmentation System (LAAS) that was not known prior to the work. The second case study uses ground- and space-based data to model an ionospheric disturbance of interest to the Federal Aviation Administration's Wide Area Augmentation System (WAAS). This work is a step in the justification for, and possible future refinement of, one of the WAAS integrity algorithms. For both WAAS and LAAS, integrity threats are basically caused by events that may be occurring but are unobservable. Prior to the data available in this solar cycle, events of such magnitude were not known to be possible. This work serves as evidence that the ionospheric threat models developed for WARS and LAAS are warranted and that they are sufficiently conservative to maintain user integrity even under extreme ionospheric behavior.

  5. Use of Vertically Integrated Ice in WRF-Based Forecasts of Lightning Threat

    Science.gov (United States)

    McCaul, E. W., jr.; Goodman, S. J.

    2008-01-01

    Previously reported methods of forecasting lightning threat using fields of graupel flux from WRF simulations are extended to include the simulated field of vertically integrated ice within storms. Although the ice integral shows less temporal variability than graupel flux, it provides more areal coverage, and can thus be used to create a lightning forecast that better matches the areal coverage of the lightning threat found in observations of flash extent density. A blended lightning forecast threat can be constructed that retains much of the desirable temporal sensitivity of the graupel flux method, while also incorporating the coverage benefits of the ice integral method. The graupel flux and ice integral fields contributing to the blended forecast are calibrated against observed lightning flash origin density data, based on Lightning Mapping Array observations from a series of case studies chosen to cover a wide range of flash rate conditions. Linear curve fits that pass through the origin are found to be statistically robust for the calibration procedures.

  6. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  7. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    OpenAIRE

    Klonek, Florian E.; G?ntner, Amelie V.; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  8. Negative attitudes toward Muslims in the Netherlands : The role of symbolic threat, stereotypes, and moral emotions

    NARCIS (Netherlands)

    Wirtz, C.; van der Pligt, Joop; Doosje, Bertjan

    2016-01-01

    The present study addresses negative attitudes toward Muslims in The Netherlands, and combines ideas from integrated threat theory and socio-functional perspectives on threats and emotions. We proposed a model in which symbolic threat and negative stereotypes predict prejudice, social distance, and

  9. An integrated approach to risk assessment and mitigating the CBRN threat

    International Nuclear Information System (INIS)

    Bokan, S.

    2009-01-01

    CBRN mass casualty events threat mitigation remains today the highest international priority. Although significant progress has been made, the national security requirements for efforts to combat Weapons of Mass Destruction and Weapons of Mass Disruption will be of the highest national priority in the near future. An integration of a number of approaches is essential in the risk assessment and mitigating the CBRN treat. Preparedness measures and procedures, engineering, science and technology, policy, medical, and emergency response are essential to reduce the threat from the proliferation and use of weapons of mass destruction (WMD). Improved coordination between international, public and private security entities is also essential task to hopefully prevent the terrorist attacks. In this lecture, it will be presented very important scientific approach to risk assessment of potential use of nuclear, radiological, biological or chemical weapons in terrorist actions. An integrated approach for mitigating the CBRN threat, crisis management and preparedness measures for prevention and reduction of potential consequences, will be presented.(author)

  10. Measure and integration theory

    CERN Document Server

    Burckel, Robert B

    2001-01-01

    This book gives a straightforward introduction to the field as it is nowadays required in many branches of analysis and especially in probability theory. The first three chapters (Measure Theory, Integration Theory, Product Measures) basically follow the clear and approved exposition given in the author's earlier book on ""Probability Theory and Measure Theory"". Special emphasis is laid on a complete discussion of the transformation of measures and integration with respect to the product measure, convergence theorems, parameter depending integrals, as well as the Radon-Nikodym theorem. The fi

  11. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    OpenAIRE

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  12. Comparing integral and incidental emotions: Testing insights from emotions as social information theory and attribution theory.

    Science.gov (United States)

    Hillebrandt, Annika; Barclay, Laurie J

    2017-05-01

    Studies have indicated that observers can infer information about others' behavioral intentions from others' emotions and use this information in making their own decisions. Integrating emotions as social information (EASI) theory and attribution theory, we argue that the interpersonal effects of emotions are not only influenced by the type of discrete emotion (e.g., anger vs. happiness) but also by the target of the emotion (i.e., how the emotion relates to the situation). We compare the interpersonal effects of emotions that are integral (i.e., related to the situation) versus incidental (i.e., lacking a clear target in the situation) in a negotiation context. Results from 4 studies support our general argument that the target of an opponent's emotion influences the degree to which observers attribute the emotion to their own behavior. These attributions influence observers' inferences regarding the perceived threat of an impasse or cooperativeness of an opponent, which can motivate observers to strategically adjust their behavior. Specifically, emotion target influenced concessions for both anger and happiness (Study 1, N = 254), with perceived threat and cooperativeness mediating the effects of anger and happiness, respectively (Study 2, N = 280). Study 3 (N = 314) demonstrated the mediating role of attributions and moderating role of need for closure. Study 4 (N = 193) outlined how observers' need for cognitive closure influences how they attribute incidental anger. We discuss theoretical implications related to the social influence of emotions as well as practical implications related to the impact of personality on negotiators' biases and behaviors. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  13. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    Science.gov (United States)

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  14. Threat and Guilt Aspects of Internalized Antilesbian and Gay Prejudice: An Application of Personal Construct Theory

    Science.gov (United States)

    Moradi, Bonnie; van den Berg, Jacob J.; Epting, Franz R.

    2009-01-01

    Building on G. A. Kelly's (1991a, 1991b) personal construct theory, this study introduced concepts of threat and guilt as different manifestations of internalized antilesbian and gay prejudice. Results with 102 lesbian and gay participants indicated that internalized threat and guilt each accounted for unique variance in global internalized…

  15. Vertical Integration of Hospitals and Physicians: Economic Theory and Empirical Evidence on Spending and Quality.

    Science.gov (United States)

    Post, Brady; Buchmueller, Tom; Ryan, Andrew M

    2017-08-01

    Hospital-physician vertical integration is on the rise. While increased efficiencies may be possible, emerging research raises concerns about anticompetitive behavior, spending increases, and uncertain effects on quality. In this review, we bring together several of the key theories of vertical integration that exist in the neoclassical and institutional economics literatures and apply these theories to the hospital-physician relationship. We also conduct a literature review of the effects of vertical integration on prices, spending, and quality in the growing body of evidence ( n = 15) to evaluate which of these frameworks have the strongest empirical support. We find some support for vertical foreclosure as a framework for explaining the observed results. We suggest a conceptual model and identify directions for future research. Based on our analysis, we conclude that vertical integration poses a threat to the affordability of health services and merits special attention from policymakers and antitrust authorities.

  16. Degrees of Integrity: The Threat of Corruption in Higher Education

    Science.gov (United States)

    Chapman, David W.; Lindner, Samira

    2016-01-01

    Corruption in higher education is the focus of growing international concern among governments, educators, students, and other stakeholders. Those working in higher education institutions now face a unique convergence of pressures that is creating a heightened threat to the integrity of the higher education enterprise worldwide. This paper draws…

  17. Integrated systems approach to meet the insider threat

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1985-01-01

    This paper describes an approach to mitigating the insider threat by integrating and supplementing existing data systems and procedures without placing an undue burden on plant management and operating personnel. Nuclear facilities have plans to deal with any forseeable chain of events, and long-term records of activities are maintained to verify that the requirements are met. The integrated systems approach proposed in this paper does not change established facility practices; rather, the approach attempts to utilize the information generated by the system. This will provide real-time interaction between the documented work permits, the operating procedure system, and the security system so that controlled access authorizations are based on a need to enter and access is limited to specific times and places

  18. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  19. The Ties that Bind and Those that Don't: Toward Reconciling Group Threat and Contact Theories of Prejudice

    Science.gov (United States)

    Dixon, Jeffrey C.

    2006-01-01

    Does interracial/interethnic propinquity breed hostility or harmony? Group threat and contact theories generally answer hostility and harmony, respectively. The author proposes that a historically and culturally rooted racial/ethnic hierarchy differentially shapes whites' present-day threat of, contact with, and ultimately, prejudice towards…

  20. Systems integration: an effective and innovative response to emerging biological threats.

    Science.gov (United States)

    House, Robert V

    2007-04-20

    A rapid and effective development of vaccines and other prophylactics, as well as novel therapeutics, against emerging threats requires the development and implementation of novel strategies. One such strategy is the integrator approach. This approach utilizes an integrated development team comprising expertise in program management, scientific management, clinical research, preclinical/nonclinical development, manufacturing, testing, risk management, quality assurance, and regulatory strategy and compliance. Key to the success of this approach is the successful management of subcontracted work, as well as the seamless integration of multiple systems and data inputs into a coherent development plan.

  1. Maintaining distinctions under threat: heterosexual men endorse the biological theory of sexuality when equality is the norm.

    Science.gov (United States)

    Falomir-Pichastor, Juan M; Hegarty, Peter

    2014-12-01

    According to social identity theory, group members sometimes react to threats to their group's distinctiveness by asserting the distinctiveness of their group. In four studies (n = 261) we tested the hypothesis that heterosexual men with a greater propensity to be threatened by homosexuality would react to egalitarian norms by endorsing biological theories of sexuality. Heterosexual men, but not women, with narrow prototypes of their gender in-group endorsed biological theories the most (Study 1). Heterosexual men with higher gender self-esteem, with heterosexist attitudes, who endorsed traditional gender roles, and with narrow prototypes of their gender in-group, endorsed the biological theories more when egalitarian norms rather than anti-egalitarian norms (Studies 2 and 3) or pro-minority ideologies that emphasized group differences (Study 4) were made salient. These findings show group-level reactive distinctiveness among members of a high-status group in a context of threat to the unique privileges that they once enjoyed. © 2013 The British Psychological Society.

  2. Assessing the integrity of local area network materials accountability systems against insider threats

    International Nuclear Information System (INIS)

    Jones, E.; Sicherman, A.

    1996-07-01

    DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems

  3. Continual integral in perturbation theory

    International Nuclear Information System (INIS)

    Slavnov, A.A.

    1975-01-01

    It is shown that all results obtained by means of continual integration within the framework of perturbation theory are completely equivalent to those obtained by the usual diagram technique and are therfore just as rigorous. A rigorous justification is given for the rules for operating with continual integrals in perturbation theory. (author)

  4. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  5. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    Science.gov (United States)

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  6. Integrable structures in quantum field theory

    International Nuclear Information System (INIS)

    Negro, Stefano

    2016-01-01

    This review was born as notes for a lecture given at the Young Researchers Integrability School (YRIS) school on integrability in Durham, in the summer of 2015. It deals with a beautiful method, developed in the mid-nineties by Bazhanov, Lukyanov and Zamolodchikov and, as such, called BLZ. This method can be interpreted as a field theory version of the quantum inverse scattering, also known as the algebraic Bethe ansatz. Starting with the case of conformal field theories (CFTs) we show how to build the field theory analogues of commuting transfer T matrices and Baxter Q -operators of integrable lattice models. These objects contain the complete information of the integrable structure of the theory, viz. the integrals of motion, and can be used, as we will show, to derive the thermodynamic Bethe ansatz and nonlinear integral equations. This same method can be easily extended to the description of integrable structures of certain particular massive deformations of CFTs; these, in turn, can be described as quantum group reductions of the quantum sine-Gordon model and it is an easy step to include this last theory in the framework of BLZ approach. Finally we show an interesting and surprising connection of the BLZ structures with classical objects emerging from the study of classical integrable models via the inverse scattering transform method. This connection goes under the name of ODE/IM correspondence and we will present it for the specific case of quantum sine-Gordon model only. (topical review)

  7. A company I can trust? Organizational lay theories moderate stereotype threat for women.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2015-02-01

    Women remain under-represented in the leadership of corporate America. According to stereotype threat theory, this under-representation may persist because women are concerned about being stereotyped in business settings. Three studies investigated whether an entity (fixed), compared with an incremental (malleable), organizational lay theory is threatening for women evaluating a consulting company. Men and women viewed a company mission statement or website containing an entity or incremental theory. Results revealed that women--more so than men--trusted the entity company less than the incremental company. Furthermore, only women's mistrust of the entity company was driven by their expectations about being stereotyped by its management. Notably, when combined with high or low representations of female employees, only organizational lay theories predicted trust. Finally, people's--particularly women's--mistrust of the entity company led them to disengage more before interacting with a representative. Implications for women's experiences and outcomes in workplace settings are discussed. © 2014 by the Society for Personality and Social Psychology, Inc.

  8. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  9. Topological quantum theories and integrable models

    International Nuclear Information System (INIS)

    Keski-Vakkuri, E.; Niemi, A.J.; Semenoff, G.; Tirkkonen, O.

    1991-01-01

    The path-integral generalization of the Duistermaat-Heckman integration formula is investigated for integrable models. It is shown that for models with periodic classical trajectories the path integral reduces to a form similar to the finite-dimensional Duistermaat-Heckman integration formula. This provides a relation between exactness of the stationary-phase approximation and Morse theory. It is also argued that certain integrable models can be related to topological quantum theories. Finally, it is found that in general the stationary-phase approximation presumes that the initial and final configurations are in different polarizations. This is exemplified by the quantization of the SU(2) coadjoint orbit

  10. Gauge and integrable theories in loop spaces

    International Nuclear Information System (INIS)

    Ferreira, L.A.; Luchini, G.

    2012-01-01

    We propose an integral formulation of the equations of motion of a large class of field theories which leads in a quite natural and direct way to the construction of conservation laws. The approach is based on generalized non-abelian Stokes theorems for p-form connections, and its appropriate mathematical language is that of loop spaces. The equations of motion are written as the equality of a hyper-volume ordered integral to a hyper-surface ordered integral on the border of that hyper-volume. The approach applies to integrable field theories in (1+1) dimensions, Chern-Simons theories in (2+1) dimensions, and non-abelian gauge theories in (2+1) and (3+1) dimensions. The results presented in this paper are relevant for the understanding of global properties of those theories. As a special byproduct we solve a long standing problem in (3+1)-dimensional Yang-Mills theory, namely the construction of conserved charges, valid for any solution, which are invariant under arbitrary gauge transformations.

  11. Toward a mechanistic explanation of phenotypic evolution: The need for a theory of theory integration.

    Science.gov (United States)

    Laubichler, Manfred D; Prohaska, Sonja J; Stadler, Peter F

    2018-01-01

    Reconciling different underlying ontologies and explanatory contexts has been one of the main challenges and impediments for theory integration in biology. Here, we analyze the challenge of developing an inclusive and integrative theory of phenotypic evolution as an example for the broader challenge of developing a theory of theory integration within the life sciences and suggest a number of necessary formal steps toward the resolution of often incompatible (hidden) assumptions. Theory integration in biology requires a better formal understanding of the structure of biological theories The strategy for integrating theories crucially depends on the relationships of the underlying ontologies. © 2018 Wiley Periodicals, Inc.

  12. An Integrated Theory of Everything (TOE)

    Science.gov (United States)

    Colella, Antonio

    2014-03-01

    An Integrated TOE unifies all known physical phenomena from the Planck cube to the Super Universe (multiverse). Each matter/force particle is represented by a Planck cube string. Any Super Universe object is a volume of contiguous Planck cubes. Super force Planck cube string singularities existed at the start of all universes. An Integrated TOE foundations are twenty independent existing theories and without sacrificing their integrities, are replaced by twenty interrelated amplified theories. Amplifications of Higgs force theory are key to an Integrated TOE and include: 64 supersymmetric Higgs particles; super force condensations to 17 matter particles/associated Higgs forces; spontaneous symmetry breaking is bidirectional; and the sum of 8 permanent Higgs force energies is dark energy. Stellar black hole theory was amplified to include a quark star (matter) with mass, volume, near zero temperature, and maximum entropy. A black hole (energy) has energy, minimal volume (singularity), near infinite temperature, and minimum entropy. Our precursor universe's super supermassive quark star (matter) evaporated to a super supermassive black hole (energy). This transferred total conserved energy/mass and transformed entropy from maximum to minimum. Integrated Theory of Everything Book Video: https://www.youtube.com/watch?v=4a1c9IvdoGY Research Article Video: http://www.youtube.com/watch?v=CD-QoLeVbSY Research Article: http://toncolella.files.wordpress.com/2012/07/m080112.pdf.

  13. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  14. Solitonic Integrable Perturbations of Parafermionic Theories

    CERN Document Server

    Fernández-Pousa, C R; Hollowood, Timothy J; Miramontes, J L

    1997-01-01

    The quantum integrability of a class of massive perturbations of the parafermionic conformal field theories associated to compact Lie groups is established by showing that they have quantum conserved densities of scale dimension 2 and 3. These theories are integrable for any value of a continuous vector coupling constant, and they generalize the perturbation of the minimal parafermionic models by their first thermal operator. The classical equations-of-motion of these perturbed theories are the non-abelian affine Toda equations which admit (charged) soliton solutions whose semi-classical quantization is expected to permit the identification of the exact S-matrix of the theory.

  15. Being smart or getting smarter: Implicit theory of intelligence moderates stereotype threat and stereotype lift effects.

    Science.gov (United States)

    Froehlich, Laura; Martiny, Sarah E; Deaux, Kay; Goetz, Thomas; Mok, Sog Yee

    2016-09-01

    This research explores implicit theory of intelligence (TOI) as a moderator of stereotype activation effects on test performance for members of negatively stereotyped and of favourably stereotyped groups. In Germany, Turkish-origin migrants are stereotyped as low in verbal ability. We predicted that on a test diagnostic of verbal intelligence, endorsement of an entity TOI predicts stereotype threat effects for Turkish-origin students and stereotype lift effects for German students. This effect could account for some of the performance gap between immigrants and host society members after stereotype activation. Study 1 (N = 107) established structural equivalence of implicit theories across the ethnic groups. In two experimental studies (Study 2: N = 182, Study 3: N = 190), we tested the moderating effect of TOI in a 2 (stereotype activation: diagnostic vs. non-diagnostic test) × 2 (ethnicity: German vs. Turkish migration background) experimental design. The results showed that when the test was described as diagnostic of verbal intelligence, higher entity theory endorsement predicted stereotype threat effects for Turkish-origin students (Study 2 and Study 3) and stereotype lift effects for German students (Study 3). The results are discussed in terms of practical implications for educational settings and theoretical implications for processes underlying stereotype activation effects. © 2016 The British Psychological Society.

  16. Theory of Prejudice and American Identity Threat Transfer for Latino and Asian Americans.

    Science.gov (United States)

    Sanchez, Diana T; Chaney, Kimberly E; Manuel, Sara K; Remedios, Jessica D

    2018-03-01

    Latinos and Asian Americans confront similar stereotypes as they are often presumed to be foreigners and subjected to American identity denial. Across six studies (total N = 992), we demonstrate that Latinos and Asians anticipate ingroup prejudice and specific types of subordination (e.g., American identity threat) in the face of outgroup threats that target one another (i.e., stigma transfer). The studies explore whether stigma transfer occurred primarily when shared Latino and Asian stereotype content was a salient component of the prejudice remark (e.g., foreigner stereotypes; Study 3), or when outgroup prejudice targeted a social group with shared stereotype content (Study 4), though neither appeared to substantively moderate stigma transfer. Minority group members who conceptualize prejudiced people as holding multiple biases (i.e., a monolithic prejudice theory) were more susceptible to stigma transfer suggesting that stereotype content is not necessary for stigma transfer because people assume that prejudice is not singular.

  17. An integrated approach to adapt physical protection to the new terrorism threats

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Braun, C.; Bunn, G.

    2002-01-01

    Full text: New terrorism (NT) differs significantly from the traditional form of terrorism insofar as it has the capability to: train and deploy suicide commandos; use sophisticated logistics; implement transnational terrorist operations; infiltrate security and diplomatic communities; and commit acts of mass disturbance and mass killings. NT does not engage in negotiations: it does not discriminate in its attacks between children, adult civilians or military personnel; and it is willing to deploy weapons of mass destruction. These characteristics require that the conventional approach to physical protection of installations dealing with nuclear and other radioactive materials (e.g., Design Basis Threat (DBT)) be adapted accordingly. This integrated approach should encompass: at the international level: revised legally binding conventions and recommendations which are more specific than current versions, providing practically applicable advice reflecting the new threat scenarios; at the national level: introducing an element of transparency for validating the national threat perception and supra-national review of the effectiveness of the counteractions taken such as regulatory approaches implementing these international agreements; at the operational level: enhancing security-related co-operation at the command and control level between the on-site security forces at nuclear installations, the response force, police and the military, as well as upgrading of the force-on-force training; and at the research level: R and D in physical protection technology and practices to keep abreast of the threats posed by the NT. (author)

  18. Non-integrable quantum field theories as perturbations of certain integrable models

    International Nuclear Information System (INIS)

    Delfino, G.; Simonetti, P.

    1996-03-01

    We approach the study of non-integrable models of two-dimensional quantum field theory as perturbations of the integrable ones. By exploiting the knowledge of the exact S-matrix and Form Factors of the integrable field theories we obtain the first order corrections to the mass ratios, the vacuum energy density and the S-matrix of the non-integrable theories. As interesting applications of the formalism, we study the scaling region of the Ising model in an external magnetic field at T ∼ T c and the scaling region around the minimal model M 2 , τ . For these models, a remarkable agreement is observed between the theoretical predictions and the data extracted by a numerical diagonalization of their Hamiltonian. (author). 41 refs, 9 figs, 1 tab

  19. Path integral quantization of parametrized field theory

    International Nuclear Information System (INIS)

    Varadarajan, Madhavan

    2004-01-01

    Free scalar field theory on a flat spacetime can be cast into a generally covariant form known as parametrized field theory in which the action is a functional of the scalar field as well as the embedding variables which describe arbitrary, in general curved, foliations of the flat spacetime. We construct the path integral quantization of parametrized field theory in order to analyze issues at the interface of quantum field theory and general covariance in a path integral context. We show that the measure in the Lorentzian path integral is nontrivial and is the analog of the Fradkin-Vilkovisky measure for quantum gravity. We construct Euclidean functional integrals in the generally covariant setting of parametrized field theory using key ideas of Schleich and show that our constructions imply the existence of nonstandard 'Wick rotations' of the standard free scalar field two-point function. We develop a framework to study the problem of time through computations of scalar field two-point functions. We illustrate our ideas through explicit computation for a time independent (1+1)-dimensional foliation. Although the problem of time seems to be absent in this simple example, the general case is still open. We discuss our results in the contexts of the path integral formulation of quantum gravity and the canonical quantization of parametrized field theory

  20. Explaining Academic Progress via Combining Concepts of Integration Theory and Rational Choice Theory.

    Science.gov (United States)

    Beekhoven, S.; De Jong, U.; Van Hout, H.

    2002-01-01

    Compared elements of rational choice theory and integration theory on the basis of their power to explain variance in academic progress. Asserts that the concepts should be combined, and the distinction between social and academic integration abandoned. Empirical analysis showed that an extended model, comprising both integration and rational…

  1. Introduction to Measure Theory and Integration

    CERN Document Server

    Ambrosio, Luigi; Mennucci, Andrea

    2011-01-01

    This textbook collects the notes for an introductory course in measure theory and integration. The course was taught by the authors to undergraduate students of the Scuola Normale Superiore, in the years 2000-2011. The goal of the course was to present, in a quick but rigorous way, the modern point of view on measure theory and integration, putting Lebesgue's Euclidean space theory into a more general context and presenting the basic applications to Fourier series, calculus and real analysis. The text can also pave the way to more advanced courses in probability, stochastic processes or geomet

  2. Quiver gauge theories and integrable lattice models

    International Nuclear Information System (INIS)

    Yagi, Junya

    2015-01-01

    We discuss connections between certain classes of supersymmetric quiver gauge theories and integrable lattice models from the point of view of topological quantum field theories (TQFTs). The relevant classes include 4d N=1 theories known as brane box and brane tilling models, 3d N=2 and 2d N=(2,2) theories obtained from them by compactification, and 2d N=(0,2) theories closely related to these theories. We argue that their supersymmetric indices carry structures of TQFTs equipped with line operators, and as a consequence, are equal to the partition functions of lattice models. The integrability of these models follows from the existence of extra dimension in the TQFTs, which emerges after the theories are embedded in M-theory. The Yang-Baxter equation expresses the invariance of supersymmetric indices under Seiberg duality and its lower-dimensional analogs.

  3. Integrated model of port oil piping transportation system safety including operating environment threats

    Directory of Open Access Journals (Sweden)

    Kołowrocki Krzysztof

    2017-06-01

    Full Text Available The paper presents an integrated general model of complex technical system, linking its multistate safety model and the model of its operation process including operating environment threats and considering variable at different operation states its safety structures and its components safety parameters. Under the assumption that the system has exponential safety function, the safety characteristics of the port oil piping transportation system are determined.

  4. Integrated model of port oil piping transportation system safety including operating environment threats

    OpenAIRE

    Kołowrocki, Krzysztof; Kuligowska, Ewa; Soszyńska-Budny, Joanna

    2017-01-01

    The paper presents an integrated general model of complex technical system, linking its multistate safety model and the model of its operation process including operating environment threats and considering variable at different operation states its safety structures and its components safety parameters. Under the assumption that the system has exponential safety function, the safety characteristics of the port oil piping transportation system are determined.

  5. Anxiety and Threat-Related Attention: Cognitive-Motivational Framework and Treatment.

    Science.gov (United States)

    Mogg, Karin; Bradley, Brendan P

    2018-03-01

    Research in experimental psychopathology and cognitive theories of anxiety highlight threat-related attention biases (ABs) and underpin the development of a computer-delivered treatment for anxiety disorders: attention-bias modification (ABM) training. Variable effects of ABM training on anxiety and ABs generate conflicting research recommendations, novel ABM training procedures, and theoretical controversy. This article summarises an updated cognitive-motivational framework, integrating proposals from cognitive models of anxiety and attention, as well as evidence of ABs. Interactions between motivational salience-driven and goal-directed influences on multiple cognitive processes (e.g., stimulus evaluation, inhibition, switching, orienting) underlie anxiety and the variable manifestations of ABs (orienting towards and away from threat; threat-distractor interference). This theoretical analysis also considers ABM training as cognitive skill training, describes a conceptual framework for evaluating/developing novel ABM training procedures, and complements network-based research on reciprocal anxiety-cognition relationships. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  6. Minimal string theories and integrable hierarchies

    Science.gov (United States)

    Iyer, Ramakrishnan

    Well-defined, non-perturbative formulations of the physics of string theories in specific minimal or superminimal model backgrounds can be obtained by solving matrix models in the double scaling limit. They provide us with the first examples of completely solvable string theories. Despite being relatively simple compared to higher dimensional critical string theories, they furnish non-perturbative descriptions of interesting physical phenomena such as geometrical transitions between D-branes and fluxes, tachyon condensation and holography. The physics of these theories in the minimal model backgrounds is succinctly encoded in a non-linear differential equation known as the string equation, along with an associated hierarchy of integrable partial differential equations (PDEs). The bosonic string in (2,2m-1) conformal minimal model backgrounds and the type 0A string in (2,4 m) superconformal minimal model backgrounds have the Korteweg-de Vries system, while type 0B in (2,4m) backgrounds has the Zakharov-Shabat system. The integrable PDE hierarchy governs flows between backgrounds with different m. In this thesis, we explore this interesting connection between minimal string theories and integrable hierarchies further. We uncover the remarkable role that an infinite hierarchy of non-linear differential equations plays in organizing and connecting certain minimal string theories non-perturbatively. We are able to embed the type 0A and 0B (A,A) minimal string theories into this single framework. The string theories arise as special limits of a rich system of equations underpinned by an integrable system known as the dispersive water wave hierarchy. We find that there are several other string-like limits of the system, and conjecture that some of them are type IIA and IIB (A,D) minimal string backgrounds. We explain how these and several other string-like special points arise and are connected. In some cases, the framework endows the theories with a non

  7. Irreducible integrable theories form tensor products of conformal models

    International Nuclear Information System (INIS)

    Mathur, S.D.; Warner, N.P.

    1991-01-01

    By using Toda field theories we show that there are perturbations of direct products of conformal theories that lead to irreducible integrable field theories. The same affine Toda theory can be truncated to different quantum integrable models for different choices of the charge at infinity and the coupling. The classification of integrable models that can be obtained in this fashion follows the classification of symmetric spaces of type G/H with rank H = rank G. (orig.)

  8. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis

    OpenAIRE

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-we...

  9. Motivation for Aggressive Religious Radicalization: Goal Regulation Theory and a Personality × Threat × Affordance Hypothesis

    OpenAIRE

    Ian eMcGregor; Joseph eHayes; Mike ePrentice; Mike ePrentice

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization. It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward aggressive religious radicalization. Conducive personality traits are oppositional, anxi...

  10. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  11. Explaining academic progress via combining concepts of integration theory and rational choice theory

    NARCIS (Netherlands)

    Beekhoven, S.; Jong, U. de; Hout, J.F.M.J. van

    2002-01-01

    In this article, elements of rational choice theory and integration theory are compared on the basis of their explanatory power to explain variance in academic progress. It is argued that both theoretical concepts could be combined. Furthermore the distinction between social and academic integration

  12. Discovery, utilisation and analysis of credible threats for 2×2 incomplete information games in the Theory of Moves framework

    Science.gov (United States)

    Olsen, Jolie; Sen, Sandip

    2014-04-01

    Steven Brams's [(1994). Theory of moves. Cambridge University Press] Theory of Moves (TOM) is an alternative to traditional game theoretic treatment of real-life interactions, in which players choose strategies based on analysis of future moves and counter-moves that arise if game play commences at a specified start state and either player can choose to move first. In repeated play, players using TOM rationality arrive at nonmyopic equilibria. One advantage of TOM is its ability to model scenarios in which power asymmetries exist between players. In particular, threat power, i.e. the ability of one player to threaten and sustain immediate, globally disadvantageous outcomes to force a desirable result long term, can be utilised to induce Pareto optimal states in games such as Prisoner's Dilemma which result in Pareto-dominated outcomes using traditional methods. Unfortunately, prior work on TOM is limited by an assumption of complete information. This paper presents a mechanism that can be used by a player to utilise threat power when playing a strict, ordinal 2×2 game under incomplete information. We also analyse the benefits of threat power and support in this analysis with empirical evidence.

  13. Threat and defense as goal regulation: from implicit goal conflict to anxious uncertainty, reactive approach motivation, and ideological extremism.

    Science.gov (United States)

    Nash, Kyle; McGregor, Ian; Prentice, Mike

    2011-12-01

    Four studies investigated a goal regulation view of anxious uncertainty threat (Gray & McNaughton, 2000) and ideological defense. Participants (N = 444) were randomly assigned to have achievement or relationship goals implicitly primed. The implicit goal primes were followed by randomly assigned achievement or relationship threats that have reliably caused generalized, reactive approach motivation and ideological defense in past research. The threats caused anxious uncertainty (Study 1), reactive approach motivation (Studies 2 and 3), and reactive ideological conviction (Study 4) only when threat-relevant goals had first been primed, but not when threat-irrelevant goals had first been primed. Reactive ideological conviction (Study 4) was eliminated if participants were given an opportunity to attribute their anxiety to a mundane source. Results support a goal regulation view of anxious uncertainty, threat, and defense with potential for integrating theories of defensive compensation.

  14. Integrability of conformal fishnet theory

    Science.gov (United States)

    Gromov, Nikolay; Kazakov, Vladimir; Korchemsky, Gregory; Negro, Stefano; Sizov, Grigory

    2018-01-01

    We study integrability of fishnet-type Feynman graphs arising in planar four-dimensional bi-scalar chiral theory recently proposed in arXiv:1512.06704 as a special double scaling limit of gamma-deformed N = 4 SYM theory. We show that the transfer matrix "building" the fishnet graphs emerges from the R-matrix of non-compact conformal SU(2 , 2) Heisenberg spin chain with spins belonging to principal series representations of the four-dimensional conformal group. We demonstrate explicitly a relationship between this integrable spin chain and the Quantum Spectral Curve (QSC) of N = 4 SYM. Using QSC and spin chain methods, we construct Baxter equation for Q-functions of the conformal spin chain needed for computation of the anomalous dimensions of operators of the type tr( ϕ 1 J ) where ϕ 1 is one of the two scalars of the theory. For J = 3 we derive from QSC a quantization condition that fixes the relevant solution of Baxter equation. The scaling dimensions of the operators only receive contributions from wheel-like graphs. We develop integrability techniques to compute the divergent part of these graphs and use it to present the weak coupling expansion of dimensions to very high orders. Then we apply our exact equations to calculate the anomalous dimensions with J = 3 to practically unlimited precision at any coupling. These equations also describe an infinite tower of local conformal operators all carrying the same charge J = 3. The method should be applicable for any J and, in principle, to any local operators of bi-scalar theory. We show that at strong coupling the scaling dimensions can be derived from semiclassical quantization of finite gap solutions describing an integrable system of noncompact SU(2 , 2) spins. This bears similarities with the classical strings arising in the strongly coupled limit of N = 4 SYM.

  15. Contemporary Neighborhood Theories: Integration versus Romance and Reaction.

    Science.gov (United States)

    Stever, James A.

    1978-01-01

    This paper discusses the integrative, romantic, and reactive theories of neighborhood government within the context of the urban reform movement and argues that the integrative theory is the one best suited for an effective political relationship between the neighborhood and the greater metropolis. (EB)

  16. A new integrability theory for certain nonlinear physical problems

    International Nuclear Information System (INIS)

    Berger, M.S.

    1993-01-01

    A new mathematically sound integrability theory for certain nonlinear problems defined by ordinary or partial differential equations is defined. The new theory works in an arbitrary finite number of space dimensions. Moreover, if a system is integrable in the new sense described here, it has a remarkable stability property that distinguishes if from any previously known integrability ideas. The new theory proceeds by establishing a ''global normal form'' for the problem at hand. This normal form holds subject to canonical coordinate transformations, extending such classical ideas by using new nonlinear methods of infinite dimensional functional analysis. The global normal form in question is related to the mathematical theory of singularities of mappings of H. Whitney and R. Thom extended globally and form finite to infinite dimensions. Thus bifurcation phenomena are naturally included in the new integrability theory. Typical examples include the classically nonintegrable Riccati equation, certain non-Euclidean mean field theories, certain parabolic reaction diffusion equations and the hyperbolic nonlinear telegrapher's equation. (Author)

  17. The Role of Threat Level and Intolerance of Uncertainty (IU) in Anxiety: An Experimental Test of IU Theory.

    Science.gov (United States)

    Oglesby, Mary E; Schmidt, Norman B

    2017-07-01

    Intolerance of uncertainty (IU) has been proposed as an important transdiagnostic variable within mood- and anxiety-related disorders. The extant literature has suggested that individuals high in IU interpret uncertainty more negatively. Furthermore, theoretical models of IU posit that those elevated in IU may experience an uncertain threat as more anxiety provoking than a certain threat. However, no research to date has experimentally manipulated the certainty of an impending threat while utilizing an in vivo stressor. In the current study, undergraduate participants (N = 79) were randomized to one of two conditions: certain threat (participants were told that later on in the study they would give a 3-minute speech) or uncertain threat (participants were told that later on in the study they would flip a coin to determine whether or not they would give a 3-minute speech). Participants also completed self-report questionnaires measuring their baseline state anxiety, baseline trait IU, and prespeech state anxiety. Results indicated that trait IU was associated with greater state anticipatory anxiety when the prospect of giving a speech was made uncertain (i.e., uncertain condition). Further, findings indicated no significant difference in anticipatory state anxiety among individuals high in IU when comparing an uncertain versus certain threat (i.e., uncertain and certain threat conditions, respectively). Furthermore, results found no significant interaction between condition and trait IU when predicting state anticipatory anxiety. This investigation is the first to test a crucial component of IU theory while utilizing an ecologically valid paradigm. Results of the present study are discussed in terms of theoretical models of IU and directions for future work. Copyright © 2017. Published by Elsevier Ltd.

  18. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  19. Field theory a path integral approach

    CERN Document Server

    Das, Ashok

    2006-01-01

    This unique book describes quantum field theory completely within the context of path integrals. With its utility in a variety of fields in physics, the subject matter is primarily developed within the context of quantum mechanics before going into specialized areas.Adding new material keenly requested by readers, this second edition is an important expansion of the popular first edition. Two extra chapters cover path integral quantization of gauge theories and anomalies, and a new section extends the supersymmetry chapter, where singular potentials in supersymmetric systems are described.

  20. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  1. Constructive algebraic integration theory

    NARCIS (Netherlands)

    Spitters, B.A.W.

    2006-01-01

    For a long time people have been trying to develop probability theory starting from ‘finite’ events rather than collections of infinite events. In this way one can find natural replacements for measurable sets and integrable functions, but measurable functions seemed to be more difficult to find. We

  2. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  3. Differential and integral forms in supergauge theories and supergravity

    International Nuclear Information System (INIS)

    Zupnik, B.M.; Pak, D.G.

    1989-01-01

    D = 3, 4, N = 1 supergauge theories and D = 3, N = 1 supergravity are considered in the superfield formalism by using differential and integral forms. A special map of the space of differential forms into the space of integral forms is proposed. By means of this map we find the superfield Chern-Simons terms in D = 3, N = 1 Yang-Mills theory and supergravity. The integral forms corresponding to superfield invariants of D = 4, N = 1 supergauge theory have also been constructed. (Author)

  4. Preventive health psychology from a developmental perspective: an extension of protection motivation theory.

    Science.gov (United States)

    Sturges, J W; Rogers, R W

    1996-05-01

    Theories of health psychology developed to explain adults' rational decision making were applied to 10-year-old children (n = 112), who had not reached the stage of formal operational thought; 15-year-olds (n = 67); and 20-year-olds (n = 93), extending the protection motivation theory developed by R. W. Rogers (1983). Among the adolescents and young adults, the threat appeals worked only if people believed they could cope effectively with the danger; if they believed they could not cope, higher levels of the threat resulted in decreased intentions to refrain from tobacco use. Although children elaborated and integrated the information about threat severity, personal vulnerability, and response efficacy, the fragility and malleability of the children's beliefs in self-efficacy demonstrated the importance of adding a developmental perspective to theories of preventive health psychology.

  5. Perturbation theory and importance functions in integral transport formulations

    International Nuclear Information System (INIS)

    Greenspan, E.

    1976-01-01

    Perturbation theory expressions for the static reactivity derived from the flux, collision density, birth-rate density, and fission-neutron density formulations of integral transport theory, and from the integro-differential formulation, are intercompared. The physical meaning and relation of the adjoint functions corresponding to each of the five formulations are established. It is found that the first-order approximation of the perturbation expressions depends on the transport theory formulation and on the adjoint function used. The approximations of the integro-differential formulation corresponding to different first-order approximations of the integral transport theory formulations are identified. It is found that the accuracy of all first-order approximations of the integral transport formulations examined is superior to the accuracy of first-order integro-differential perturbation theory

  6. Model integration and a theory of models

    OpenAIRE

    Dolk, Daniel R.; Kottemann, Jeffrey E.

    1993-01-01

    Model integration extends the scope of model management to include the dimension of manipulation as well. This invariably leads to comparisons with database theory. Model integration is viewed from four perspectives: Organizational, definitional, procedural, and implementational. Strategic modeling is discussed as the organizational motivation for model integration. Schema and process integration are examined as the logical and manipulation counterparts of model integr...

  7. Organic unity theory: an integrative mind-body theory for psychiatry.

    Science.gov (United States)

    Goodman, A

    1997-12-01

    The potential of psychiatry as an integrative science has been impeded by an internal schism that derives from the duality of mental and physical. Organic unity theory is proposed as a conceptual framework that brings together the terms of the mind-body duality in one coherent perspective. Organic unity theory is braided of three strands: identity, which describes the relationship between mentally described events and corresponding physically described events; continuity, which describes the linguistic-conceptual system that contains both mental and physical terms; and dialectic, which describes the relationship between the empirical way of knowing that is associated with the physical domain of the linguistic-conceptual system and the hermeneutic way of knowing that is associated with the mental domain. Each strand represents an integrative formulation that resolves an aspect of mental-physical dualism into an underlying unity. After the theory is presented, its implications for psychiatry are briefly considered.

  8. Quadrature theory the theory of numerical integration on a compact interval

    CERN Document Server

    Brass, Helmut

    2011-01-01

    Every book on numerical analysis covers methods for the approximate calculation of definite integrals. The authors of this book provide a complementary treatment of the topic by presenting a coherent theory of quadrature methods that encompasses many deep and elegant results as well as a large number of interesting (solved and open) problems. The inclusion of the word "theory" in the title highlights the authors' emphasis on analytical questions, such as the existence and structure of quadrature methods and selection criteria based on strict error bounds for quadrature rules. Systematic analyses of this kind rely on certain properties of the integrand, called "co-observations," which form the central organizing principle for the authors' theory, and distinguish their book from other texts on numerical integration. A wide variety of co-observations are examined, as a detailed understanding of these is useful for solving problems in practical contexts. While quadrature theory is often viewed as a branch of nume...

  9. Integrable structure in discrete shell membrane theory.

    Science.gov (United States)

    Schief, W K

    2014-05-08

    We present natural discrete analogues of two integrable classes of shell membranes. By construction, these discrete shell membranes are in equilibrium with respect to suitably chosen internal stresses and external forces. The integrability of the underlying equilibrium equations is proved by relating the geometry of the discrete shell membranes to discrete O surface theory. We establish connections with generalized barycentric coordinates and nine-point centres and identify a discrete version of the classical Gauss equation of surface theory.

  10. Motivation for aggressive religious radicalization: goal regulation theory and a personality × threat × affordance hypothesis.

    Science.gov (United States)

    McGregor, Ian; Hayes, Joseph; Prentice, Mike

    2015-01-01

    A new set of hypotheses is presented regarding the cause of aggressive religious radicalization (ARR). It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward ARR. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered). Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that ARR is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress.

  11. Equivalence of some integrals of the radiation theory

    International Nuclear Information System (INIS)

    Chia, T.T.

    1977-01-01

    A definite integral which occurs in radiation theory is shown to be equal in value to another definite integral by evaluating the flux from a spherically symmetrical radiating sphere in two ways. As a corollary, an alternate proof of the invariance of the specific intensity of a ray in empty space along its path is presented. Furthermore, the equality of these two indefinite integrals leads to the conversion of members of a class of indefinite and definite integrals involving arbitrary functions of angle into other integrals. These transformations facilitate the calculation of some of these integrals which arise not only in the theory of radiation, but in other physical situations with spherical or axial symmetry - especially those in which inverse-square laws are involved. (Auth.)

  12. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  13. Managing heterogeneous knowledge: A Theory of External Knowledge Integration

    NARCIS (Netherlands)

    Kraaijenbrink, Jeroen; Wijnhoven, Alphonsus B.J.M.

    2008-01-01

    Knowledge integration has been theorised at the levels of organisations and inter-organisational dyads. However, no theory exists yet of the integration of knowledge from an organisation's environment. This paper addresses this void in the literature by presenting a theory of external knowledge

  14. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Motivation for Aggressive Religious Radicalization: Goal Regulation Theory and a Personality × Threat × Affordance Hypothesis

    Directory of Open Access Journals (Sweden)

    Ian eMcGregor

    2015-09-01

    Full Text Available A new set of hypotheses is presented regarding the cause of aggressive religious radicalization. It is grounded in classic and contemporary theory of human motivation and goal regulation, together with recent empirical advances in personality, social, and neurophysiological psychology. We specify personality traits, threats, and group affordances that combine to divert normal motivational processes toward aggressive religious radicalization. Conducive personality traits are oppositional, anxiety-prone, and identity-weak (i.e., morally bewildered. Conducive threats are those that arise from seemingly insurmountable external forces and frustrate effective goal regulation. Conducive affordances include opportunity for immediate and concrete engagement in active groups that are powered by conspiracy narratives, infused with cosmic significance, encouraging of moral violence, and sealed with religious unfalsifiability. We propose that aggressive religious radicalization is rewarding because it can spur approach motivated states that mask vulnerability for people whose dispositions and circumstances would otherwise leave them mired in anxious distress.

  16. THREATS AND BENEFITS OF EXCHANGE RATE REGIMES FOR UKRAINE IN TERMS OF EUROPEAN INTEGRATION

    OpenAIRE

    Svitlana Glushchenko; Svitlana Tkalenko

    2016-01-01

    The purpose of the paper is to determine threats and benefits of exchange rate regimes in terms of the integration of Ukraine into the European community. Emphasizing features of the manifestation of currency exchange rate in Ukrainian practice is a precondition for choosing the optimal exchange rate regime for Ukraine, which, in its turn, will provide an opportunity to reduce inflation and implement effective tools of monetary and fiscal policies to promote further economic growth and compet...

  17. Toward an Integrative Theory of the Firm

    DEFF Research Database (Denmark)

    Li, Xin

    understand the nature and behaviors of the firm, we need a comprehensive yet integrative theory. Toward this end, this paper proposes a relationship-based theory of the firm (R’BT) which claims that it is the relationships between the entrepreneur and other individuals or firms that determine the existence......This paper argues that the existing four major theories of the firm, i.e., the transaction cost theory, resource-based view, the entrepreneurial theory, and the stakeholder theory, are all insightful yet partial because each of them has a particular focus on the phenomenon of the firm. To better...

  18. Psychological Defenses against Death Anxiety: Integrating Terror Management Theory and Firestone's Separation Theory

    Science.gov (United States)

    Bassett, Jonathan F.

    2007-01-01

    The author attempts to integrate Terror Management Theory (TMT) and R. W. Firestone's Separation Theory (1984, 1994). Both theories emphasize defense against death anxiety as a key human motive. Whereas TMT focuses extensively on self-esteem and cultural worldview, Firestone posited additional defenses such as gene survival, self-nourishing…

  19. Existential Threat or Dissociative Response? Examining Defensive Avoidance of Point-of-Care Testing Devices Through a Terror Management Theory Framework.

    Science.gov (United States)

    Dunne, Simon; Gallagher, Pamela; Matthews, Anne

    2015-01-01

    Using a terror management theory framework, this study investigated if providing mortality reminders or self-esteem threats would lead participants to exhibit avoidant responses toward a point-of-care testing device for cardiovascular disease risk and if the nature of the device served to diminish the existential threat of cardiovascular disease. One hundred and twelve participants aged 40-55 years completed an experimental questionnaire. Findings indicated that participants were not existentially threatened by established terror management methodologies, potentially because of cross-cultural variability toward such methodologies. Highly positive appraisals of the device also suggest that similar technologies may beneficially affect the uptake of screening behaviors.

  20. Simulating power integration in Latin America to assess challenges, opportunities, and threats

    International Nuclear Information System (INIS)

    Ochoa, Camila; Dyner, Isaac; Franco, Carlos J.

    2013-01-01

    Integration of electricity markets started to spread under the world-wide trend to economic liberalization. While some regions are managing better than others, lessons, both political and technical, highlight challenges ahead that need to be overcome. Since the early 2000s, Panama, Colombia, Ecuador, and Peru have decided to integrate their electricity markets, eventually creating an enormous Latin American electricity exchange, ranging from Mexico to Chile. This poses opportunities and threats to the region as it involves cooperation, trust, and the will to overcome difficulties that may arise. In this direction, we developed a system dynamics model, linked to an iterative algorithm, to assess the likely effects of integration on both system expansion and security of supply. The model helps us understand the logic of the long-term system behavior under different policies, assuming Market Coupling as the dispatch mechanism. Based on theoretical grounds and after analyzing simulation results under different scenarios, we conclude that the integration of electricity markets may render important opportunities regarding security of supply and efficiency; and consequently energy might be supplied at lower prices, using “cleaner” technologies. However, benefits largely depend on policy, regulation, and technical issues. - Highlights: • We model the likely long-term dynamics of regional integration in Latin America. • The approach includes a dispatch algorithm linked to a system dynamics model. • The model simulates the evolution of installed capacity and prices. • We conclude: electricity integration may provide security of supply and efficiency. • Benefits of integration largely depend on policy, regulation, and technical issues

  1. A Behavioral Theory of Human Capital Integration

    DEFF Research Database (Denmark)

    Christensen, Jesper

    design in fostering the integration and use of human capital is bounded by individual cognitive limitations that may lead employees to deviate from expected behavior, both individually and in collaboration. The thesis consists of three research papers relying on comprehensive longitudinal project data...... with one another. The overarching contribution of the thesis is to demonstrate, through the combination of psychological and organizational theory, how the ability of firms to properly activate and apply the knowledge held by their employees is fundamentally contingent on the interplay of cognitive...... of a behavioral theory of human capital integration....

  2. Localization and diagonalization. A review of functional integral techniques for low-dimensional gauge theories and topological field theories

    International Nuclear Information System (INIS)

    Blau, M.; Thompson, G.

    1995-01-01

    We review localization techniques for functional integrals which have recently been used to perform calculations in and gain insight into the structure of certain topological field theories and low-dimensional gauge theories. These are the functional integral counterparts of the Mathai-Quillen formalism, the Duistermaat-Heckman theorem, and the Weyl integral formula respectively. In each case, we first introduce the necessary mathematical background (Euler classes of vector bundles, equivariant cohomology, topology of Lie groups), and describe the finite dimensional integration formulae. We then discuss some applications to path integrals and give an overview of the relevant literature. The applications we deal with include supersymmetric quantum mechanics, cohomological field theories, phase space path integrals, and two-dimensional Yang-Mills theory. (author). 83 refs

  3. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  4. An information integration theory of consciousness

    Directory of Open Access Journals (Sweden)

    Tononi Giulio

    2004-11-01

    Full Text Available Abstract Background Consciousness poses two main problems. The first is understanding the conditions that determine to what extent a system has conscious experience. For instance, why is our consciousness generated by certain parts of our brain, such as the thalamocortical system, and not by other parts, such as the cerebellum? And why are we conscious during wakefulness and much less so during dreamless sleep? The second problem is understanding the conditions that determine what kind of consciousness a system has. For example, why do specific parts of the brain contribute specific qualities to our conscious experience, such as vision and audition? Presentation of the hypothesis This paper presents a theory about what consciousness is and how it can be measured. According to the theory, consciousness corresponds to the capacity of a system to integrate information. This claim is motivated by two key phenomenological properties of consciousness: differentiation – the availability of a very large number of conscious experiences; and integration – the unity of each such experience. The theory states that the quantity of consciousness available to a system can be measured as the Φ value of a complex of elements. Φ is the amount of causally effective information that can be integrated across the informational weakest link of a subset of elements. A complex is a subset of elements with Φ>0 that is not part of a subset of higher Φ. The theory also claims that the quality of consciousness is determined by the informational relationships among the elements of a complex, which are specified by the values of effective information among them. Finally, each particular conscious experience is specified by the value, at any given time, of the variables mediating informational interactions among the elements of a complex. Testing the hypothesis The information integration theory accounts, in a principled manner, for several neurobiological observations

  5. Path integral for relativistic particle theory

    International Nuclear Information System (INIS)

    Fradkin, E.S.; Gitman, D.M.; Shvartsman, Sh.M.

    1990-06-01

    An action for a relativistic spinning particle interacting with external electromagnetic field is considered in reparametrization and local supergauge invariant form. It is shown that various path integral representations derived for the causal Green function correspond to the different forms of the relativistic particle action. The analogy of the path integral derived with the Lagrangian path integral of the field theory is discussed. It is shown that to obtain the causal propagator, the integration over the null mode of the Lagrangian multiplier corresponding to the reparametrization invariance, has to be performed in the (0,+infinity) limits. (author). 23 refs

  6. Some open problems in random matrix theory and the theory of integrable systems

    OpenAIRE

    Deift, Percy

    2007-01-01

    We describe a list of open problems in random matrix theory and integrable systems which was presented at the conference ``Integrable Systems, Random Matrices, and Applications'' at the Courant Institute in May 2006.

  7. Theory-practice integration in selected clinical situations

    Directory of Open Access Journals (Sweden)

    M Davhana-Maselesele

    2001-09-01

    Full Text Available The current changes in health care systems challenge knowledgeable, mature and independent practitioners to integrate theoretical content with practice. The aim of this study was to investigate the problems of integrating theory with practice in selected clinical nursing situations. The study focused on rendering of family planning services to clients as a component of Community Nursing Science. Structured observation schedules were used to observe the theoretical content of the curriculum as well as the practical application of what has been taught in the clinical area. The findings of the study revealed that there was a need for an integrated holistic curriculum, which would address the needs of the community. It was concluded that a problem-based and community-based curriculum, intersectoral collaboration between college and hospital managements and student involvement in all processes of teaching and learning would improve the integration of theory and practice. There also appeared to be a need for tutors to be more involved in clinical teaching and accompaniment.

  8. Non-Gaussian path integration in self-interacting scalar field theories

    International Nuclear Information System (INIS)

    Kaya, Ali

    2004-01-01

    In self-interacting scalar field theories kinetic expansion is an alternative way of calculating the generating functional for Green's functions where the zeroth order non-Gaussian path integral becomes diagonal in x-space and reduces to the product of an ordinary integral at each point which can be evaluated exactly. We discuss how to deal with such functional integrals and propose a new perturbative expansion scheme which combines the elements of the kinetic expansion with the usual perturbation theory techniques. It is then shown that, when the cutoff dependences of the bare parameters in the potential are chosen to have a well defined non-Gaussian path integral without the kinetic term, the theory becomes trivial in the continuum limit

  9. Secure in insecurity: The case of threat perception/acceptance in the Philippines

    Directory of Open Access Journals (Sweden)

    Amador IV Peleo

    2015-12-01

    Full Text Available Current theoretical and policy-based explanations of security in the Philippines have portrayed “politics” and “security” as distinct and separate fields. However, the recent “2011–2016 National Security Policy: Securing the Gains of Democracy”, has conflated “security” and “politics”, as may be observed in its two national security goals “to promote internal socio-political stability” and “to exercise full sovereignty over its territory”. Although likely derived from administrative expediency, the composite policy definition is also likely to result in the conceptualisation of political goals that are only partially attainable and of a security environment that will remain “unsecured”. As this appears to be a norm of governance in the Philippines, this paper examines the possibility that national security policy-making is likely more concerned with the survival of the regime during which the policy was created rather than with the long-term stabilisation of the entire state. Several theories may be useful in accounting for this behaviour; namely, small states conflict theory, securitisation theory and threat normalisation theory. This paper is intended to show that the definition of threat corresponds to threat-acceptance and may likely lead to threat-toleration than to threat-resolution.

  10. BOOK REVIEW: Path Integrals in Field Theory: An Introduction

    Science.gov (United States)

    Ryder, Lewis

    2004-06-01

    In the 1960s Feynman was known to particle physicists as one of the people who solved the major problems of quantum electrodynamics, his contribution famously introducing what are now called Feynman diagrams. To other physicists he gained a reputation as the author of the Feynman Lectures on Physics; in addition some people were aware of his work on the path integral formulation of quantum theory, and a very few knew about his work on gravitation and Yang--Mills theories, which made use of path integral methods. Forty years later the scene is rather different. Many of the problems of high energy physics are solved; and the standard model incorporates Feynman's path integral method as a way of proving the renormalisability of the gauge (Yang--Mills) theories involved. Gravitation is proving a much harder nut to crack, but here also questions of renormalisability are couched in path-integral language. What is more, theoretical studies of condensed matter physics now also appeal to this technique for quantisation, so the path integral method is becoming part of the standard apparatus of theoretical physics. Chapters on it appear in a number of recent books, and a few books have appeared devoted to this topic alone; the book under review is a very recent one. Path integral techniques have the advantage of enormous conceptual appeal and the great disadvantage of mathematical complexity, this being partly the result of messy integrals but more fundamentally due to the notions of functional differentiation and integration which are involved in the method. All in all this subject is not such an easy ride. Mosel's book, described as an introduction, is aimed at graduate students and research workers in particle physics. It assumes a background knowledge of quantum mechanics, both non-relativistic and relativistic. After three chapters on the path integral formulation of non-relativistic quantum mechanics there are eight chapters on scalar and spinor field theory, followed

  11. Integrability in N=2 superconformal gauge theorie

    Energy Technology Data Exchange (ETDEWEB)

    Pomoni, Elli [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany). Theory Group; National Technical Univ. of Athens (Greece). Physics Div.

    2013-10-15

    Any N=2 superconformal gauge theory (including N=4 SYM) contains a set of local operators made only out of fields in the N=2 vector multiplet that is closed under renormalization to all loops, namely the SU(2,1 vertical stroke 2) sector. For planar N=4 SYM the spectrum of local operators can be obtained by mapping the problem to an integrable model (a spin chain in perturbation theory), in principle for any value of the coupling constant. We present a diagrammatic argument that for any planar N=2 superconformal gauge theory the SU(2,1 vertical stroke 2) Hamiltonian acting on infinite spin chains is identical to all loops to that of N=4 SYM, up to a redefinition of the coupling constant. Thus, this sector is integrable and anomalous dimensions can be, in principle, read off from the N=4 ones up to this redefinition.

  12. Integrability in N=2 superconformal gauge theories

    International Nuclear Information System (INIS)

    Pomoni, Elli; National Technical Univ. of Athens

    2013-10-01

    Any N=2 superconformal gauge theory (including N=4 SYM) contains a set of local operators made only out of fields in the N=2 vector multiplet that is closed under renormalization to all loops, namely the SU(2,1 vertical stroke 2) sector. For planar N=4 SYM the spectrum of local operators can be obtained by mapping the problem to an integrable model (a spin chain in perturbation theory), in principle for any value of the coupling constant. We present a diagrammatic argument that for any planar N=2 superconformal gauge theory the SU(2,1 vertical stroke 2) Hamiltonian acting on infinite spin chains is identical to all loops to that of N=4 SYM, up to a redefinition of the coupling constant. Thus, this sector is integrable and anomalous dimensions can be, in principle, read off from the N=4 ones up to this redefinition.

  13. Integration of multiple cues allows threat-sensitive anti-intraguild predator responses in predatory mites

    Science.gov (United States)

    Walzer, Andreas; Schausberger, Peter

    2013-01-01

    Intraguild (IG) prey is commonly confronted with multiple IG predator species. However, the IG predation (IGP) risk for prey is not only dependent on the predator species, but also on inherent (intraspecific) characteristics of a given IG predator such as its life-stage, sex or gravidity and the associated prey needs. Thus, IG prey should have evolved the ability to integrate multiple IG predator cues, which should allow both inter- and intraspecific threat-sensitive anti-predator responses. Using a guild of plant-inhabiting predatory mites sharing spider mites as prey, we evaluated the effects of single and combined cues (eggs and/or chemical traces left by a predator female on the substrate) of the low risk IG predator Neoseiulus californicus and the high risk IG predator Amblyseius andersoni on time, distance and path shape parameters of the larval IG prey Phytoseiulus persimilis. IG prey discriminated between traces of the low and high risk IG predator, with and without additional presence of their eggs, indicating interspecific threat-sensitivity. The behavioural changes were manifest in distance moved, activity and path shape of IG prey. The cue combination of traces and eggs of the IG predators conveyed other information than each cue alone, allowing intraspecific threat-sensitive responses by IG prey apparent in changed velocities and distances moved. We argue that graded responses to single and combined IG predator cues are adaptive due to minimization of acceptance errors in IG prey decision making. PMID:23750040

  14. Supporting Theory Building in Integrated Services Research

    Science.gov (United States)

    Robinson, Mark; Atkinson, Mary; Downing, Dick

    2008-01-01

    This literature review was commissioned by the National Foundation for Educational Research (NFER) to draw together current and recent studies of integrated working, in order to build an overview of the theories and models of such working. The review is important for current work on evaluating the early impact of integrated children's services and…

  15. Integrable deformations of conformal theories and bootstrap trees

    International Nuclear Information System (INIS)

    Mussardo, G.

    1991-01-01

    I present recent results in the study of massive integrable quantum field theories in (1+1) dimensions considered as perturbed conformal minimal models. The on mass-shell properties of such theories, with a particular emphasis on the bootstrap principle, are investigated. (orig.)

  16. Homological Perturbation Theory for Nonperturbative Integrals

    Science.gov (United States)

    Johnson-Freyd, Theo

    2015-11-01

    We use the homological perturbation lemma to produce explicit formulas computing the class in the twisted de Rham complex represented by an arbitrary polynomial. This is a non-asymptotic version of the method of Feynman diagrams. In particular, we explain that phenomena usually thought of as particular to asymptotic integrals in fact also occur exactly: integrals of the type appearing in quantum field theory can be reduced in a totally algebraic fashion to integrals over an Euler-Lagrange locus, provided this locus is understood in the scheme-theoretic sense, so that imaginary critical points and multiplicities of degenerate critical points contribute.

  17. Inducing Attitude Change toward Online Gaming among Adolescent Players Based on Dissonance Theory: The Role of Threats and Justification of Effort

    Science.gov (United States)

    Wan, Chin-Sheng; Chiou, Wen-Bin

    2010-01-01

    The negative impact of online gaming on adolescents has received much attention. The question of how to reduce their pathological use of online gaming is a critical issue. Based on the concept of external justification in dissonance theory, this experimental study aimed to examine whether severity of threat and justification of effort would impact…

  18. Is there room for 'development' in developmental models of information processing biases to threat in children and adolescents?

    Science.gov (United States)

    Field, Andy P; Lester, Kathryn J

    2010-12-01

    Clinical and experimental theories assume that processing biases in attention and interpretation are a causal mechanism through which anxiety develops. Despite growing evidence that these processing biases are present in children and, therefore, develop long before adulthood, these theories ignore the potential role of child development. This review attempts to place information processing biases within a theoretical developmental framework. We consider whether child development has no impact on information processing biases to threat (integral bias model), or whether child development influences information processing biases and if so whether it does so by moderating the expression of an existing bias (moderation model) or by affecting the acquisition of a bias (acquisition model). We examine the extent to which these models fit with existing theory and research evidence and outline some methodological issues that need to be considered when drawing conclusions about the potential role of child development in the information processing of threat stimuli. Finally, we speculate about the developmental processes that might be important to consider in future research.

  19. Integrated Moral Conviction Theory of Student Cheating: An Empirical Test

    Science.gov (United States)

    Roberts, Foster; Thomas, Christopher H.; Novicevic, Milorad M.; Ammeter, Anthony; Garner, Bart; Johnson, Paul; Popoola, Ifeoluwa

    2018-01-01

    In this article, we develop an "integrated moral conviction theory of student cheating" by integrating moral conviction with (a) the dual-process model of Hunt-Vitell's theory that gives primacy to individual ethical philosophies when moral judgments are made and (b) the social cognitive conceptualization that gives primacy to moral…

  20. Integrable theories that are asymptotically CFT

    CERN Document Server

    Evans, J M; Jonathan M Evans; Timothy J Hollowood

    1995-01-01

    A series of sigma models with torsion are analysed which generate their mass dynamically but whose ultra-violet fixed points are non-trivial conformal field theories -- in fact SU(2) WZW models at level k. In contrast to the more familiar situation of asymptotically free theories in which the fixed points are trivial, the sigma models considered here may be termed ``asymptotically CFT''. These theories have previously been conjectured to be quantum integrable; we confirm this by proposing a factorizable S-matrix to describe their infra-red behaviour and then carrying out a stringent test of this proposal. The test involves coupling the theory to a conserved charge and evaluating the response of the free-energy both in perturbation theory to one loop and directly from the S-matrix via the Thermodynamic Bethe Ansatz with a chemical potential at zero temperature. Comparison of these results provides convincing evidence in favour of the proposed S-matrix; it also yields the universal coefficients of the beta-func...

  1. Gauge theories and integrable lattice models

    International Nuclear Information System (INIS)

    Witten, E.

    1989-01-01

    Investigations of new knot polynomials discovered in the last few years have shown them to be intimately connected with soluble models of two dimensional lattice statistical mechanics. In this paper, these results, which in time may illuminate the whole question of why integrable lattice models exist, are reconsidered from the point of view of three dimensional gauge theory. Expectation values of Wilson lines in three dimensional Chern-Simons gauge theories can be computed by evaluating the partition functions of certain lattice models on finite graphs obtained by projecting the Wilson lines to the plane. The models in question - previously considered in both the knot theory and statistical mechanics literature - are IRF models in which the local Boltzmann weights are the matrix elements of braiding matrices in rational conformal field theories. These matrix elements, in turn, can be represented in three dimensional gauge theory in terms of the expectation value of a certain tetrahedral configuration of Wilson lines. This representation makes manifest a surprising symmetry of the braiding matrix elements in conformal field theory. (orig.)

  2. Global integrability of field theories. Proceedings

    International Nuclear Information System (INIS)

    Calmet, J.; Seiler, W.M.; Tucker, R.W.

    2006-01-01

    The GIFT 2006 workshop covers topics related to the Global Integration of Field Theories. These topics span several domains of science including Mathematics, Physics and Computer Science. It is indeed an interdisciplinary event and this feature is well illustrated by the diversity of papers presented at the workshop. Physics is our main target. A simple approach would be to state that we investigate systems of partial differential equations since it is widely believed that they provide a fair description of our world. The questions whether this world is Einsteinian or not, is described by String Theory or not are not however on our agenda. At this stage we have defined what we mean with field theories. To assess what global integrability means we surf on the two other domains of our interest. Mathematics delivers the main methodologies and tools to achieve our goal. It is a trivial remark to say that there exists several approaches to investigate the concept of integrability. Only selected ones are to be found in these proceedings. We do not try to define precisely what global integrability means. Instead, we only suggest two tracks. The first one is by analogy with the design of algorithms, in Computer Algebra or Computer Science, to solve systems of differential equations. The case of ODEs is rather well understood since a constructive methodology exists. Although many experts claim that numerous results do exist to solve systems of PDEs, no constructive decision method exists. This is our first track. The second track follows directly since the real world is described by systems of PDEs, which are mainly non-linear ones. To be able to decide in such a case of the existence of solutions would increase immediately the scope of new technologies applicable to indus trial problems. It is this latter remark that led to the European NEST project with the same name. The GIFT project aims at making progresses in the investigation of field theories through the use of very

  3. Global integrability of field theories. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Calmet, J.; Seiler, W.M.; Tucker, R.W. (eds.)

    2006-07-01

    The GIFT 2006 workshop covers topics related to the Global Integration of Field Theories. These topics span several domains of science including Mathematics, Physics and Computer Science. It is indeed an interdisciplinary event and this feature is well illustrated by the diversity of papers presented at the workshop. Physics is our main target. A simple approach would be to state that we investigate systems of partial differential equations since it is widely believed that they provide a fair description of our world. The questions whether this world is Einsteinian or not, is described by String Theory or not are not however on our agenda. At this stage we have defined what we mean with field theories. To assess what global integrability means we surf on the two other domains of our interest. Mathematics delivers the main methodologies and tools to achieve our goal. It is a trivial remark to say that there exists several approaches to investigate the concept of integrability. Only selected ones are to be found in these proceedings. We do not try to define precisely what global integrability means. Instead, we only suggest two tracks. The first one is by analogy with the design of algorithms, in Computer Algebra or Computer Science, to solve systems of differential equations. The case of ODEs is rather well understood since a constructive methodology exists. Although many experts claim that numerous results do exist to solve systems of PDEs, no constructive decision method exists. This is our first track. The second track follows directly since the real world is described by systems of PDEs, which are mainly non-linear ones. To be able to decide in such a case of the existence of solutions would increase immediately the scope of new technologies applicable to indus trial problems. It is this latter remark that led to the European NEST project with the same name. The GIFT project aims at making progresses in the investigation of field theories through the use of very

  4. Job Satisfaction: A Possible Integration of Two Theories

    Science.gov (United States)

    Hazer, John T.

    1976-01-01

    The author proposes an integration of Herzberg's two-factor theory of job satisfaction (job satisfaction/dissatisfaction as two separate, parallel continua) and traditional theory (job satisfaction/dissatisfaction sharing the same continuum) and a rationale for deciding which motivation methods to use for employees with differeing levels of…

  5. An integral equation arising in two group neutron transport theory

    International Nuclear Information System (INIS)

    Cassell, J S; Williams, M M R

    2003-01-01

    An integral equation describing the fuel distribution necessary to maintain a flat flux in a nuclear reactor in two group transport theory is reduced to the solution of a singular integral equation. The formalism developed enables the physical aspects of the problem to be better understood and its relationship with the corresponding diffusion theory model is highlighted. The integral equation is solved by reducing it to a non-singular Fredholm equation which is then evaluated numerically

  6. Integrability of orbifold ABJM theories

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Nan; Chen, Hui-Huang [Institute of High Energy Physics and Theoretical Physics Center for Science Facilities,Chinese Academy of Sciences,19B Yuquan Road, Beijing 100049 (China); Ding, Xiao-Chen [School of Mathematical Sciences, Capital Normal University,105 North Road of West 3rd Ring, Beijing 100048 (China); Li, De-Sheng [Institute of High Energy Physics and Theoretical Physics Center for Science Facilities,Chinese Academy of Sciences,19B Yuquan Road, Beijing 100049 (China); Wu, Jun-Bao [Institute of High Energy Physics and Theoretical Physics Center for Science Facilities,Chinese Academy of Sciences,19B Yuquan Road, Beijing 100049 (China); School of Physics, Beihang University,37 Xueyuan Road, Beijing 100191 (China); Center for High Energy Physics, Peking University,5 Yiheyuan Rd, Beijing 100871 (China); School of Physical Sciences, University of Chinese Academy of Sciences,19A Yuquan Road, Beijing 100049 (China)

    2016-11-18

    Integrable structure has played a very important role in the study of various non-perturbative aspects of planar Aharony-Bergman-Jafferis-Maldacena (ABJM) theories. In this paper, we showed that this remarkable structure survives after orbifold operation with discrete group Γintegrability in the scalar sector at the planar two-loop order and get the Bethe ansatz equations (BAEs). The eigenvalues of the anomalous dimension matrix are also obtained. For Γ

  7. Attachment Theory and Theory of Planned Behavior: An Integrative Model Predicting Underage Drinking

    Science.gov (United States)

    Lac, Andrew; Crano, William D.; Berger, Dale E.; Alvaro, Eusebio M.

    2013-01-01

    Research indicates that peer and maternal bonds play important but sometimes contrasting roles in the outcomes of children. Less is known about attachment bonds to these 2 reference groups in young adults. Using a sample of 351 participants (18 to 20 years of age), the research integrated two theoretical traditions: attachment theory and theory of…

  8. Integrable deformations of affine Toda theories and duality

    International Nuclear Information System (INIS)

    Fateev, V.A.

    1996-01-01

    We introduce and study five series of one-parameter families of two-dimensional integrable quantum field theories. These theories have a Lagrangian description in terms of the massive Thirring model coupled with non-simply laced affine Toda theories. Perturbative calculations, analysis of the factorized scattering theory and the Bethe ansatz technique are used to show that these field theories possess the dual representation available for the perturbative analysis in the strong coupling limit. The dual theory can be formulated as the non-linear sigma model with Witten's Euclidean black hole metric (complex sinh-Gordon theory) coupled with non-simply laced affine Toda theories. Lie algebras associated with these ''dual'' Toda theories belong to the dual series of affine algebras but have a smaller rank. The exact relation between coupling constants in the dual theories is conjectured. (orig.)

  9. The integrable structure of nonrational conformal field theory

    Energy Technology Data Exchange (ETDEWEB)

    Bytsko, A. [Steklov Mathematics Institute, St. Petersburg (Russian Federation); Teschner, J. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-02-15

    Using the example of Liouville theory, we show how the separation into left- and rightmoving degrees of freedom of a nonrational conformal field theory can be made explicit in terms of its integrable structure. The key observation is that there exist separate Baxter Q-operators for left- and right-moving degrees of freedom. Combining a study of the analytic properties of the Q-operators with Sklyanin's Separation of Variables Method leads to a complete characterization of the spectrum. Taking the continuum limit allows us in particular to rederive the Liouville reflection amplitude using only the integrable structure. (orig.)

  10. What propels sexual murderers: a proposed integrated theory of social learning and routine activities theories.

    Science.gov (United States)

    Chan, Heng Choon Oliver; Heide, Kathleen M; Beauregard, Eric

    2011-04-01

    Despite the great interest in the study of sexual homicide, little is known about the processes involved in an individual's becoming motivated to sexually kill, deciding to sexually kill, and acting on that desire, intention, and opportunity. To date, no comprehensive model of sexual murdering from the offending perspective has been proposed in the criminological literature. This article incorporates the works of Akers and Cohen and Felson regarding their social learning theory and routine activities theory, respectively, to construct an integrated conceptual offending framework in sexual homicide. This integrated model produces a stronger and more comprehensive explanation of sexual murder than any single theory currently available.

  11. Convex integration theory solutions to the h-principle in geometry and topology

    CERN Document Server

    Spring, David

    1998-01-01

    This book provides a comprehensive study of convex integration theory in immersion-theoretic topology. Convex integration theory, developed originally by M. Gromov, provides general topological methods for solving the h-principle for a wide variety of problems in differential geometry and topology, with applications also to PDE theory and to optimal control theory. Though topological in nature, the theory is based on a precise analytical approximation result for higher order derivatives of functions, proved by M. Gromov. This book is the first to present an exacting record and exposition of all of the basic concepts and technical results of convex integration theory in higher order jet spaces, including the theory of iterated convex hull extensions and the theory of relative h-principles. A second feature of the book is its detailed presentation of applications of the general theory to topics in symplectic topology, divergence free vector fields on 3-manifolds, isometric immersions, totally real embeddings, u...

  12. Abelian Chern-Simons theory and linking numbers via oscillatory integrals

    International Nuclear Information System (INIS)

    Albeverio, S.; Schaefer, J.

    1994-06-01

    We introduce a rigorous mathematical model of abelian Chern-Simons theory based on the theory of infinite dimensional oscillatory integrals developed by Albeverio and Hoeegh-Krohn. We construct a gauge-fixed Chern-Simons path integral as a Fresnel integral in a certain Hilbert space. Wilson loop variables are defined as Fresnel integrable functions and it is shown in this context that the expectation value of products of Wilson loops w.r.t. the Chern-Simons path integral is a topological invariant which can be computed in terms of pairwise linking numbers of the loops, as conjectured by Witten. We also propose a lattice Chern-Simons action which converges to the continuum limit. (orig.)

  13. Visual feature integration theory: past, present, and future.

    Science.gov (United States)

    Quinlan, Philip T

    2003-09-01

    Visual feature integration theory was one of the most influential theories of visual information processing in the last quarter of the 20th century. This article provides an exposition of the theory and a review of the associated data. In the past much emphasis has been placed on how the theory explains performance in various visual search tasks. The relevant literature is discussed and alternative accounts are described. Amendments to the theory are also set out. Many other issues concerning internal processes and representations implicated by the theory are reviewed. The article closes with a synopsis of what has been learned from consideration of the theory, and it is concluded that some of the issues may remain intractable unless appropriate neuroscientific investigations are carried out.

  14. Initial states in integrable quantum field theory quenches from an integral equation hierarchy

    Directory of Open Access Journals (Sweden)

    D.X. Horváth

    2016-01-01

    Full Text Available We consider the problem of determining the initial state of integrable quantum field theory quenches in terms of the post-quench eigenstates. The corresponding overlaps are a fundamental input to most exact methods to treat integrable quantum quenches. We construct and examine an infinite integral equation hierarchy based on the form factor bootstrap, proposed earlier as a set of conditions determining the overlaps. Using quenches of the mass and interaction in Sinh-Gordon theory as a concrete example, we present theoretical arguments that the state has the squeezed coherent form expected for integrable quenches, and supporting an Ansatz for the solution of the hierarchy. Moreover we also develop an iterative method to solve numerically the lowest equation of the hierarchy. The iterative solution along with extensive numerical checks performed using the next equation of the hierarchy provides a strong numerical evidence that the proposed Ansatz gives a very good approximation for the solution.

  15. Initial states in integrable quantum field theory quenches from an integral equation hierarchy

    Energy Technology Data Exchange (ETDEWEB)

    Horváth, D.X., E-mail: esoxluciuslinne@gmail.com [MTA-BME “Momentum” Statistical Field Theory Research Group, Budafoki út 8, 1111 Budapest (Hungary); Department of Theoretical Physics, Budapest University of Technology and Economics, Budafoki út 8, 1111 Budapest (Hungary); Sotiriadis, S., E-mail: sotiriad@sissa.it [SISSA and INFN, Via Bonomea 265, 34136 Trieste (Italy); Takács, G., E-mail: takacsg@eik.bme.hu [MTA-BME “Momentum” Statistical Field Theory Research Group, Budafoki út 8, 1111 Budapest (Hungary); Department of Theoretical Physics, Budapest University of Technology and Economics, Budafoki út 8, 1111 Budapest (Hungary)

    2016-01-15

    We consider the problem of determining the initial state of integrable quantum field theory quenches in terms of the post-quench eigenstates. The corresponding overlaps are a fundamental input to most exact methods to treat integrable quantum quenches. We construct and examine an infinite integral equation hierarchy based on the form factor bootstrap, proposed earlier as a set of conditions determining the overlaps. Using quenches of the mass and interaction in Sinh-Gordon theory as a concrete example, we present theoretical arguments that the state has the squeezed coherent form expected for integrable quenches, and supporting an Ansatz for the solution of the hierarchy. Moreover we also develop an iterative method to solve numerically the lowest equation of the hierarchy. The iterative solution along with extensive numerical checks performed using the next equation of the hierarchy provides a strong numerical evidence that the proposed Ansatz gives a very good approximation for the solution.

  16. On integrable c < 1 open-closed string theory

    International Nuclear Information System (INIS)

    Johnson, C.V.

    1994-01-01

    The integrable structure of open-closed string theories in the (p, q) conformal minimal model backgrounds is presented. The relation between the τ-function of the closed string theory and that of the open-closed string theory is uncovered. The resulting description of the open-closed string theory is shown to fit very naturally into the framework of the sl(q, C) KdV hierarchies. In particular, the twisted bosons which underlie and organise the structure of the closed string theory play a similar role here and may be employed to derive loop equations and correlation function recursion relations for the open-closed strings in a simple way. (orig.)

  17. Towards an Integral Critical Theory of the Present Age

    Directory of Open Access Journals (Sweden)

    Martin Beck Matuštík

    2007-12-01

    Full Text Available A new model of a critical theory that is integral is introduced. It adds a seventhstage to a six-stage model of critical theory. Building on the model’s predecessors, fromKant, Hegel, and Marx to Habermas and Wilber, this proposal is a three-pronged modelof material, socio-political, and spiritual critique of the present age. Each dimension isnon-reducible to the other. The current model echoes the attempts to bridge social andexistential perspectives by early Marcuse and Sartre, and the author’s prior work that didthis for Habermas and Kierkegaard. This model of an integral critical theory introduces aself-transformational axis, the integer or witness-self, complementing transversally thevertical stages and horizontal states of consciousness.

  18. Quality of Life Theory I. The IQOL Theory: An Integrative Theory of the Global Quality of Life Concept

    Directory of Open Access Journals (Sweden)

    Soren Ventegodt

    2003-01-01

    Full Text Available Quality of life (QOL means a good life and we believe that a good life is the same as living a life with a high quality. This paper presents the theoretical and philosophical framework of the Danish Quality of Life Survey, and of the SEQOL, QOL5, and QOL1 questionnaires.The notion of a good life can be observed from subjective to the objective, where this spectrum incorporates a number of existing quality of life theories. We call this spectrum the integrative quality-of-life (IQOL theory and discuss the following aspects in this paper: well being, satisfaction with life, happiness, meaning in life, the biological information system (�balance�, realizing life potential, fulfillment of needs, and objective factors.The philosophy of life outlined in this paper tries to measure the global quality of life with questions derived from the integrative theory of the quality of life. The IQOL theory is an overall theory or meta-theory encompassing eight more factual theories in a subjective-existential-objective spectrum. Other philosophies of life can stress other aspects of life, but by this notion of introducing such an existential depth into the health and social sciences, we believe to have taken a necessary step towards a new humility and respect for the richness and complexity of life.

  19. Locus of Control and Academic Achievement: Integrating Social Learning Theory and Expectancy-Value Theory

    Science.gov (United States)

    Youse, Keith Edward

    2012-01-01

    The current study examines predictors of math achievement and college graduation by integrating social learning theory and expectancy-value theory. Data came from a nationally-representative longitudinal database tracking 12,144 students over twelve years from 8th grade forward. Models for math achievement and college graduation were tested…

  20. The postmodern issues and the theory of integration

    OpenAIRE

    Aurelian Petrus Plopeanu

    2008-01-01

    European Union continues the integration process as a postmodernist structure. From an institutional optics, the European Union integration is balancing between federalism and intergovernmentalism in the debate sphere. The relation between EU accession and the effects towards economic growth, future integration issues, the federalism and the constitutionalism of the European Union, the neo-neofunctionalism and the liberal inter-governmentalism theories and the welfare of the European Union in...

  1. The background and theory of integrated risk management

    Science.gov (United States)

    Hunsucker, John L.

    1995-01-01

    While all good managers have always considered risk in their decision making, only recently have formal programs to do so been introduced. This report covers the logical structure behind the formulation of an integrated risk management plan (IRM). Included in the report are factors forcing the development of a formal plan to consider risk, the basic objective or purpose of an IRM, and desirable traits of such a plan. The report moves on to a discussion of background issues, seeks to formalize some definitions, and then discusses required information on threats. The report concludes with the steps for an IRM.

  2. From Foucault to Freire through Facebook: Toward an Integrated Theory of mHealth

    Science.gov (United States)

    Bull, Sheana; Ezeanochie, Nnamdi

    2016-01-01

    Objective: To document the integration of social science theory in literature on mHealth (mobile health) and consider opportunities for integration of classic theory, health communication theory, and social networking to generate a relevant theory for mHealth program design. Method: A secondary review of research syntheses and meta-analyses…

  3. Threat of the feminine identity: The emerging structure in exploring the process of women's empowerment for menopause management: A grounded theory study

    Directory of Open Access Journals (Sweden)

    Mansoureh Yazdkhasti

    2016-11-01

    Full Text Available Women empowerment in different spheres of life especially menopause is among the key elements of health promotion in all communities. However there is no realistic images of empowering women in menopausal symptoms management. The present survey aimed to explain the process of women's empowerment for menopausal symptoms management. This qualitative study is part of a larger project which was conducted using Grounded Theory between 2013 and 2015. The article's main focus was to explore the underlying conditions and factors affecting the process of women's empowerment. Using a purposive and theoretical sampling method, 25 participants were interviewed 28 times. Data was collected through some in-depth, semi-structural and open ended interviews with the participant and also memoing and field notes. The interviews were conducted in Neighborhoods House affiliated to Tehran municipality and two gynecological clinics affiliated to Tehran University of Medical Sciences. Data analysis was applied through Strauss and Corbin approach (2008 using MAXQDA10 software. Threat of the feminine identity has been noted as the women's most common concern to being empowered in menopause management. The key theme emerged in the present study (threat of the feminine identity included four main categories (consciousness about the likelihood of femininity decline, negative attitude towards herself, inadequate supportive context, latent opportunity, two subcategories and 109 first-level codes. There is a logical, coherent and integrated relationship between all these concepts and the theme of feminine identity threat. This theme is considered as an underlying social problem and a major concern for postmenopausal women in the context of this group of women's empowerment. The factors (barriers and facilitators affecting women's empowerment in menopause management are associated with social context, intensity and origin of each society. Evaluation of Iranian women

  4. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    Science.gov (United States)

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  5. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  6. An Integrative Theory of Numerical Development

    Science.gov (United States)

    Siegler, Robert; Lortie-Forgues, Hugues

    2014-01-01

    Understanding of numerical development is growing rapidly, but the volume and diversity of findings can make it difficult to perceive any coherence in the process. The integrative theory of numerical development posits that a coherent theme is present, however--progressive broadening of the set of numbers whose magnitudes can be accurately…

  7. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  8. Multiscale N=2 SUSY field theories, integrable systems and their stringy/brane origin

    International Nuclear Information System (INIS)

    Gorsky, A.; Gukov, S.; Mironov, A.

    1998-01-01

    We discuss supersymmetric Yang-Mills theories with multiple scales in the brane language. The issue concerns N=2 SUSY gauge theories with massive fundamental matter including the UV finite case of n f =2n c , theories involving products of SU(n) gauge groups with bifundamental matter, and systems with several parameters similar to Λ QCD . We argue that the proper integrable systems are, accordingly, twisted XXX SL(2) spin chain, SL(p) magnets and degenerations of the spin Calogero system. The issue of symmetries underlying integrable systems is addressed. Relations with the monopole systems are specially discussed. Brane pictures behind all these integrable structures in the IIB and M-theory are suggested. We argue that degrees of freedom in integrable systems are related to KK excitations in M-theory or D-particles in the IIA string theory, which substitute the infinite number of instantons in the field theory. This implies the presence of more BPS states in the low-energy sector. (orig.)

  9. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  10. The network perspective: an integration of attachment and family systems theories.

    Science.gov (United States)

    Kozlowska, Kasia; Hanney, Lesley

    2002-01-01

    In this article we discuss the network paradigm as a useful base from which to integrate attachment and family systems theories. The network perspective refers to the application of general systems theory to living systems, and provides a framework that conceptualizes the dyadic and family systems as simultaneously distinct and interconnected. Network thinking requires that the clinician holds multiple perspectives in mind, considers each system level as both a part and a whole, and shifts the focus of attention between levels as required. Key epistemological issues that have hindered the integration of the theories are discussed. These include inconsistencies within attachment theory itself and confusion surrounding the theoretical conceptualizations of the relationship between attachment and family systems theories. Detailed information about attachment categories is provided using the Dynamic Maturational model. Case vignettes illustrating work with young children and their families explore the clinical implications of integrating attachment data into family therapy practice.

  11. From Foucault to Freire Through Facebook: Toward an Integrated Theory of mHealth.

    Science.gov (United States)

    Bull, Sheana; Ezeanochie, Nnamdi

    2016-08-01

    To document the integration of social science theory in literature on mHealth (mobile health) and consider opportunities for integration of classic theory, health communication theory, and social networking to generate a relevant theory for mHealth program design. A secondary review of research syntheses and meta-analyses published between 2005 and 2014 related to mHealth, using the AMSTAR (A Measurement Tool to Assess Systematic Reviews) methodology for assessment of the quality of each review. High-quality articles from those reviews using a randomized controlled design and integrating social science theory in program design, implementation, or evaluation were reviewed. Results There were 1,749 articles among the 170 reviews with a high AMSTAR score (≥30). Only 13 were published from 2005 to 2014, used a randomized controlled design and made explicit mention of theory in any aspect of their mHealth program. All 13 included theoretical perspectives focused on psychological and/or psychosocial theories and constructs. Conclusions There is a very limited use of social science theory in mHealth despite demonstrated benefits in doing so. We propose an integrated theory of mHealth that incorporates classic theory, health communication theory, and social networking to guide development and evaluation of mHealth programs. © 2015 Society for Public Health Education.

  12. Integrability in heavy quark effective theory

    Science.gov (United States)

    Braun, Vladimir M.; Ji, Yao; Manashov, Alexander N.

    2018-06-01

    It was found that renormalization group equations in the heavy-quark effective theory (HQET) for the operators involving one effective heavy quark and light degrees of freedom are completely integrable in some cases and are related to spin chain models with the Hamiltonian commuting with the nondiagonal entry C( u) of the monodromy matrix. In this work we provide a more complete mathematical treatment of such spin chains in the QISM framework. We also discuss the relation of integrable models that appear in the HQET context with the large-spin limit of integrable models in QCD with light quarks. We find that the conserved charges and the "ground state" wave functions in HQET models can be obtained from the light-quark counterparts in a certain scaling limit.

  13. Towards an Integral Critical Theory of the Present Age

    Directory of Open Access Journals (Sweden)

    Martin Beck Matuštík

    2007-12-01

    Full Text Available A new model of a critical theory that is integral is introduced. It adds a seventh stage to a six-stage model of critical theory. Building on the model’s predecessors, from Kant, Hegel, and Marx to Habermas and Wilber, this proposal is a three-pronged model of material, socio-political, and spiritual critique of the present age. Each dimension is non-reducible to the other. The current model echoes the attempts to bridge social and existential perspectives by early Marcuse and Sartre, and the author’s prior work that did this for Habermas and Kierkegaard. This model of an integral critical theory introduces a self-transformational axis, the integer or witness-self, complementing transversally the vertical stages and horizontal states of consciousness.

  14. From integrability to conformal symmetry: Bosonic superconformal Toda theories

    International Nuclear Information System (INIS)

    Bo-Yu Hou; Liu Chao

    1993-01-01

    In this paper the authors study the conformal integrable models obtained from conformal reductions of WZNW theory associated with second order constraints. These models are called bosonic superconformal Toda models due to their conformal spectra and their resemblance to the usual Toda theories. From the reduction procedure they get the equations of motion and the linearized Lax equations in a generic Z gradation of the underlying Lie algebra. Then, in the special case of principal gradation, they derive the classical r matrix, fundamental Poisson relation, exchange algebra of chiral operators and find out the classical vertex operators. The result shows that their model is very similar to the ordinary Toda theories in that one can obtain various conformal properties of the model from its integrability

  15. An integrated theory of causal scenarios and evidential arguments

    NARCIS (Netherlands)

    Bex, F.J.

    2015-01-01

    In the process of proof alternative stories that explain 'what happened' in a case are tested using arguments based on evidence. Building on the author's earlier hybrid theory, this paper presents a formal theory that combines causal stories and evidential arguments, further integrating the

  16. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  17. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  18. Prefrontal control of attention to threat

    Directory of Open Access Journals (Sweden)

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  19. Submitting to defeat: social anxiety, dominance threat, and decrements in testosterone.

    Science.gov (United States)

    Maner, Jon K; Miller, Saul L; Schmidt, Norman B; Eckel, Lisa A

    2008-08-01

    Although theory suggests a link between social anxiety and social dominance, direct empirical evidence for this link is limited. The present experiment tested the hypothesis that socially anxious individuals, particularly men, would respond to a social-dominance threat by exhibiting decrements in their testosterone levels, an endocrinological change that typically reflects pronounced social submission in humans and other animals. Participants were randomly assigned to either win or lose a rigged face-to-face competition with a confederate. Although no zero-order relationship between social anxiety and level of testosterone was observed, testosterone levels showed a pronounced drop among socially anxious men who lost the competition. No significant changes were observed in nonanxious men or in women. This research provides novel insight into the nature and consequences of social anxiety, and also illustrates the utility of integrating social psychological theory with endocrinological approaches to psychological science.

  20. Automated computation of one-loop integrals in massless theories

    International Nuclear Information System (INIS)

    Hameren, A. van; Vollinga, J.; Weinzierl, S.

    2005-01-01

    We consider one-loop tensor and scalar integrals, which occur in a massless quantum field theory, and we report on the implementation into a numerical program of an algorithm for the automated computation of these one-loop integrals. The number of external legs of the loop integrals is not restricted. All calculations are done within dimensional regularization. (orig.)

  1. An integrative approach to threat assessment and management: security and mental health response to a threatening client.

    Science.gov (United States)

    Farkas, Gary M; Tsukayama, John K

    2012-01-01

    Workplace violence threat assessment and management practices represent an interdisciplinary approach to the diversion of potentially dangerous employees and clients. This case study illustrates such an intervention in a complex situation involving a social service agency and its client. Following a curtailment of services and an arrest, the client developed an escalating homicidal anger toward the agency administrator. Once a Tarasoff warning was received, the agency contacted a security company who organized a threat assessment and management plan involving interdisciplinary collaboration. Information developed in the course of the assessment was presented to prosecutors, who facilitated the client's arrest and involuntary psychiatric commitment until he was judged to be no longer dangerous. This case ultimately involved an integration of the services of security, law enforcement, mental health professionals, prosecutors, the courts and the state mental health system in leading to a successful diversion of the client from a path of intended violence.

  2. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  3. Integrable systems and quantum field theory. Works in progress Nr 75

    International Nuclear Information System (INIS)

    Baird, Paul; Helein, Frederic; Kouneiher, Joseph; Roubtsov, Volodya; Antunes, Paulo; Banos, Bertrand; Barbachoux, Cecile; Desideri, Laura; Kahouadji, Nabil; Gerding, Aaron; Heller, Sebastian; Schmitt, Nicholas; Harrivel, Dikanaina; Hoevenaars, Luuk K.; Iftime, Mihaela; Levy, Thierry; Lisovyy, Oleg; Masson, Thierry; Skrypnyk, Taras; Pedit, Franz; Egeileh, Michel

    2009-01-01

    The contributions of this collective book address the quantum field theory (integrable systems and quantum field theory, introduction to supermanifolds and supersymmetry, beyond geometric quantification, Gaussian measurements and Fock spaces), differential geometry and physics (gravitation and geometry, physical events and the superspace about the hole argument, the Cartan-Kaehler theory and applications to local isometric and conformal embedding, calibrations, Cabal-Yau structures and Monge-Ampere structures, Hamiltonian multi-symplectic formalism and Monge-Ampere equations, big bracket, derivations and derivative multi-brackets), integrable system, geometry and physics (finite-volume correlation functions of monodromy fields on the lattice with the Toeplitz representation, Frobenius manifolds and algebraic integrability, an introduction to twistors, Hamiltonian systems on the 'coupled' curves, Nambu-Poisson mechanics and Fairlie-type integrable systems, minimal surfaces with polygonal boundary and Fuchsian equations, global aspects of integrable surface geometry), and non commutative geometry (an informal introduction to the ideas and concepts of non commutative geometry)

  4. The foundational origin of integrability in quantum field theory

    International Nuclear Information System (INIS)

    Schroer, Bert; FU-Berlin

    2012-02-01

    There are two foundational model-independent concepts of integrability in QFT. One is 'dynamical' and generalizes the solvability in closed analytic form of the dynamical aspects as known from the Kepler two-body problem and its quantum mechanical counterpart. The other, referred to as 'kinematical' integrability, has no classical nor even quantum mechanical counterpart; it describes the relation between so called eld algebra and its local observable subalgebras and their discrete inequivalent representation classes (the DHR theory of superselection sectors). In the standard case of QFTs with mass gaps it contains the information about the representation of the (necessary compact) internal symmetry group and statistics in form of a tracial state on a 'dual group'. In Lagrangian or functional quantization one deals with the eld algebra and the division into observable /eld algebras does presently not play a role in constructive approaches to QFT. 'Kinematical' integrability is however of particular interest in conformal theories where the observable algebra fulfils the Huygens principle (light like propagation) and lives on the compactified Minkowski spacetime whereas the eld algebra, whose spacetime symmetry group is the universal covering of the conformal group lives on the universal covering of the compactified Minkowski spacetime. Since the (anomalous) dimensions of fields show up in the spectrum of the unitary representative of the center of this group , the kinematical structure contained in the relation fields/Huygens observables valuable information which in the usual terminology would be called 'dynamical'. The dynamical integrability is defined in terms of properties of 'wedge localization' and uses the fact that modular localization theory allows to 'emulate' interaction-free wedge-localized operators in a objective manner with the wedge localized interacting algebra. Emulation can be viewed as a generalization of the functorial relation between localized

  5. A network analysis of leadership theory : the infancy of integration.

    OpenAIRE

    Meuser, J. D.; Gardner, W. L.; Dinh, J. E.; Hu, J.; Liden, R. C.; Lord, R. G.

    2016-01-01

    We investigated the status of leadership theory integration by reviewing 14 years of published research (2000 through 2013) in 10 top journals (864 articles). The authors of these articles examined 49 leadership approaches/theories, and in 293 articles, 3 or more of these leadership approaches were included in their investigations. Focusing on these articles that reflected relatively extensive integration, we applied an inductive approach and used graphic network analysis as a guide for drawi...

  6. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  7. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  8. THREATS AND BENEFITS OF EXCHANGE RATE REGIMES FOR UKRAINE IN TERMS OF EUROPEAN INTEGRATION

    Directory of Open Access Journals (Sweden)

    Svitlana Glushchenko

    2016-11-01

    Full Text Available The purpose of the paper is to determine threats and benefits of exchange rate regimes in terms of the integration of Ukraine into the European community. Emphasizing features of the manifestation of currency exchange rate in Ukrainian practice is a precondition for choosing the optimal exchange rate regime for Ukraine, which, in its turn, will provide an opportunity to reduce inflation and implement effective tools of monetary and fiscal policies to promote further economic growth and competitiveness of the country. The uses of free-floating exchange rate and «currency board» regimes have either positive effects for Ukraine or certain threats. Methodology. This research is based on a synthesis of data on the uses of exchange rate regimes in Ukraine as an independent. It is considered angular regimes, which are by far the most suitable for Ukraine in terms of the European vector of its development. Peculiarities of using these regimes are revealed and their major threats to the domestic economy are pointed out. This article analyzes the dynamics of the trade balance of payments of Ukraine, the dynamics of the commodity structure of Ukraine`s exports and imports and the external debt of Ukraine. Results. Taking into account the experience of countries, which were in crisis situations, they show the necessity of the uses of freefloating exchange rate regime and possibilities of «currency board» regime, despite threats that they may have. World experience testifies the implementation of structural reforms, effective monetary policy, fiscal policy and discipline of the government. Thorough preparation of Ukraine’s transition to the «currency board» regime can justify itself in conditions of crisis and provide impetus to Ukrainian economy benefits. The paper defines conditions under which the success of a new model of exchange rate policy will be achieved. Practical implications. The study accents attention on the specifics of the uses of the

  9. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  10. Towards an integrated theory of value, capital and money

    OpenAIRE

    Cavalieri, Duccio

    2014-01-01

    This is an analysis of the present state of the theory of capital. The paper contains a proposal to reformulate this theory in an ‘late-Marxian’ up-to-dated perspective. The central problem discussed is the integration of the theories of value and capital with those of money and finance. An augmented cost-of-production theory of value is advocated. Special attention is focused on the role of Marx’s ‘monetary expression of labour value’ (MEV), rediscovered and unduly modified by neo-Marxist...

  11. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  12. The Effects of Integrating Laboratory Work with Theory on Academic ...

    African Journals Online (AJOL)

    The Effects of Integrating Laboratory Work with Theory on Academic Achievement in Secondary School Physics. ... Journal Home > Vol 4, No 4 (2010) > ... better than those taught by treating practical work after and separate from theory.

  13. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  14. A Study on OS Selection Using ANP Based Choquet Integral in Terms of Cyber Threats

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    Critical systems are today exposed to new kinds of security threats. Cyber security is determine with cyberspace safe from threats, it is called cyber-threats. Cyber-threats is applied the malicious use of information and communication technologies or the behaviour of attackers. Because of the importance of cyber threats, operating system (OS) selection is a critical decision that can significantly affect future competitiveness and performance of an organization. It is increasingly valuable i...

  15. PERSONALITY THEORY IN INTEGRATIVE PERSONALITY-ORIENTED RECONSTRUCTIVE PSYCHOTHERAPY

    Directory of Open Access Journals (Sweden)

    V I Kurpatov

    2010-01-01

    approaches. V.N. Myasishchev's theory of personality relations in association with its universality, as well as pathogenetic psychotherapy may be the basis for the integration of other methods of psychotherapy

  16. Contribution to the study of conformal theories and integrable models

    International Nuclear Information System (INIS)

    Sochen, N.

    1992-05-01

    The purpose of this thesis is the 2-D physics study. The main tool is the conformal field theory with Kac-Moody and W algebra. This theory describes the 2-D models that have translation, rotation and dilatation symmetries, at their critical point. The expanded conformal theories describe models that have a larger symmetry than conformal symmetry. After a review of conformal theory methods, the author effects a detailed study of singular vector form in sl(2) affine algebra. With this important form, correlation functions can be calculated. The classical W algebra is studied and the relations between classical W algebra and quantum W algebra are specified. Bosonization method is presented and sl(2)/sl(2) topological model, studied. Partition function bosonization of different models is described. A program of rational theory classification is described linking rational conformal theories and spin integrable models, and interesting relations between Boltzmann weights of different models have been found. With these relations, the integrability of models by a direct calculation of their Boltzmann weights is proved

  17. FOUNDER’S SYNDROME AT THE BACKSTAGE OF AGENCY THEORY: A THREAT TO CORPORATE GOVERNANCE AND CORPORATE SOCIAL RESPONSIBILITY

    Directory of Open Access Journals (Sweden)

    Şafak GÜNDÜZ

    2018-04-01

    Full Text Available Agency theory studies have had almost no attention to antecedents of the causes leading agent-principal problem. As there is yet no consensus over what constitutes a perfectly working corporate governance mechanism, this discursive analysis tries to draw attention to the hidden reason of agent-principal problem in order to help the constitution of healthy corporate governance with corporate social responsibility. The purpose is to put forward that Founder’s Syndrome could be one of the reasons behind agency problem and a threat to corporate governance and corporate social responsibility. This paper is the first to extend Agency Theory by associating it with a syndrome analysing the psychological and behavioural instigations of it, which fills the void in literature. A theoretical lens to enhance organizations’ ability to be the corporate social responsibility-focused by overcoming Founder’s Syndrome is provided bearing implications especially for organisational behaviour researchers.

  18. Stereotypes and the Achievement Gap: Stereotype Threat Prior to Test Taking

    Science.gov (United States)

    Appel, Markus; Kronberger, Nicole

    2012-01-01

    Stereotype threat is known as a situational predicament that prevents members of negatively stereotyped groups to perform up to their full ability. This review shows that the detrimental influence of stereotype threat goes beyond test taking: It impairs stereotyped students to build abilities in the first place. Guided by current theory on…

  19. Loneliness, social integration and consumption of sugar-containing beverages: testing the social baseline theory.

    Science.gov (United States)

    Henriksen, Roger Ekeberg; Torsheim, Torbjørn; Thuen, Frode

    2014-01-01

    Social Baseline Theory (SBT) proposes that close relationships aid in metabolic resource management and that individuals without significant relationships may experience more demands on their own neural metabolic resources on a daily basis when solving problems, remaining vigilant against potential threats and regulating emotional responses. This study tests a hypothesised consequence derived from SBT: relative social isolation leads to increased levels of sugar intake. Based on cross-sectional, self-reported data from the Norwegian Mother and Child Cohort Study (N = 90 084), information on social integration and the consumption of both sugar-sweetened and artificially sweetened sodas and juices was obtained from a large number of women in early pregnancy. Multiple regression analyses were conducted to assess whether loneliness, marital status, relationship satisfaction, advice from others than partner, and cohesion at work is associated with consumption of sodas and juices. Perceived loneliness was associated with elevated intake of all sugary beverages, while relationship satisfaction was negatively associated with all sugary beverages. Being married or cohabitating, having supportive friends, and having a sense of togetherness at work were associated with lower intake of two out of three sugar-containing beverages. These associations were significant, even after controlling for factors such as body mass index, weight related self-image, depression, physical activity, educational level, age and income. In comparison, a statistically significant relationship emerged between relationship satisfaction and artificially sweetened cola. No other predictor variables were significantly associated with any type of artificially sweetened beverage. This study indicates that loneliness and social integration influence the level of consumption of sugary beverages. The results support the hypothesis derived from the Social Baseline Theory that relative social isolation leads

  20. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  1. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  2. Science priorities for reducing the threat of invasive species

    Science.gov (United States)

    E. A. Chornesky; A. M. Bartuska; G. H. Aplet; J. Cummings-Carlson; F. W. Davis; J. Eskow; D. R. Gordon; K. W. Gottschalk; R. A. Haack; A. J. Hansen; R. N. Mack; F. J. Rahel; M. A. Shannon; L. A. Wainger; T. B. Wigley

    2005-01-01

    Invasive species pose a major, yet poorly addressed, threat to sustainable forestry. Here we set forth an interdisciplinary science strategy of research, development, and applications to reduce this threat. To spur action by public and private entities that too often are slow, reluctant, or unable to act, we recommend (a) better integrating invasive species into...

  3. Abelian Chern endash Simons theory. II. A functional integral approach

    International Nuclear Information System (INIS)

    Manoliu, M.

    1998-01-01

    Following Witten, [Commun. Math. Phys. 21, 351 endash 399 (1989)] we approach the Abelian quantum Chern endash Simons (CS) gauge theory from a Feynman functional integral point of view. We show that for 3-manifolds with and without a boundary the formal functional integral definitions lead to mathematically proper expressions that agree with the results from the rigorous construction [J. Math. Phys. 39, 170 endash 206 (1998)] of the Abelian CS topological quantum field theory via geometric quantization. copyright 1998 American Institute of Physics

  4. Teaching Civic Journalism: Integrating Theory and Practice.

    Science.gov (United States)

    McDevitt, Michael

    2000-01-01

    Describes a journalism course that used an integrative approach to teaching about the principles, practice, and effects of civic journalism, combining theory, news writing, and evaluation. Describes the class project on the controversial issue of panhandling. Discusses goals of civic journalism and of the project, journalistic methods used,…

  5. Analyzing Cyber-Physical Threats on Robotic Platforms †

    Science.gov (United States)

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  6. Path integral for gauge theories with fermions

    International Nuclear Information System (INIS)

    Fujikawa, K.

    1980-01-01

    The Atiyah-Singer index theorem indicates that a naive unitary transformation of basis vectors for fermions interacting with gauge fields is not allowed in general. On the basis of this observation, it was previously shown that the path-integral measure of a gauge-invariant fermion theory is transformed nontrivially under the chiral transformation, and thus leads to a simple derivation of ''anomalous'' chiral Ward-Takahashi identities. We here clarify some of the technical aspects associated with the discussion. It is shown that the Jacobian factor in the path-integral measure, which corresponds to the Adler-Bell-Jackiw anomaly, is independent of any smooth regularization procedure of large eigenvalues of D in Euclidean theory; this property holds in any even-dimensional space-time and also for the gravitational anomaly. The appearance of the anomaly and its connection with the index theorem are thus related to the fact that the primary importance is attached to the Lorentz-covariant ''energy'' operator D and that D and γ 5 do not commute. The abnormal behavior of the path-integral measure at the zero-frequency sector in the presence of instantons and its connection with spontaneous symmetry breaking is also clarified. We comment on several other problems associated with the anomaly and on the Pauli-Villars regularization method

  7. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    Science.gov (United States)

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  8. Integrable spin chain in superconformal Chern-Simons theory

    International Nuclear Information System (INIS)

    Bak, Dongsu; Rey, Soo-Jong

    2008-01-01

    N = 6 superconformal Chern-Simons theory was proposed as gauge theory dual to Type IIA string theory on AdS 4 x CP 3 . We study integrability of the theory from conformal dimension spectrum of single trace operators at planar limit. At strong 't Hooft coupling, the spectrum is obtained from excitation energy of free superstring on OSp(6|4; R)/SO(3, 1) x SU(3) x U(1) supercoset. We recall that the worldsheet theory is integrable classically by utilizing well-known results concerning sigma model on symmetric space. With R-symmetry group SU(4), we also solve relevant Yang-Baxter equation for a spin chain system associated with the single trace operators. From the solution, we construct alternating spin chain Hamiltonian involving three-site interactions between 4 and 4-bar . At weak 't Hooft coupling, we study gauge theory perturbatively, and calculate action of dilatation operator to single trace operators up to two loops. To ensure consistency, we computed all relevant Feynman diagrams contributing to the dilatation opeator. We find that resulting spin chain Hamiltonian matches with the Hamiltonian derived from Yang-Baxter equation. We further study new issues arising from the shortest gauge invariant operators TrY I Y † J = (15, 1). We observe that 'wrapping interactions' are present, compute the true spectrum and find that the spectrum agrees with prediction from supersymmetry. We also find that scaling dimension computed naively from alternating spin chain Hamiltonian coincides with the true spectrum. We solve Bethe ansatz equations for small number of excitations, and find indications of correlation between excitations of 4's and 4-bar 's and of nonexistence of mesonic (44-bar ) bound-state.

  9. Discrete nodal integral transport-theory method for multidimensional reactor physics and shielding calculations

    International Nuclear Information System (INIS)

    Lawrence, R.D.; Dorning, J.J.

    1980-01-01

    A coarse-mesh discrete nodal integral transport theory method has been developed for the efficient numerical solution of multidimensional transport problems of interest in reactor physics and shielding applications. The method, which is the discrete transport theory analogue and logical extension of the nodal Green's function method previously developed for multidimensional neutron diffusion problems, utilizes the same transverse integration procedure to reduce the multidimensional equations to coupled one-dimensional equations. This is followed by the conversion of the differential equations to local, one-dimensional, in-node integral equations by integrating back along neutron flight paths. One-dimensional and two-dimensional transport theory test problems have been systematically studied to verify the superior computational efficiency of the new method

  10. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  11. Conspiracy theories as quasi-religious mentality: an integrated account from cognitive science, social representations theory, and frame theory.

    Science.gov (United States)

    Franks, Bradley; Bangerter, Adrian; Bauer, Martin W

    2013-01-01

    Conspiracy theories (CTs) can take many forms and vary widely in popularity, the intensity with which they are believed and their effects on individual and collective behavior. An integrated account of CTs thus needs to explain how they come to appeal to potential believers, how they spread from one person to the next via communication, and how they motivate collective action. We summarize these aspects under the labels of stick, spread, and action. We propose the quasi-religious hypothesis for CTs: drawing on cognitive science of religion, social representations theory, and frame theory. We use cognitive science of religion to describe the main features of the content of CTs that explain how they come to stick: CTs are quasi-religious representations in that their contents, forms and functions parallel those found in beliefs of institutionalized religions. However, CTs are quasi-religious in that CTs and the communities that support them, lack many of the institutional features of organized religions. We use social representations theory to explain how CTs spread as devices for making sense of sudden events that threaten existing worldviews. CTs allow laypersons to interpret such events by relating them to common sense, thereby defusing some of the anxiety that those events generate. We use frame theory to explain how some, but not all CTs mobilize collective counter-conspiratorial action by identifying a target and by proposing credible and concrete rationales for action. We specify our integrated account in 13 propositions.

  12. Extension of Applicability of integral neutron transport theory in reactor cell and core investigation

    International Nuclear Information System (INIS)

    Pop-Jordanov, J.; Bosevski, T.; Kocic, A.; Altiparmakov, D.

    1980-01-01

    A Space-Point Energy-Group integral transport theory method (SPEG) is developed and applied to the local and global calculations of the Yugoslav RA reactor. Compared to other integral transport theory methods, the SPEG distinguishes by (1) the arbitrary order of the polynomial, (2) the effective determination of integral parameters through point flux values, (3) the use of neutron balance condition. as a posterior measure of the accuracy of the calculation and (4) the elimination of the subdivisions- into zones, in realistic cases. In addition, different direct (collision probability) and indirect (Monte Carlo) approaches to integral transport theory have been investigated and Some effective acceleration procedures introduced. The study was performed on three test problems in plane and cylindrical geometry, as well as on the nine-region cell of the RA reactor. In particular, the limitations of the integral transport theory including its non-applicability to optically large material regions and to global reactor calculations were examined. The proposed strictly multipoint approach, avoiding the subdivision into zones and groups, seems to provide a good starting point to overcome these limitations of the integral transport theory. (author)

  13. Visual-vestibular cue integration for heading perception: applications of optimal cue integration theory.

    Science.gov (United States)

    Fetsch, Christopher R; Deangelis, Gregory C; Angelaki, Dora E

    2010-05-01

    The perception of self-motion is crucial for navigation, spatial orientation and motor control. In particular, estimation of one's direction of translation, or heading, relies heavily on multisensory integration in most natural situations. Visual and nonvisual (e.g., vestibular) information can be used to judge heading, but each modality alone is often insufficient for accurate performance. It is not surprising, then, that visual and vestibular signals converge frequently in the nervous system, and that these signals interact in powerful ways at the level of behavior and perception. Early behavioral studies of visual-vestibular interactions consisted mainly of descriptive accounts of perceptual illusions and qualitative estimation tasks, often with conflicting results. In contrast, cue integration research in other modalities has benefited from the application of rigorous psychophysical techniques, guided by normative models that rest on the foundation of ideal-observer analysis and Bayesian decision theory. Here we review recent experiments that have attempted to harness these so-called optimal cue integration models for the study of self-motion perception. Some of these studies used nonhuman primate subjects, enabling direct comparisons between behavioral performance and simultaneously recorded neuronal activity. The results indicate that humans and monkeys can integrate visual and vestibular heading cues in a manner consistent with optimal integration theory, and that single neurons in the dorsal medial superior temporal area show striking correlates of the behavioral effects. This line of research and other applications of normative cue combination models should continue to shed light on mechanisms of self-motion perception and the neuronal basis of multisensory integration.

  14. Real analysis measure theory, integration, and Hilbert spaces

    CERN Document Server

    Stein, Elias M

    2005-01-01

    Real Analysis is the third volume in the Princeton Lectures in Analysis, a series of four textbooks that aim to present, in an integrated manner, the core areas of analysis. Here the focus is on the development of measure and integration theory, differentiation and integration, Hilbert spaces, and Hausdorff measure and fractals. This book reflects the objective of the series as a whole: to make plain the organic unity that exists between the various parts of the subject, and to illustrate the wide applicability of ideas of analysis to other fields of mathematics and science. After

  15. INTEGRATIVE APPROACH ON FRAMING THEORY FROM ITS MULTIPARADIGMATIC CONDITION

    Directory of Open Access Journals (Sweden)

    Juan Antonio Marín Albaladejo

    2014-06-01

    Full Text Available Framing theory has reached an increasing role in media communication research, including common principles between different research perspectives. Besides the multiple ways of understanding the concept of frame, a controversy about the types of frames exists. Despite considerable integrating research efforts (D’Angelo, 2002; De Vreese, 2005; Entman, 1993, 2004; López-Rabadán, 2010; Matthes, 2012; Reese, 2007; Scheufele, 1999, scholars have not reached yet full conceptual and methodological convergence, so that definitions, theoretical models, frames measuring mode, types of frames, processes or effects differ in each study (Scheufele, 1999. This article provides an updated review of the different paradigms that define research efforts on this theory, and mentions the advantages to invest in an integrative model or paradigmatic synthesis for future studies. Through a comprehensive review of the published literature, we propose two objectives. On the one hand, to provide a taxonomy of the types of frame to clarify differences detected among studies labeled under this theory. It also seeks to justify the need to consider Framing theory as a multiparadigmatic research program (D'Angelo, 2002 that could include all perspectives established so far.

  16. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  17. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    Science.gov (United States)

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  18. Model to Counter the Threats in the Data Transmission System PLC-based Technology with the Use of Petri Nets

    Directory of Open Access Journals (Sweden)

    A. A. Balaev

    2010-06-01

    Full Text Available In the article the most important aspects of information security technology Power Line Communica tions, namely the provision of conditions accessibility and integrity, are considered. It is shown that these aspects of the PLC-Technology has some internal “potential” counter, at least, such a widespread threat to both natural disturbances and/or artificial origin. The possibility of such an implementation using the simplified mathematical model of the PLC-based technologies of the theory of Petri nets is presented.

  19. Introduction to functional and path integral methods in quantum field theory

    International Nuclear Information System (INIS)

    Strathdee, J.

    1991-11-01

    The following aspects concerning the use of functional and path integral methods in quantum field theory are discussed: generating functionals and the effective action, perturbation series, Yang-Mills theory and BRST symmetry. 10 refs, 3 figs

  20. Integrated Theory of Health Behavior Change: background and intervention development.

    Science.gov (United States)

    Ryan, Polly

    2009-01-01

    An essential characteristic of advanced practice nurses is the use of theory in practice. Clinical nurse specialists apply theory in providing or directing patient care, in their work as consultants to staff nurses, and as leaders influencing and facilitating system change. Knowledge of technology and pharmacology has far outpaced knowledge of how to facilitate health behavior change, and new theories are needed to better understand how practitioners can facilitate health behavior change. In this article, the Integrated Theory of Health Behavior Change is described, and an example of its use as foundation to intervention development is presented. The Integrated Theory of Health Behavior Change suggests that health behavior change can be enhanced by fostering knowledge and beliefs, increasing self-regulation skills and abilities, and enhancing social facilitation. Engagement in self-management behaviors is seen as the proximal outcome influencing the long-term distal outcome of improved health status. Person-centered interventions are directed to increasing knowledge and beliefs, self-regulation skills and abilities, and social facilitation. Using a theoretical framework improves clinical nurse specialist practice by focusing assessments, directing the use of best-practice interventions, and improving patient outcomes. Using theory fosters improved communication with other disciplines and enhances the management of complex clinical conditions by providing holistic, comprehensive care.

  1. Conformal field theories, Coulomb gas picture and integrable models

    International Nuclear Information System (INIS)

    Zuber, J.B.

    1988-01-01

    The aim of the study is to present the links between some results of conformal field theory, the conventional Coulomb gas picture in statistical mechanics and the approach of integrable models. It is shown that families of conformal theories, related by the coset construction to the SU(2) Kac-Moody algebra, may be regarded as obtained from some free field, and modified by the coupling of its winding numbers to floating charges. This representation reflects the procedure of restriction of the corresponding integrable lattice models. The work may be generalized to models based on the coset construction with higher rank algebras. The corresponding integrable models are identified. In the conformal field description, generalized parafermions appear, and are coupled to free fields living on a higher-dimensional torus. The analysis is not as exhaustive as in the SU(2) case: all the various restrictions have not been identified, nor the modular invariants completely classified

  2. Classical and Quantum Nonlinear Integrable Systems: Theory and Application

    International Nuclear Information System (INIS)

    Brzezinski, Tomasz

    2003-01-01

    This is a very interesting collection of introductory and review articles on the theory and applications of classical and quantum integrable systems. The book reviews several integrable systems such as the KdV equation, vertex models, RSOS and IRF models, spin chains, integrable differential equations, discrete systems, Ising, Potts and other lattice models and reaction--diffusion processes, as well as outlining major methods of solving integrable systems. These include Lax pairs, Baecklund and Miura transformations, the inverse scattering method, various types of the Bethe Ansatz, Painleve methods, the dbar method and fusion methods to mention just a few. The book is divided into two parts, each containing five chapters. The first part is devoted to classical integrable systems and introduces the subject through the KdV equation, and then proceeds through Painleve analysis, discrete systems and two-dimensional integrable partial differential equations, to culminate in the review of solvable lattice models in statistical physics, solved through the coordinate and algebraic Bethe Ansatz methods. The second part deals with quantum integrable systems, and begins with an outline of unifying approaches to quantum, statistical, ultralocal and non-ultralocal systems. The theory and methods of solving quantum integrable spin chains are then described. Recent developments in applying Bethe Ansatz methods in condensed matter physics, including superconductivity and nanoscale physics, are reviewed. The book concludes with an introduction to diffusion-reaction processes. Every chapter is devoted to a different subject and is self-contained, and thus can be read separately. A reader interesting in classical methods of solitons, such as the methods of solving the KdV equation, can start from Chapter 1, while a reader interested in the Bethe Ansatz method can immediately proceed to Chapter 5, and so on. Thus the book should appeal and be useful to a wide range of theoretical

  3. Singular integral equations boundary problems of function theory and their application to mathematical physics

    CERN Document Server

    Muskhelishvili, N I

    2011-01-01

    Singular integral equations play important roles in physics and theoretical mechanics, particularly in the areas of elasticity, aerodynamics, and unsteady aerofoil theory. They are highly effective in solving boundary problems occurring in the theory of functions of a complex variable, potential theory, the theory of elasticity, and the theory of fluid mechanics.This high-level treatment by a noted mathematician considers one-dimensional singular integral equations involving Cauchy principal values. Its coverage includes such topics as the Hölder condition, Hilbert and Riemann-Hilbert problem

  4. Real analysis an introduction to the theory of real functions and integration

    CERN Document Server

    Dshalalow, Jewgeni H

    2000-01-01

    Designed for use in a two-semester course on abstract analysis, REAL ANALYSIS: An Introduction to the Theory of Real Functions and Integration illuminates the principle topics that constitute real analysis. Self-contained, with coverage of topology, measure theory, and integration, it offers a thorough elaboration of major theorems, notions, and constructions needed not only by mathematics students but also by students of statistics and probability, operations research, physics, and engineering.Structured logically and flexibly through the author''s many years of teaching experience, the material is presented in three main sections:Part 1, chapters 1through 3, covers the preliminaries of set theory and the fundamentals of metric spaces and topology. This section can also serves as a text for first courses in topology.Part II, chapter 4 through 7, details the basics of measure and integration and stands independently for use in a separate measure theory course.Part III addresses more advanced topics, includin...

  5. Contour integral representations for the characters of rational conformal field theories

    International Nuclear Information System (INIS)

    Mukhi, S.; Panda, S.; Sen, A.

    1989-01-01

    We propose simple Feigin-Fuchs contour integral representations for the characters of a large class of rational conformal field theories. These include the A, D and E series SU(2) WZW theories, the A and D series c<1 minimal theories, and the k=1 SU(N) WZW theories. All these theories are characterized by the absence of the zeroes in the wronskian determinant of the characters in the interior of moduli space. This proposal is verified by several calculations. (orig.)

  6. Self-Models and Relationship Threat

    Directory of Open Access Journals (Sweden)

    Máire B. Ford

    2015-07-01

    Full Text Available This study investigated a key claim of risk regulation theory, namely, that psychological internalizing of a relationship threat will serve as a mediator of the link between self-models (self-esteem and attachment anxiety and relationship responses (moving closer to a partner vs. distancing from a partner. Participants (N = 101 received feedback that threatened their current romantic relationship (or no feedback and then completed measures of internal–external focus, relationship closeness–distancing, and acceptance–rejection of the feedback. Results showed that participants with negative self-models responded to the relationship threat by becoming more internally focused and by distancing from their partners, whereas those with positive self-models became more externally focused and moved closer to their partners. Mediation analyses indicated that the link between self-models and relationship closeness–distancing was partially explained by internal focus.

  7. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  8. Threaded cognition : An integrated theory of concurrent multitasking

    NARCIS (Netherlands)

    Salvucci, Dario D.; Taatgen, Niels A.

    The authors propose the idea of threaded cognition, an integrated theory of concurrent multitasking-that is, performing 2 or more tasks at once. Threaded cognition posits that streams of thought can be represented as threads of processing coordinated by a serial procedural resource and executed

  9. On integrating Jungian and other theories.

    Science.gov (United States)

    Sedgwick, David

    2015-09-01

    This paper consists of reflections on some of the processes, subtleties, and 'eros' involved in attempting to integrate Jungian and other analytic perspectives. Assimilation of other theoretical viewpoints has a long history in analytical psychology, beginning when Jung met Freud. Since its inception, the Journal of Analytical Psychology has provided a forum for theoretical syntheses and comparative psychoanalysis. Such attempts at synthesizing other theories represent analytical psychology itself trying to individuate. © 2015, The Society of Analytical Psychology.

  10. Theory and (In) Practice: The Problem of Integration in Art and Design Education

    Science.gov (United States)

    Rintoul, Jenny Ruth

    2014-01-01

    This paper examines the relationship between art "theory" and art "practice" in British art education at post-compulsory level, with a focus on the ways in which theory is framed and delivered and what this means for its integration. Drawing upon constructions of knowledge and approaches to integration as a technique and…

  11. Collaborative Knowledge Building and Integral Theory:On Perspectives,Uncertainty, and Mutual Regard

    Directory of Open Access Journals (Sweden)

    Tom Murray

    2006-06-01

    Full Text Available Uncertainty in knowing and communicating affect all aspects of modern life. Ubiquitous and inevitable uncertainty, including ambiguity and paradox, is particularly salient and important in knowledge building communities. Because knowledge building communities represent and evolve knowledge explicitly, the causes, effects, and approaches to this “epistemological indeterminacy” can be directly addressed in knowledge building practices. Integral theory's approach (including “methodological pluralism” involves accepting and integrating diverse perspectives in ways that transcend and include them. This approach accentuates the problems of epistemological indeterminacy and highlights the general need to deal creatively with it. This article begins with a cursory analysis of textual dialogs among integral theorists, showing that, while integral theory itself points to leading-edge ways of dealing with epistemological indeterminacy, the knowledge building practices of integral theorists, by and large, exhibit the same limitations as traditional intellectual discourses. Yet, due to its values and core methods, the integral theory community is in a unique position to develop novel and more adequate modes of inquiry and dialog. This text explores how epistemological indeterminacy impacts the activities and products of groups engaged in collaborative knowledge building. Approaching the issue from three perspectives—mutual understanding, mutual agreement, and mutual regard—I show the interdependence of those perspectives and ground them in relation to integral theory’s concerns. This article proposes three phases of developing constructive alternatives drawn from the knowledge building field: awareness of the phenomena, understanding the phenomena, and offering some tools (and some hope for dealing with it. Though here I focus on the integral theory community (or communities, the conclusions of the article are meant to be applicable to any

  12. Theories and Frameworks for Online Education: Seeking an Integrated Model

    Science.gov (United States)

    Picciano, Anthony G.

    2017-01-01

    This article examines theoretical frameworks and models that focus on the pedagogical aspects of online education. After a review of learning theory as applied to online education, a proposal for an integrated "Multimodal Model for Online Education" is provided based on pedagogical purpose. The model attempts to integrate the work of…

  13. Wess-Zumino and super Yang-Mills theories in D=4 integral superspace

    Science.gov (United States)

    Castellani, L.; Catenacci, R.; Grassi, P. A.

    2018-05-01

    We reconstruct the action of N = 1 , D = 4 Wess-Zumino and N = 1 , 2 , D = 4 super-Yang-Mills theories, using integral top forms on the supermanifold M^{(.4|4)} . Choosing different Picture Changing Operators, we show the equivalence of their rheonomic and superspace actions. The corresponding supergeometry and integration theory are discussed in detail. This formalism is an efficient tool for building supersymmetric models in a geometrical framework.

  14. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  15. Integrative mental health care: from theory to practice, part 1.

    Science.gov (United States)

    Lake, James

    2007-01-01

    Integrative approaches will lead to more accurate and different understandings of mental illness. Beneficial responses to complementary and alternative therapies provide important clues about the phenomenal nature of the human body in space-time and disparate biological, informational, and energetic factors associated with normal and abnormal psychological functioning. The conceptual framework of contemporary Western psychiatry includes multiple theoretical viewpoints, and there is no single best explanatory model of mental illness. Future theories of mental illness causation will not depend exclusively on empirical verification of strictly biological processes but will take into account both classically described biological processes and non-classical models, including complexity theory, resulting in more complete explanations of the characteristics and causes of symptoms and mechanisms of action that result in beneficial responses to treatments. Part 1 of this article examines the limitations of the theory and contemporary clinical methods employed in Western psychiatry and discusses implications of emerging paradigms in physics and the biological sciences for the future of psychiatry. In part 2, a practical methodology for planning integrative assessment and treatment strategies in mental health care is proposed. Using this methodology the integrative management of moderate and severe psychiatric symptoms is reviewed in detail. As the conceptual framework of Western medicine evolves toward an increasingly integrative perspective, novel understandings of complex relationships between biological, informational, and energetic processes associated with normal psychological functioning and mental illness will lead to more effective integrative assessment and treatment strategies addressing the causes or meanings of symptoms at multiple hierarchic levels of body-brain-mind.

  16. Integrative mental health care: from theory to practice, Part 2.

    Science.gov (United States)

    Lake, James

    2008-01-01

    Integrative approaches will lead to more accurate and different understandings of mental illness. Beneficial responses to complementary and alternative therapies provide important clues about the phenomenal nature of the human body in space-time and disparate biological, informational, and energetic factors associated with normal and abnormal psychological functioning. The conceptual framework of contemporary Western psychiatry includes multiple theoretical viewpoints, and there is no single best explanatory model of mental illness. Future theories of mental illness causation will not depend exclusively on empirical verification of strictly biological processes but will take into account both classically described biological processes and non-classical models, including complexity theory, resulting in more complete explanations of the characteristics and causes of symptoms and mechanisms of action that result in beneficial responses to treatments. Part 1 of this article examined the limitations of the theory and contemporary clinical methods employed in Western psychiatry and discussed implications of emerging paradigms in physics and the biological sciences for the future of psychiatry. In part 2, a practical methodology, for planning integrative assessment and treatment strategies in mental health care is proposed. Using this methodology the integrative management of moderate and severe psychiatric symptoms is reviewed in detail. As the conceptual framework of Western medicine evolves toward an increasingly integrative perspective, novel understanding of complex relationships between biological, informational, and energetic processes associated with normal psychological functioning and mental illness will lead to more effective integrative assessment and treatment strategies addressing the causes or meanings of symptoms at multiple hierarchic levels of body-brain-mind.

  17. From theory to practice: integrating instructional technology into veterinary medical education.

    Science.gov (United States)

    Wang, Hong; Rush, Bonnie R; Wilkerson, Melinda; Herman, Cheryl; Miesner, Matt; Renter, David; Gehring, Ronette

    2013-01-01

    Technology has changed the landscape of teaching and learning. The integration of instructional technology into teaching for meaningful learning is an issue for all educators to consider. In this article, we introduce educational theories including constructivism, information-processing theory, and dual-coding theory, along with the seven principles of good practice in undergraduate education. We also discuss five practical instructional strategies and the relationship of these strategies to the educational theories. From theory to practice, the purpose of the article is to share our application of educational theory and practice to work toward more innovative teaching in veterinary medical education.

  18. Improvements of the integral transport theory method

    International Nuclear Information System (INIS)

    Kavenoky, A.; Lam-Hime, M.; Stankovski, Z.

    1979-01-01

    The integral transport theory is widely used in practical reactor design calculations however it is computer time consuming for two dimensional calculations of large media. In the first part of this report a new treatment is presented; it is based on the Galerkin method: inside each region the total flux is expanded over a three component basis. Numerical comparison shows that this method can considerably reduce the computing time. The second part of the this report is devoted to homogeneization theory: a straightforward calculation of the fundamental mode for an heterogeneous cell is presented. At first general presentation of the problem is given, then it is simplified to plane geometry and numerical results are presented

  19. Mathematical theory of Feynman path integrals an introduction

    CERN Document Server

    Albeverio, Sergio A; Mazzucchi, Sonia

    2008-01-01

    Feynman path integrals, suggested heuristically by Feynman in the 40s, have become the basis of much of contemporary physics, from non-relativistic quantum mechanics to quantum fields, including gauge fields, gravitation, cosmology. Recently ideas based on Feynman path integrals have also played an important role in areas of mathematics like low-dimensional topology and differential geometry, algebraic geometry, infinite-dimensional analysis and geometry, and number theory. The 2nd edition of LNM 523 is based on the two first authors' mathematical approach of this theory presented in its 1st edition in 1976. To take care of the many developments since then, an entire new chapter on the current forefront of research has been added. Except for this new chapter and the correction of a few misprints, the basic material and presentation of the first edition has been maintained. At the end of each chapter the reader will also find notes with further bibliographical information.

  20. The social neuroscience and the theory of integrative levels.

    Science.gov (United States)

    Bello-Morales, Raquel; Delgado-García, José María

    2015-01-01

    The theory of integrative levels provides a general description of the evolution of matter through successive orders of complexity and integration. Along its development, material forms pass through different levels of organization, such as physical, chemical, biological or sociological. The appearance of novel structures and dynamics during this process of development of matter in complex systems has been called emergence. Social neuroscience (SN), an interdisciplinary field that aims to investigate the biological mechanisms that underlie social structures, processes, and behavior and the influences between social and biological levels of organization, has affirmed the necessity for including social context as an essential element to understand the human behavior. To do this, SN proposes a multilevel integrative approach by means of three principles: multiple determinism, nonadditive determinism and reciprocal determinism. These theoretical principles seem to share the basic tenets of the theory of integrative levels but, in this paper, we aim to reveal the differences among both doctrines. First, SN asserts that combination of neural and social variables can produce emergent phenomena that would not be predictable from a neuroscientific or social psychological analysis alone; SN also suggests that to achieve a complete understanding of social structures we should use an integrative analysis that encompasses levels of organization ranging from the genetic level to the social one; finally, SN establishes that there can be mutual influences between biological and social factors in determining behavior, accepting, therefore, a double influence, upward from biology to social level, and downward, from social level to biology. In contrast, following the theory of integrative levels, emergent phenomena are not produced by the combination of variables from two levels, but by the increment of complexity at one level. In addition, the social behavior and structures might be

  1. The social neuroscience and the theory of integrative levels

    Directory of Open Access Journals (Sweden)

    Raquel eBello-Morales

    2015-10-01

    Full Text Available The theory of integrative levels provides a general description of the evolution of matter through successive orders of complexity and integration. Along its development, material forms pass through different levels of organization, such as physical, chemical, biological or sociological. The appearance of novel structures and dynamics during this process of development of matter in complex systems has been called emergence. Social neuroscience (SN, an interdisciplinary field that aims to investigate the biological mechanisms that underlie social structures, processes, and behavior and the influences between social and biological levels of organization, has affirmed the necessity for including social context as an essential element to understand the human behavior. To do this, SN proposes a multilevel integrative approach by means of three principles: multiple determinism, nonadditive determinism and reciprocal determinism. These theoretical principles seem to share the basic tenets of the theory of integrative levels but, in this paper, we aim to reveal the differences among both doctrines.First, SN asserts that combination of neural and social variables can produce emergent phenomena that would not be predictable from a neuroscientific or social psychological analysis alone; SN also suggests that to achieve a complete understanding of social structures we should use an integrative analysis that encompasses levels of organization ranging from the genetic level to the social one; finally, SN establishes that there can be mutual influences between biological and social factors in determining behavior, accepting, therefore, a double influence, upward from biology to social level, and downward, from social level to biology.In contrast, following the theory of integrative levels, emergent phenomena are not produced by the combination of variables from two levels, but by the increment of complexity at one level. In addition, the social behavior and

  2. Stereotypes as stumbling-blocks: how coping with stereotype threat affects life outcomes for people with physical disabilities.

    Science.gov (United States)

    Silverman, Arielle M; Cohen, Geoffrey L

    2014-10-01

    Stereotype threat, the concern about being judged in light of negative stereotypes, causes underperformance in evaluative situations. However, less is known about how coping with stereotypes can aggravate underperformance over time. We propose a model in which ongoing stereotype threat experiences threaten a person's sense of self-integrity, which in turn prompts defensive avoidance of stereotype-relevant situations, impeding growth, achievement, and well-being. We test this model in an important but understudied population: the physically disabled. In Study 1, blind adults reporting higher levels of stereotype threat reported lower self-integrity and well-being and were more likely to be unemployed and to report avoiding stereotype-threatening situations. In Study 2's field experiment, blind students in a compensatory skill-training program made more progress if they had completed a values-affirmation, an exercise that bolsters self-integrity. The findings suggest that stereotype threat poses a chronic threat to self-integrity and undermines life outcomes for people with disabilities. © 2014 by the Society for Personality and Social Psychology, Inc.

  3. Toward a Theory of Integrated Urban Ecology: Complementing Pickett et al.

    Directory of Open Access Journals (Sweden)

    Robert Mugerauer

    2010-12-01

    Full Text Available The analyses substantially delineating "integrative studies of large urban areas as bio-physical-social complexes" and the suggestions by Pickett et al. in "Beyond Urban Legends" (Bioscience 2008 58 139-150 provide an initial framework for a theory of urban ecology. This article intends to contribute to the project by: 1 improving the philosophical rigor of critical concepts and epistemologies; 2 making explicit the complementary theoretical and empirical work in urban ecology already being done that can be better integrated, for example, studies from outside the U.S. and uses of actor network theory; 3 bringing forward more disciplines and theories which successfully deploy modes of thinking, research procedures, and practices more adequate to the phenomena at all scales and levels of particularity, i.e., micro, phenomenal, macro, to fill in some of the empirical gaps in the middle, specifically those having to do with human values and the richness of the everyday lifeworld. In addition to what is available within complexity theory itself, chief among the approaches to be utilized are phenomenology, ethnographic thick description, and actor network theory.

  4. Finding influential nodes for integration in brain networks using optimal percolation theory.

    Science.gov (United States)

    Del Ferraro, Gino; Moreno, Andrea; Min, Byungjoon; Morone, Flaviano; Pérez-Ramírez, Úrsula; Pérez-Cervera, Laura; Parra, Lucas C; Holodny, Andrei; Canals, Santiago; Makse, Hernán A

    2018-06-11

    Global integration of information in the brain results from complex interactions of segregated brain networks. Identifying the most influential neuronal populations that efficiently bind these networks is a fundamental problem of systems neuroscience. Here, we apply optimal percolation theory and pharmacogenetic interventions in vivo to predict and subsequently target nodes that are essential for global integration of a memory network in rodents. The theory predicts that integration in the memory network is mediated by a set of low-degree nodes located in the nucleus accumbens. This result is confirmed with pharmacogenetic inactivation of the nucleus accumbens, which eliminates the formation of the memory network, while inactivations of other brain areas leave the network intact. Thus, optimal percolation theory predicts essential nodes in brain networks. This could be used to identify targets of interventions to modulate brain function.

  5. On the classical origins of yangian symmetry in integrable field theory

    International Nuclear Information System (INIS)

    MacKay, N.J.

    1992-01-01

    We show that Drinfeld's yangian algebra, studied recently as the algebra of conserved charges in certain two-dimensional integrable quantum field theories, is also present in the classical theory as a Poisson-Hopf algebra, and exhibit explicitly the Serre relations, coproduct and antipode. (orig.)

  6. Toward a theory of holistic needs and the brain.

    Science.gov (United States)

    Silton, Nava R; Flannelly, Laura T; Flannelly, Kevin J; Galek, Kathleen

    2011-01-01

    This article reviews Maslow's theory of motivation wherein he proposes a hierarchy of human needs. First, it describes the principal elements of Maslow's theory and discusses considerations relating to the flexibility of the hierarchy. Second, it explains the relationship among Maslow's theory of human needs, attachment theory, and evolutionary threat assessment system theory. Third, it provides an overview of the brain structures posited to be involved in attachment and evolutionary threat assessment system theory and their relation to Maslow's hierarchy. Finally, it explains how the 3 theories converge to form a theory of holistic needs.

  7. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  8. A theory of physician-hospital integration: contending institutional and market logics in the health care field.

    Science.gov (United States)

    Rundall, Thomas G; Shortell, Stephen M; Alexander, Jeffrey A

    2004-01-01

    This article proposes a theory of physician-hospital integration. The theory is developed by building on three streams of scholarship: "new" institutionalism, "old" institutionalism, and the theory of economic markets. The theory uses several key concepts from these theoretical frameworks, including the notions of environmental demands for legitimacy, market demands for efficiency, and agency. To enhance the predictive power of the theory, two new concepts are introduced: directionality of influence between institutional and market forces at the macro-societal level, and degree of separation of institutional and market domains at the local level--which add important predictive power to the theory. Using these concepts, a number of hypotheses are proposed regarding the ideal types of physician-hospital arrangements that are likely to emerge under different combinations of directionality of influence and institutional and market domain separation. Moreover, the theory generates hypotheses regarding organizational dynamics associated with physician-hospital integration, including the conditions associated with high and low prevalence of physician-hospital integration, the extent to which the integrated organization is physician-centric or hospital-centric, and whether physician-hospital integration is likely to be based on loose contractual arrangements or tight, ownership-based arrangements.

  9. Strategies to Minimize the Effects of Information Security Threats on Business Performance

    Science.gov (United States)

    Okoye, Stella Ifeyinwa

    2017-01-01

    Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…

  10. An integral for second-order multiple scattering perturbation theory

    International Nuclear Information System (INIS)

    Hoffman, G.G.

    1997-01-01

    This paper presents the closed form evaluation of a six-dimensional integral. The integral arises in the application to many-electron systems of a multiple scattering perturbation expansion at second order when formulated in fourier space. The resulting function can be used for the calculation of both the electron density and the effective one-electron potential in an SCF calculations. The closed form expression derived here greatly facilitates these calculations. In addition, the evaluated integral can be used for the computation of second-order corrections to the open-quotes optimized Thomas-Fermi theory.close quotes 10 refs., 2 figs

  11. An Emerging Integrated Middle-Range Theory on Asian Women's Leadership in Nursing.

    Science.gov (United States)

    Im, Eun-Ok; Broome, Marion E; Inouye, Jillian; Kunaviktikul, Wipada; Oh, Eui Geum; Sakashita, Reiko; Yi, Myungsun; Huang, Lian-Hua; Tsai, Hsiu-Min; Wang, Hsiu-Hung

    2018-02-01

    Asian cultures reflect patriarchal cultural values and attitudes, which likely have influenced women leaders in their countries differently from women in Western cultures. However, virtually no leadership theories have been developed to reflect the experiences and development of nursing leaders from Asian cultures. The purpose of this article is to present an emerging integrated middle-range theory on Asian women's leadership in nursing. Using an integrative approach, the theory was developed based on three major sources: the leadership frames of Bolman and Deal, literature reviews, and exemplars/cases from five different countries. The theory includes two main domains (leadership frames and leadership contexts). The domain of leadership frames includes human resources/networks, structure/organization, national/international politics, and symbols. The domain of leadership contexts includes cultural contexts, sociopolitical contexts, and gendered contexts. This theory will help understand nursing leadership in Asian cultures and provide directions for future nurse leaders in this ever-changing globalized world.

  12. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. Threaded Cognition: An Integrated Theory of Concurrent Multitasking

    Science.gov (United States)

    Salvucci, Dario D.; Taatgen, Niels A.

    2008-01-01

    The authors propose the idea of threaded cognition, an integrated theory of concurrent multitasking--that is, performing 2 or more tasks at once. Threaded cognition posits that streams of thought can be represented as threads of processing coordinated by a serial procedural resource and executed across other available resources (e.g., perceptual…

  14. Solution of quantum integrable systems from quiver gauge theories

    Energy Technology Data Exchange (ETDEWEB)

    Dorey, Nick [Department of Applied Mathematics and Theoretical Physics, University of Cambridge,Cambridge (United Kingdom); Zhao, Peng [Simons Center for Geometry and Physics, Stony Brook University,Stony Brook (United States)

    2017-02-23

    We construct new integrable systems describing particles with internal spin from four-dimensional N = 2 quiver gauge theories. The models can be quantized and solved exactly using the quantum inverse scattering method and also using the Bethe/Gauge correspondence.

  15. Integrating mediation and moderation to advance theory development and testing.

    Science.gov (United States)

    Karazsia, Bryan T; Berlin, Kristoffer S; Armstrong, Bridget; Janicke, David M; Darling, Katherine E

    2014-03-01

    The concepts and associated analyses of mediation and moderation are important to the field of psychology. Although pediatric psychologists frequently incorporate mediation and moderation in their theories and empirical research, on few occasions have we integrated mediation and moderation. In this article, conceptual reasons for integrating mediation and moderation are offered. We illustrate a model that integrates mediation and moderation. In our illustration, the strength of an indirect or a mediating effect varied as a function of a moderating variable. Clinical implications of the integration of mediation and moderation are discussed, as is the potential of integrated models to advance research programs in pediatric psychology.

  16. Path-integral invariants in abelian Chern–Simons theory

    International Nuclear Information System (INIS)

    Guadagnini, E.; Thuillier, F.

    2014-01-01

    We consider the U(1) Chern–Simons gauge theory defined in a general closed oriented 3-manifold M; the functional integration is used to compute the normalized partition function and the expectation values of the link holonomies. The non-perturbative path-integral is defined in the space of the gauge orbits of the connections which belong to the various inequivalent U(1) principal bundles over M; the different sectors of configuration space are labelled by the elements of the first homology group of M and are characterized by appropriate background connections. The gauge orbits of flat connections, whose classification is also based on the homology group, control the non-perturbative contributions to the mean values. The functional integration is carried out in any 3-manifold M, and the corresponding path-integral invariants turn out to be strictly related with the abelian Reshetikhin–Turaev surgery invariants

  17. Facing death together : Understanding the consequences of mortality threats

    NARCIS (Netherlands)

    Renkema, L.J.

    2009-01-01

    In everyday life people are constantly reminded of the temporary nature of life. Newspapers, television, and the Internet offer a constant stream or death reminders, ranging from terrorist attacks to natural disasters. According to Terror Management Theory, people are able to cope with these threats

  18. Beware of the predatory science journal: A potential threat to the integrity of medical research.

    Science.gov (United States)

    Johal, Jaspreet; Ward, Robert; Gielecki, Jerzy; Walocha, Jerzy; Natsis, Kostantinos; Tubbs, R Shane; Loukas, Marios

    2017-09-01

    The issue of predatory journals has become increasingly more prevalent over the past decade, as the open-access model of publishing has gained prominence. Although the open-access model is well intentioned to increase accessibility of biomedical research, it is vulnerable to exploitation by those looking to corrupt medical academia and circumvent ethics and research standards. Predatory journals will achieve publication by either soliciting unsuspecting researchers who have legitimate research but fall victim to these predators or researchers looking to quickly publish their research without a thorough review process. Some features of predatory journals are a quick non-peer-review process, falsely listing or exaggerating the credibility of editorial board members, and either lack of or falsification of institutional affiliations and database listings. These predatory journals are a serious threat to the integrity of medical research, as they will infect the available literature with unsubstantiated articles, and allow low-quality research. A number of steps can be taken to prevent the spread and increase awareness of predatory publishers, and these must be done to maintain the integrity of medical academia. Clin. Anat. 30:767-773, 2017. © 2017Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  19. The influence of stereotype threat on immigrants: review and meta-analysis

    OpenAIRE

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemen...

  20. From secure dependency to attachment: Mary Ainsworth's integration of Blatz's security theory into Bowlby's attachment theory.

    Science.gov (United States)

    van Rosmalen, Lenny; van der Horst, Frank C P; van der Veer, René

    2016-02-01

    John Bowlby is generally regarded as the founder of attachment theory, with the help of Mary Ainsworth. Through her Uganda and Baltimore studies Ainsworth provided empirical evidence for attachment theory, and she contributed the notion of the secure base and exploratory behavior, the Strange Situation Procedure and its classification system, and the notion of maternal sensitivity. On closer scrutiny, many of these contributions appear to be heavily influenced by William Blatz and his security theory. Even though Blatz's influence on Ainsworth has been generally acknowledged, this article, partly based on understudied correspondence from several personal archives, is the first to show which specific parts of attachment theory can be traced back directly to Blatz and his security theory. When Ainsworth started working with Bowlby in the 1950s, around the time he turned to evolutionary theory for an explanation of his findings, she integrated much of Blatzian security theory into Bowlby's theory in the making and used her theoretical and practical experience to enrich attachment theory. Even though Blatz is hardly mentioned nowadays, several of his ideas live on in attachment theory. (c) 2016 APA, all rights reserved).

  1. Yang-Baxter algebra - Integrable systems - Conformal quantum field theories

    International Nuclear Information System (INIS)

    Karowski, M.

    1989-01-01

    This series of lectures is based on investigations [1,2] of finite-size corrections for the six-vertex model by means of Bethe ansatz methods. In addition a review on applications of Yang-Baxter algebras and an introduction to the theory of integrable systems and the algebraic Bethe ansatz is presented. A Θ-vacuum like angle appearing in the RSOS-models is discussed. The continuum limit in the critical case of these statistical models is performed to obtain the minimal models of conformal quantum field theory. (author)

  2. Institutional economics and economic organisation theory: An integrated approach

    NARCIS (Netherlands)

    Slangen, L.H.G.; Loucks, L.A.; Slangen, A.H.L.

    2008-01-01

    This publication presents one of the first attempts to integrate two emerging bodies of economic research: institutional economics and organizational theory. It begins within the framework of neoclassical economics, and then extends the boundaries of this framework to offer answers to questions that

  3. Institutional economics and economic organisation theory : an integrated approach

    NARCIS (Netherlands)

    Slangen, L.H.G.; Loucks, L.; Slangen, A.H.L.

    2008-01-01

    This publication presents one of the first attempts to integrate two emerging bodies of economic research: institutional economics and organizational theory. It begins within the framework of neoclassical economics, and then extends the boundaries of this framework to offer answers to questions that

  4. Political conservatism, authoritarianism, and societal threat: voting for Republican representatives in U.S. Congressional elections from 1946 to 1992.

    Science.gov (United States)

    McCann, Stewart J H

    2009-07-01

    The author found that the degree of national societal threat preceding congressional elections from 1946 to 1992 was positively associated with the mean state percentage of people voting for Republican representatives, supporting a conventional threat-authoritarianism hypothesis. However, threat was positively associated with the mean state percentage of people voting for Republican representatives in conservative states but not in liberal states, and the conventional threat-authoritarianism link was entirely driven by the relation in conservative states. The author classified states with a composite measure (alpha = .92) on the basis of state ideological identification, religious fundamentalism, composite policy liberalism, Republican Party elite ideology, and Democratic Party elite ideology. These results offer support to an interactive threat-authoritarianism hypothesis derived from the authoritarian dynamic theory of K. Stenner (2005), which postulates that only authoritarian persons are activated to manifest authoritarian behavior in times of normative threat. Also, the author discusses potential alternative explanations on the basis of system justification, need for closure, and terror-management theories.

  5. Societal threat, authoritarianism, conservatism, and U.S. state death penalty sentencing (1977-2004).

    Science.gov (United States)

    McCann, Stewart J H

    2008-05-01

    On the basis of K. Stenner's (2005) authoritarian dynamic theory, it was hypothesized that the number of death sentences and executions would be higher in more threatened conservative states than in less threatened conservative states, and would be lower in more threatened liberal states than in less threatened liberal states. Threat was based on state homicide rate, violent crime rate, and non-White percentage of population. Conservatism was based on state voter ideological identification, Democratic and Republican Party elite liberalism-conservatism, policy liberalism-conservatism, religious fundamentalism, degree of economic freedom, and 2004 presidential election results. For 1977-2004, with controls for state population and years with a death penalty provision, the interactive hypothesis received consistent support using the state conservatism composite and voter ideological identification alone. As well, state conservatism was related to death penalties and executions, but state threat was not. The temporal stability of the findings was demonstrated with a split-half internal replication using the periods 1977-1990 and 1991-2004. The interactive hypothesis and the results also are discussed in the context of other threat-authoritarianism theories and terror management theory. (c) 2008 APA, all rights reserved

  6. The quantum double in integrable quantum field theory

    International Nuclear Information System (INIS)

    Bernard, D.; LeClair, A.

    1993-01-01

    Various aspects of recent works on affine quantum group symmetry of integrable 2D quantum field theory are reviewed and further clarified. A geometrical meaning is given to the quantum double, and other properties of quantum groups. The S-matrix is identified with the universal R-matrix. Multiplicative presentations of the yangian double are analyzed. (orig.)

  7. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  8. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  9. Integrating care for neurodevelopmental disorders by unpacking control: A grounded theory study

    Directory of Open Access Journals (Sweden)

    Gustaf Waxegård

    2016-09-01

    Full Text Available Background: To establish integrated healthcare pathways for patients with neurodevelopmental disorders (ND such as autism spectrum disorder and attention-deficit hyperactivity disorder is challenging. This study sets out to investigate the main concerns for healthcare professionals when integrating ND care pathways and how they resolve these concerns. Methods: Using classic grounded theory (Glaser, we analysed efforts to improve and integrate an ND care pathway for children and youth in a Swedish region over a period of 6 years. Data from 42 individual interviews with a range of ND professionals, nine group interviews with healthcare teams, participant observation, a 2-day dialogue conference, focus group meetings, regional media coverage, and reports from other Swedish regional ND projects were analysed. Results: The main concern for participants was to deal with overwhelming ND complexity by unpacking control, which is control over strategies to define patients’ status and needs. Unpacking control is key to the professionals’ strivings to expand constructive life space for patients, to squeeze health care to reach available care goals, to promote professional ideologies, and to uphold workplace integrity. Control-seeking behaviour in relation to ND unpacking is ubiquitous and complicates integration of ND care pathways. Conclusions: The Unpacking control theory expands central aspects of professions theory and may help to improve ND care development.

  10. Integrating care for neurodevelopmental disorders by unpacking control: A grounded theory study

    Science.gov (United States)

    Waxegård, Gustaf; Thulesius, Hans

    2016-01-01

    Background To establish integrated healthcare pathways for patients with neurodevelopmental disorders (ND) such as autism spectrum disorder and attention-deficit hyperactivity disorder is challenging. This study sets out to investigate the main concerns for healthcare professionals when integrating ND care pathways and how they resolve these concerns. Methods Using classic grounded theory (Glaser), we analysed efforts to improve and integrate an ND care pathway for children and youth in a Swedish region over a period of 6 years. Data from 42 individual interviews with a range of ND professionals, nine group interviews with healthcare teams, participant observation, a 2-day dialogue conference, focus group meetings, regional media coverage, and reports from other Swedish regional ND projects were analysed. Results The main concern for participants was to deal with overwhelming ND complexity by unpacking control, which is control over strategies to define patients’ status and needs. Unpacking control is key to the professionals’ strivings to expand constructive life space for patients, to squeeze health care to reach available care goals, to promote professional ideologies, and to uphold workplace integrity. Control-seeking behaviour in relation to ND unpacking is ubiquitous and complicates integration of ND care pathways. Conclusions The Unpacking control theory expands central aspects of professions theory and may help to improve ND care development. PMID:27609793

  11. Threaded cognition: an integrated theory of concurrent multitasking.

    Science.gov (United States)

    Salvucci, Dario D; Taatgen, Niels A

    2008-01-01

    The authors propose the idea of threaded cognition, an integrated theory of concurrent multitasking--that is, performing 2 or more tasks at once. Threaded cognition posits that streams of thought can be represented as threads of processing coordinated by a serial procedural resource and executed across other available resources (e.g., perceptual and motor resources). The theory specifies a parsimonious mechanism that allows for concurrent execution, resource acquisition, and resolution of resource conflicts, without the need for specialized executive processes. By instantiating this mechanism as a computational model, threaded cognition provides explicit predictions of how multitasking behavior can result in interference, or lack thereof, for a given set of tasks. The authors illustrate the theory in model simulations of several representative domains ranging from simple laboratory tasks such as dual-choice tasks to complex real-world domains such as driving and driver distraction. (c) 2008 APA, all rights reserved

  12. Self-transcendence: Lonergan's key to integration of nursing theory, research, and practice.

    Science.gov (United States)

    Perry, Donna J

    2004-04-01

    This paper proposes that the philosophy of Bernard Lonergan can provide insight into the challenge of integrating nursing theory, research and practice. The author discusses Lonergan's work in regard to reflective understanding, authenticity and the human person as a subject of consciously developing unity. This is followed by a discussion of two key elements in Lonergan's work that relate to nursing: the subject-object challenge of nursing inquiry and common sense vs. scientific knowledge. The author suggests that integration of nursing theory, science and practice may be achieved through self-transcendence.

  13. Alternative Evaluation of a ln tan Integral Arising in Quantum Field Theory

    International Nuclear Information System (INIS)

    Coffey, Mark W.

    2010-01-01

    A certain dilogarithmic integral I 7 turns up in a number of contexts including Feynman diagram calculations, volumes of tetrahedra in hyperbolic geometry, knot theory, and conjectured relations in analytic number theory. We provide an alternative explicit evaluation of a parameterized family of integrals containing this particular case. By invoking the Bloch-Wigner form of the dilogarithm function, we produce an equivalent result, giving a third evaluation of I 7 . We also alternatively formulate some conjectures which we pose in terms of values of the specific Clausen function Cl 2 .

  14. Theory, modeling, and integrated studies in the Arase (ERG) project

    Science.gov (United States)

    Seki, Kanako; Miyoshi, Yoshizumi; Ebihara, Yusuke; Katoh, Yuto; Amano, Takanobu; Saito, Shinji; Shoji, Masafumi; Nakamizo, Aoi; Keika, Kunihiro; Hori, Tomoaki; Nakano, Shin'ya; Watanabe, Shigeto; Kamiya, Kei; Takahashi, Naoko; Omura, Yoshiharu; Nose, Masahito; Fok, Mei-Ching; Tanaka, Takashi; Ieda, Akimasa; Yoshikawa, Akimasa

    2018-02-01

    Understanding of underlying mechanisms of drastic variations of the near-Earth space (geospace) is one of the current focuses of the magnetospheric physics. The science target of the geospace research project Exploration of energization and Radiation in Geospace (ERG) is to understand the geospace variations with a focus on the relativistic electron acceleration and loss processes. In order to achieve the goal, the ERG project consists of the three parts: the Arase (ERG) satellite, ground-based observations, and theory/modeling/integrated studies. The role of theory/modeling/integrated studies part is to promote relevant theoretical and simulation studies as well as integrated data analysis to combine different kinds of observations and modeling. Here we provide technical reports on simulation and empirical models related to the ERG project together with their roles in the integrated studies of dynamic geospace variations. The simulation and empirical models covered include the radial diffusion model of the radiation belt electrons, GEMSIS-RB and RBW models, CIMI model with global MHD simulation REPPU, GEMSIS-RC model, plasmasphere thermosphere model, self-consistent wave-particle interaction simulations (electron hybrid code and ion hybrid code), the ionospheric electric potential (GEMSIS-POT) model, and SuperDARN electric field models with data assimilation. ERG (Arase) science center tools to support integrated studies with various kinds of data are also briefly introduced.[Figure not available: see fulltext.

  15. Path integral theory and deep inelastic scattering of nuclei

    International Nuclear Information System (INIS)

    Neto, J.L.

    1981-10-01

    A formalism, based on Feynman's path integral, is developed and used in the theory of deep inelastic collisions of nuclei. Having shown how to express the propagator of the Wigner function of an isolated system as a (double) path integral in phase space, random processes are considered and the influence functional in interacting systems is discussed. A semi-classical description for the reduced Wigner and a generalized Langevin equation are given. Finally, the formalism is used in a random matrix model for deep inelastic collisions. (U.K.)

  16. Crossover integral equation theory for the liquid structure study

    International Nuclear Information System (INIS)

    Lai, S.K.; Chen, H.C.

    1994-08-01

    The main purpose of this work is to report on a calculation that describes the role of the long-range bridge function [H. Iyetomi and S. Ichimaru, Phys. Rev. A 25, 2434 (1982)] as applied to the study of structure of simple liquid metals. It was found here that this bridge function accounts pretty well for the major part of long-range interactions but is physically inadequate for describing the short-range part of liquid structure. To improve on the theory we have drawn attention to the crossover integral equation method which, in essence, amounts to adding to the above bridge function a short-range correction of bridge diagrams. The suggested crossover procedure has been tested for the case of liquid metal Cs. Remarkably good agreement with experiment was obtained confirming our conjecture that the crossover integral equation approach as stressed in this work is potentially an appropriate theory for an accurate study of liquid structure possibly for the supercooled liquid regime. (author). 21 refs, 3 figs

  17. Inclusion of Premeditated Threats in the Safety Methodology for NPPs

    International Nuclear Information System (INIS)

    Levanon, I.

    2014-01-01

    During the last decade the global effort to prevent terrorism or to mitigate its harm, if prevention fails, has increased. The nuclear power community was involved in this effort trying to prevent terrorist attacks on NPPs (Nuclear Power Plants). A natural extension of terror restraining is the prevention of any premeditated damage to the plant, including acts of state. The pre-feasibility study of an Israeli NPP, conducted by the Ministry of National Infrastructures, has identified the risk of hostile damage to the NPP as a major obstacle to the establishment of nuclear power in Israel, second only to the refusal of nuclear exporting nations to sell an NPP to Israelv. The General Director of the Ministry and the Head of the IAEC (Israeli Atomic Energy Commission) have approved continuation of the pre-feasibility study. This synopsis presents a study, regarding premeditated threats to NPPs, commissioned by the Ministry of National Infrastructures as part of the continuation. It focuses on the safety aspect of premeditated threats originating outside the plant, although a significant part of the analysis can be extended to other subjects such as theft or diversion of strategic materials. The study deals only with methodology and does not encompass specific threats or protection measures. Conclusions and recommendations and marked by bold italics Arial font. The theory of nuclear safety regarding non-premeditated safety events (equipment failures, human errors, natural events, etc.) is well developed. The study refers to these events and the theory attached to them as c lassical , distinguishing them from premeditated events. The study defines two postulates, related to premeditated threats: Correspondence – We should adopt the classical methodology whenever possible. Regulation – The safety of an NPP from premeditated threats requires examination, approval and inspection by a regulator. Key issues of the methodology with substantial differences from the

  18. Cultivating Perspectival Acuity: The Value and Cost of Integrating Theory, Craft, Research, and Practice

    Directory of Open Access Journals (Sweden)

    Joe Manganelli

    2016-10-01

    Full Text Available This paper presents reflections on integrating theory, craft, research, and practice to improve the accuracy and resiliency of each. The reflections build toward a set of statements about the value and the cost of integrating theory, craft, research, and practice. Specifically, the authors offer the Privileged Work / Non-Privileged Work Framework and concept of cultivating Perspectival Acuity.

  19. Integrability of a family of quantum field theories related to sigma models

    Energy Technology Data Exchange (ETDEWEB)

    Ridout, David [Australian National Univ., Canberra, ACT (Australia). Dept. of Theoretical Physics; DESY, Hamburg (Germany). Theory Group; Teschner, Joerg [DESY, Hamburg (Germany). Theory Group

    2011-03-15

    A method is introduced for constructing lattice discretizations of large classes of integrable quantum field theories. The method proceeds in two steps: The quantum algebraic structure underlying the integrability of the model is determined from the algebra of the interaction terms in the light-cone representation. The representation theory of the relevant quantum algebra is then used to construct the basic ingredients of the quantum inverse scattering method, the lattice Lax matrices and R-matrices. This method is illustrated with four examples: The Sinh-Gordon model, the affine sl(3) Toda model, a model called the fermionic sl(2 vertical stroke 1) Toda theory, and the N=2 supersymmetric Sine-Gordon model. These models are all related to sigma models in various ways. The N=2 supersymmetric Sine-Gordon model, in particular, describes the Pohlmeyer reduction of string theory on AdS{sub 2} x S{sup 2}, and is dual to a supersymmetric non-linear sigma model with a sausage-shaped target space. (orig.)

  20. Social psychological theories of disordered eating in college women: review and integration.

    Science.gov (United States)

    Fitzsimmons-Craft, Ellen E

    2011-11-01

    Because peer interaction, weight/shape, and self-concept formation are particularly salient to college women, the implications of social psychological theories may be especially far-reaching during the college years. College women may be particularly vulnerable to the effects of social comparison, objectification, and uses and gratifications theories, which describe social-cognitive mechanisms that provide an individual with information regarding her own view of her body and how she perceives that others perceive her body. The current paper will review and integrate findings related to these three theories of disordered eating in college women in an effort to present a more comprehensive understanding of the social psychological mechanisms that play a role in the development and maintenance of such pathology for this group of young women. Limitations of and future directions for research on these theories will be discussed, as will their potential integration with other factors that contribute to disordered eating and implications for treatment and prevention. Copyright © 2011 Elsevier Ltd. All rights reserved.

  1. Reducing contingent self-worth: a defensive response to self-threats.

    Science.gov (United States)

    Buckingham, Justin; Lam, Tiffany A; Andrade, Fernanda C; Boring, Brandon L; Emery, Danielle

    2018-04-10

    Previous research shows that people with high self-esteem cope with threats to the self by reducing the extent to which their self-worth is contingent on the threatened domain (Buckingham, Weber, & Sypher, 2012). The present studies tested the hypothesis that this is a defensive process. In support of this hypothesis, Study 1 (N = 160), showed that self-affirmation attenuates the tendency for people with high self-esteem to reduce their contingencies of self-worth following self-threat. Furthermore, Study 2 (N = 286), showed that this tendency was more prevalent among people with defensive self-esteem than among those with secure self-esteem. The present studies imply that reducing contingent self-worth after self-threat is a defensive process. We discuss implications for theories of contingent self-worth.

  2. Collaborative Knowledge Building and Integral Theory: On Perspectives, Uncertainty, and Mutual Regard

    Directory of Open Access Journals (Sweden)

    Tom Murray

    2006-06-01

    Full Text Available Uncertainty in knowing and communicating affect all aspects of modern life. Ubiquitous and inevitable uncertainty, including ambiguity and paradox, is particularly salient and important in knowledge building communities. Because knowledge building communities represent and evolve knowledge explicitly, the causes, effects, and approaches to this “epistemological indeterminacy” can be directly addressed in knowledge building practices. Integral theory’s approach (including “methodological pluralism” involves accepting and integrating diverse perspectives in ways that transcend and include them. This approach accentuates the problems of epistemological indeterminacy and highlights the general need to deal creatively with it. This article begins with a cursory analysis of textual dialogs among integral theorists, showing that, while integral theory itself points to leading-edge ways of dealing with epistemological indeterminacy, the knowledge building practices of integral theorists, by and large, exhibit the same limitations as traditional intellectual discourses. Yet, due to its values and core methods, the integral theory community is in a unique position to develop novel and more adequate modes of inquiry and dialog. This text explores how epistemological indeterminacy impacts the activities and products of groups engaged in collaborative knowledge building. Approaching the issue from three perspectives–mutual understanding, mutual agreement, and mutual regard—I show the interdependence of those perspectives and ground them in relation to integral theory’s concerns. This article proposes three phases of developing constructive alternatives drawn from the knowledge building field: awareness of the phenomena, understanding the phenomena, and offering some tools (and some hope for dealing with it. Though here I focus on the integral theory community (or communities, the conclusions of the article are meant to be applicable to any

  3. Reducing the risk of cyber threats in utilities through log management

    Energy Technology Data Exchange (ETDEWEB)

    Patnaik, A. [ArcSight, Cupertino, CA (United States)

    2010-01-15

    Electrical blackouts caused by terrorists hacking into targeted control systems have already occurred in Brazil. A patchwork of security tools is needed to reduce potential threats. The continuous collection and analysis of data is also needed to detect cyber threats. The real time correlation of logs across all systems, applications and users is needed to ensure the reliability and security of the power grid. Solutions must also integrate well with identity management sources in order to prevent remote access account hijacking. Effective log management can be used to detect threats and reduce the risk of power outages. 1 fig.

  4. Aspects of a representation of quantum theory in terms of classical probability theory by means of integration in Hilbert space

    International Nuclear Information System (INIS)

    Bach, A.

    1981-01-01

    A representation of quantum mechanics in terms of classical probability theory by means of integration in Hilbert space is discussed. This formal hidden-variables representation is analysed in the context of impossibility proofs concerning hidden-variables theories. The structural analogy of this formulation of quantum theory with classical statistical mechanics is used to elucidate the difference between classical mechanics and quantum mechanics. (author)

  5. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  6. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  7. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  8. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  9. Integrative curriculum reform, domain dependent knowing, and teachers` epistemological theories: Implications for middle-level teaching

    Energy Technology Data Exchange (ETDEWEB)

    Powell, R.R. [Texas Tech Univ., Lubbock, TX (United States). College of Education

    1998-12-01

    Integrative curriculum as both a theoretical construct and a practical reality, and as a theme-based, problem-centered, democratic way of schooling, is becoming more widely considered as a feasible alternative to traditional middle-level curricula. Importantly for teaching and learning, domain dependence requires teachers to view one area of knowledge as fully interdependent with other areas of knowledge during the learning process. This requires teachers to adopt personal epistemological theories that reflect integrative, domain dependent knowing. This study explored what happened when teachers from highly traditional domain independent school settings encountered an ambitious college-level curriculum project that was designed to help the teachers understand the potential that integrative, domain dependent teaching holds for precollege settings. This study asked: What influence does an integrative, domain dependent curriculum project have on teachers` domain independent, epistemological theories for teaching and learning? Finding an answer to this question is essential if we, as an educational community, are to understand how integrative curriculum theory is transformed by teachers into systemic curriculum reform. The results suggest that the integrative curriculum project that teachers participated in did not explicitly alter their classroom practices in a wholesale manner. Personal epistemological theories of teachers collectively precluded teachers from making any wholesale changes in their individual classroom teaching. However, teachers became aware of integrative curriculum as an alternative, and they expressed interest in infusing integrative practices into their classrooms as opportunities arise.

  10. Rethinking Dabrowski's Theory: I. the Case against Primary Integration

    Science.gov (United States)

    Piechowski, Michael M.

    2014-01-01

    Some terms of Dabrowski's theory are misleading. The construct of level and the concepts of integration and disintegration mean different things. The concept of primary integration as a starting point for personality development is untenable in light of research on child development. In its place, Level I as a type of development that is…

  11. A modern theory of random variation with applications in stochastic calculus, financial mathematics, and Feynman integration

    CERN Document Server

    Muldowney, Patrick

    2012-01-01

    A Modern Theory of Random Variation is a new and radical re-formulation of the mathematical underpinnings of subjects as diverse as investment, communication engineering, and quantum mechanics. Setting aside the classical theory of probability measure spaces, the book utilizes a mathematically rigorous version of the theory of random variation that bases itself exclusively on finitely additive probability distribution functions. In place of twentieth century Lebesgue integration and measure theory, the author uses the simpler concept of Riemann sums, and the non-absolute Riemann-type integration of Henstock. Readers are supplied with an accessible approach to standard elements of probability theory such as the central limmit theorem and Brownian motion as well as remarkable, new results on Feynman diagrams and stochastic integrals. Throughout the book, detailed numerical demonstrations accompany the discussions of abstract mathematical theory, from the simplest elements of the subject to the most complex. I...

  12. A Bayesian Framework for False Belief Reasoning in Children: A Rational Integration of Theory-Theory and Simulation Theory.

    Science.gov (United States)

    Asakura, Nobuhiko; Inui, Toshio

    2016-01-01

    Two apparently contrasting theories have been proposed to account for the development of children's theory of mind (ToM): theory-theory and simulation theory. We present a Bayesian framework that rationally integrates both theories for false belief reasoning. This framework exploits two internal models for predicting the belief states of others: one of self and one of others. These internal models are responsible for simulation-based and theory-based reasoning, respectively. The framework further takes into account empirical studies of a developmental ToM scale (e.g., Wellman and Liu, 2004): developmental progressions of various mental state understandings leading up to false belief understanding. By representing the internal models and their interactions as a causal Bayesian network, we formalize the model of children's false belief reasoning as probabilistic computations on the Bayesian network. This model probabilistically weighs and combines the two internal models and predicts children's false belief ability as a multiplicative effect of their early-developed abilities to understand the mental concepts of diverse beliefs and knowledge access. Specifically, the model predicts that children's proportion of correct responses on a false belief task can be closely approximated as the product of their proportions correct on the diverse belief and knowledge access tasks. To validate this prediction, we illustrate that our model provides good fits to a variety of ToM scale data for preschool children. We discuss the implications and extensions of our model for a deeper understanding of developmental progressions of children's ToM abilities.

  13. Integrable model of Yang-Mills theory and quasi-instantons

    International Nuclear Information System (INIS)

    Yatsun, V.A.

    1986-01-01

    Within the framework of Euclidean conformal invariant Yang-Mills theory with a scalar field, a two-dimensional Hamiltonian system integrable for a definite relation between the coupling constants is considered. A particular solution of the Hamilton-Jacobi equation leads to a system of first-order equations providing a nonself-dual instanton-like solution of the model concerned. As a generalizationof the system, a quasi-self-duality equation is suggested which is integrated by means of the 't Hooft ansatz and results in quasi-self-dual instantons (quasi-instantons). (orig.)

  14. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  15. Failure causes fear: the effect of self-esteem threat on death-anxiety.

    Science.gov (United States)

    Routledge, Clay

    2012-01-01

    According to terror management theory (TMT; Greenberg, Pyszczynski, 1986), self-esteem protects people from anxiety associated with the knowledge of certain mortality. A number of studies provide evidence consistent with this assertion, but no studies have experimentally examined the effect of threatened self-esteem on death-anxiety. In the current study, self-esteem was manipulated and death-anxiety measured. A self-esteem threat increased death-anxiety relative to a self-esteem boost and non-self threat control condition.

  16. Open pre-schools at integrated health services - A program theory

    Directory of Open Access Journals (Sweden)

    Agneta Abrahamsson

    2013-04-01

    Full Text Available Introduction: Family centres in Sweden are integrated services that reach all prospective parents and parents with children up to their sixth year, because of the co-location of the health service with the social service and the open pre-school. The personnel on the multi-professional site work together to meet the needs of the target group. The article explores a program theory focused on the open pre-schools at family centres.Method: A multi-case design is used and the sample consists of open pre-schools at six family centres. The hypothesis is based on previous research and evaluation data. It guides the data collection which is collected and analysed stepwise. Both parents and personnel are interviewed individually and in groups at each centre.Findings: The hypothesis was expanded to a program theory. The compliance of the professionals was the most significant element that explained why the open access service facilitated positive parenting. The professionals act in a compliant manner to meet the needs of the children and parents as well as in creating good conditions for social networking and learning amongst the parents. Conclusion: The compliance of the professionals in this program theory of open pre-schools at family centres can be a standard in integrated and open access services, whereas the organisation form can vary. The best way of increasing the number of integrative services is to support and encourage professionals that prefer to work in a compliant manner.

  17. Open pre-schools at integrated health services - A program theory

    Directory of Open Access Journals (Sweden)

    Agneta Abrahamsson

    2013-04-01

    Full Text Available Introduction: Family centres in Sweden are integrated services that reach all prospective parents and parents with children up to their sixth year, because of the co-location of the health service with the social service and the open pre-school. The personnel on the multi-professional site work together to meet the needs of the target group. The article explores a program theory focused on the open pre-schools at family centres. Method: A multi-case design is used and the sample consists of open pre-schools at six family centres. The hypothesis is based on previous research and evaluation data. It guides the data collection which is collected and analysed stepwise. Both parents and personnel are interviewed individually and in groups at each centre. Findings: The hypothesis was expanded to a program theory. The compliance of the professionals was the most significant element that explained why the open access service facilitated positive parenting. The professionals act in a compliant manner to meet the needs of the children and parents as well as in creating good conditions for social networking and learning amongst the parents. Conclusion: The compliance of the professionals in this program theory of open pre-schools at family centres can be a standard in integrated and open access services, whereas the organisation form can vary. The best way of increasing the number of integrative services is to support and encourage professionals that prefer to work in a compliant manner.

  18. An Integrated Theory of Whole Number and Fractions Development

    Science.gov (United States)

    Siegler, Robert S.; Thompson, Clarissa A.; Schneider, Michael

    2011-01-01

    This article proposes an integrated theory of acquisition of knowledge about whole numbers and fractions. Although whole numbers and fractions differ in many ways that influence their development, an important commonality is the centrality of knowledge of numerical magnitudes in overall understanding. The present findings with 11- and 13-year-olds…

  19. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  20. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  1. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  2. Towards an expansive hybrid psychology: integrating theories of the mediated mind.

    Science.gov (United States)

    Brinkmann, Svend

    2011-03-01

    This article develops an integrative theory of the mind by examining how the mind, understood as a set of skills and dispositions, depends upon four sources of mediators. Harré's hybrid psychology is taken as a meta-theoretical starting point, but is expanded significantly by including the four sources of mediators that are the brain, the body, social practices and technological artefacts. It is argued that the mind is normative in the sense that mental processes do not simply happen, but can be done more or less well, and thus are subject to normative appraisal. The expanded hybrid psychology is meant to assist in integrating theoretical perspectives and research interests that are often thought of as incompatible, among them neuroscience, phenomenology of the body, social practice theory and technology studies. A main point of the article is that these perspectives each are necessary for an integrative approach to the human mind.

  3. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Directory of Open Access Journals (Sweden)

    Bettina J Casad

    2016-01-01

    Full Text Available Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  4. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Science.gov (United States)

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681

  5. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.

    Science.gov (United States)

    Casad, Bettina J; Bryant, William J

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  6. Integrated landscape approach : Closing the gap between theory and application

    NARCIS (Netherlands)

    Bürgi, Matthias; Ali, Panna; Chowdhury, Afroza; Heinimann, Andreas; Hett, Cornelia; Kienast, Felix; Mondal, Manoranjan Kumar; Upreti, Bishnu Raj; Verburg, Peter H.

    2017-01-01

    Recently, the integrated landscape approach has gained increasing interest of the scientific community, as well as of organizations active in the field of sustainable development. However, the enthusiastic welcome is challenged by little consensus on theory, terminology and definitions. Moreover,

  7. Integrating and Analyzing Psychosocial and Stage Theories To Challenge the Development of the Injured Collegiate Athlete.

    Science.gov (United States)

    Harris, Laura L.

    2003-01-01

    Integrated a psychosocial developmental theory (the Kubler-Ross Stage Theory) and a psychological stage theory (the Ross Stage Theory) and a psychological stage theory (the Chickering and Reisser psychosocial and developmental theory) for challenging injured collegiate student-athletes' personal development. A search of online databases from…

  8. Entanglement entropy in integrable field theories with line defects II. Non-topological defect

    Science.gov (United States)

    Jiang, Yunfeng

    2017-08-01

    This is the second part of two papers where we study the effect of integrable line defects on bipartite entanglement entropy in integrable field theories. In this paper, we consider non-topological line defects in Ising field theory. We derive an infinite series expression for the entanglement entropy and show that both the UV and IR limits of the bulk entanglement entropy are modified by the line defect. In the UV limit, we give an infinite series expression for the coefficient in front of the logarithmic divergence and the exact defect g-function. By tuning the defect to be purely transmissive and reflective, we recover correctly the entanglement entropy of the bulk and with integrable boundary respectively.

  9. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  10. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  11. The full integration of black hole solutions to symmetric supergravity theories

    Energy Technology Data Exchange (ETDEWEB)

    Chemissany, W., E-mail: wissam.chemissany@uleth.c [University of Lethbridge, Physics Department, Lethbridge Alberta, T1K 3M4 (Canada); Rosseel, J., E-mail: rosseel@to.infn.i [Dipartimento di Fisica Teorica, Universita di Torino and INFN-Sezione di Torino, Via P. Giuria 1, I-10125 Torino (Italy); Trigiante, M., E-mail: mario.trigiante@polito.i [Dipartimento di Fisica Politecnico di Torino, C.so Duca degli Abruzzi, 24, I-10129 Torino (Italy); Van Riet, T., E-mail: thomas.vanriet@fysast.uu.s [Institutionen foer Fysik och Astronomi, Box 803, SE-751 08 Uppsala (Sweden)

    2010-05-11

    We prove that all stationary and spherical symmetric black hole solutions to theories with symmetric target spaces are integrable and we provide an explicit integration method. This exact integration is based on the description of black hole solutions as geodesic curves on the moduli space of the theory when reduced over the time-like direction. These geodesic equations of motion can be rewritten as a specific Lax pair equation for which mathematicians have provided the integration algorithms when the initial conditions are described by a diagonalizable Lax matrix. On the other hand, solutions described by nilpotent Lax matrices, which originate from extremal regular (small) D=4 black holes can be obtained as suitable limits of solutions obtained in the diagonalizable case, as we show on the generating geodesic (i.e. most general geodesic modulo global symmetries of the D=3 model) corresponding to regular (and small) D=4 black holes. As a byproduct of our analysis we give the explicit form of the 'Wick rotation' connecting the orbits of BPS and non-BPS solutions in maximally supersymmetric supergravity and its STU truncation.

  12. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  13. The influence of stereotype threat on immigrants: review and meta-analysis

    Science.gov (United States)

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  14. The Influence of Stereotype Threat on Immigrants: Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Markus eAppel

    2015-07-01

    Full Text Available In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of .63 (random effects model in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research, cultural context (US vs. Europe, age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed.

  15. A Theory of State Behavior under Threat: The Tragedy of Domestic Realism

    Science.gov (United States)

    2007-03-01

    he does not experience shame or guilt in the destruction of a village: rather he feels pride or shame depending on how well he has performed the...the virtues of democracy without qualification and frame it as the ultimate panacea , argues that democracy under threat is not immaculate and that

  16. Negotiable Collateral Damage: Civil Liberties Versus National Security in Times of Threat

    Science.gov (United States)

    2011-06-01

    concept of defense. In his influential work, ―A Theory of Human Motivation,‖ published in 1943, Maslow theorized five hierarchical types of needs...rarely changes due to threats to national security; thus, this study does not reference this issue. 7 A. H. Maslow , "A Theory of Human Motivation...Americans living in the Pacific region of the United States. 52 Abraham Lincoln and Thomas Harry

  17. Scale relativity theory and integrative systems biology: 2. Macroscopic quantum-type mechanics.

    Science.gov (United States)

    Nottale, Laurent; Auffray, Charles

    2008-05-01

    In these two companion papers, we provide an overview and a brief history of the multiple roots, current developments and recent advances of integrative systems biology and identify multiscale integration as its grand challenge. Then we introduce the fundamental principles and the successive steps that have been followed in the construction of the scale relativity theory, which aims at describing the effects of a non-differentiable and fractal (i.e., explicitly scale dependent) geometry of space-time. The first paper of this series was devoted, in this new framework, to the construction from first principles of scale laws of increasing complexity, and to the discussion of some tentative applications of these laws to biological systems. In this second review and perspective paper, we describe the effects induced by the internal fractal structures of trajectories on motion in standard space. Their main consequence is the transformation of classical dynamics into a generalized, quantum-like self-organized dynamics. A Schrödinger-type equation is derived as an integral of the geodesic equation in a fractal space. We then indicate how gauge fields can be constructed from a geometric re-interpretation of gauge transformations as scale transformations in fractal space-time. Finally, we introduce a new tentative development of the theory, in which quantum laws would hold also in scale space, introducing complexergy as a measure of organizational complexity. Initial possible applications of this extended framework to the processes of morphogenesis and the emergence of prokaryotic and eukaryotic cellular structures are discussed. Having founded elements of the evolutionary, developmental, biochemical and cellular theories on the first principles of scale relativity theory, we introduce proposals for the construction of an integrative theory of life and for the design and implementation of novel macroscopic quantum-type experiments and devices, and discuss their potential

  18. Becoming who you are: An integrative review of self-determination theory and personality systems interactions theory.

    Science.gov (United States)

    Koole, Sander L; Schlinkert, Caroline; Maldei, Tobias; Baumann, Nicola

    2018-03-10

    One of the enduring missions of personality science is to unravel what it takes to become a fully functioning person. In the present article, the authors address this matter from the perspectives of self-determination theory (SDT) and personality systems interactions (PSI) theory. SDT (a) is rooted in humanistic psychology; (b) has emphasized a first-person perspective on motivation and personality; (c) posits that the person, supported by the social environment, naturally moves toward growth through the satisfaction of basic psychological needs for autonomy, competence, and relatedness. PSI theory (a) is rooted in German volition psychology; (b) has emphasized a third-person perspective on motivation and personality; and (c) posits that a fully functioning person can form and enact difficult intentions and integrate new experiences, and that such competencies are facilitated by affect regulation. The authors review empirical support for SDT and PSI theory, their convergences and divergences, and how the theories bear on recent empirical research on internalization, vitality, and achievement flow. The authors conclude that SDT and PSI theory offer complementary insights into developing a person's full potential. © 2018 The Authors. Journal of Personality Published by Wiley Periodicals, Inc.

  19. Existential and psychological problems connected with Threat Predicting Process

    Directory of Open Access Journals (Sweden)

    Mamcarz Piotr

    2014-01-01

    Full Text Available The aim of the article is to present a very important phenomenon affecting human integrity and homeostasis that is Threat Prediction Process. This process can be defined as “experiencing apprehension concerning results of potential/ actual dangers,” (Mamcarz, 2015 oscillating in terminological area of anxiety, fear, stress, restlessness. Moreover, it highlights a cognitive process distinctive for listed phenomenon’s. The process accompanied with technological and organization changes increases number of health problems affecting many populations. Hard work conditions; changing life style; or many social and political threats have influence on people’s quality of life that are even greater and more dangerous than physical and psychological factors, which, in turn, have much more consequences for human normal functioning. The present article is based on chosen case studies of a qualitative analysis of threat prediction process

  20. The Dynamics of Opportunity and Threat Management in Turbulent Environments: The Role of Information Technologies

    Science.gov (United States)

    Park, Young Ki

    2011-01-01

    This study explains the role of information technologies in enabling organizations to successfully sense and manage opportunities and threats and achieve competitive advantage in turbulent environments. I use two approaches, a set-theoretic configurational theory approach and a variance theory approach, which are theoretically and methodologically…

  1. A general enhancement of autonomic and cortisol responses during social evaluative threat

    NARCIS (Netherlands)

    van den Bosch, J.A.; de Geus, E.J.C.; Carroll, D.; Goedhart, A.D.; Anane, L.A.; van Zanten, J.J.; Helmerhorst, E.J.; Edwards, K.M.

    2009-01-01

    Objective: To examine the Social Self Preservation Theory, which predicts that stressors involving social evaluative threat (SET) characteristically activate the hypothalamic-pituitary-adrenal (HPA) axis. The idea that distinct psychosocial factors may underlie specific patterns of neuroendocrine

  2. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  3. An integrated theory of prospective time interval estimation : The role of cognition, attention, and learning

    NARCIS (Netherlands)

    Taatgen, Niels A.; van Rijn, Hedderik; Anderson, John

    A theory of prospective time perception is introduced and incorporated as a module in an integrated theory of cognition, thereby extending existing theories and allowing predictions about attention and learning. First, a time perception module is established by fitting existing datasets (interval

  4. When mere exposure leads to less liking: the incremental threat effect in intergroup contexts.

    Science.gov (United States)

    Crisp, Richard J; Hutter, Russell R C; Young, Bryony

    2009-02-01

    In two experiments we tested the hypothesis that repeated exposure to out-group-relevant attitude objects would lead to less liking following a threat to identity. In Experiment 1 exposure to abstract artwork ostensibly created by a member of an out-group university led to more liking under baseline conditions, but not following a manipulation of threat. In Experiment 2 we observed a negative relationship between exposure and liking following threat: liking reversed the typical mere exposure effect. Reported emotion mediated the interactive effect of threat and exposure on liking. These findings illustrate how social identity threat can be experienced incrementally as a function of exposure. We discuss the findings in the context of an integration of research on exposure, identity, attitudes, and contact.

  5. Particle connectedness and cluster formation in sequential depositions of particles: integral-equation theory.

    Science.gov (United States)

    Danwanichakul, Panu; Glandt, Eduardo D

    2004-11-15

    We applied the integral-equation theory to the connectedness problem. The method originally applied to the study of continuum percolation in various equilibrium systems was modified for our sequential quenching model, a particular limit of an irreversible adsorption. The development of the theory based on the (quenched-annealed) binary-mixture approximation includes the Ornstein-Zernike equation, the Percus-Yevick closure, and an additional term involving the three-body connectedness function. This function is simplified by introducing a Kirkwood-like superposition approximation. We studied the three-dimensional (3D) system of randomly placed spheres and 2D systems of square-well particles, both with a narrow and with a wide well. The results from our integral-equation theory are in good accordance with simulation results within a certain range of densities.

  6. Surgical education and adult learning: Integrating theory into practice [version 1; referees: 3 approved

    Directory of Open Access Journals (Sweden)

    Prem Rashid

    2017-02-01

    Full Text Available Surgical education continues to evolve from the master-apprentice model. Newer methods of the process need to be used to manage the dual challenges of educating while providing safe surgical care. This requires integrating adult learning concepts into delivery of practical training and education in busy clinical environments. A narrative review aimed at outlining and integrating adult learning and surgical education theory was undertaken. Additionally, this information was used to relate the practical delivery of surgical training and education in day-to-day surgical practice. Concepts were sourced from reference material. Additional material was found using a PubMed search of the words: ‘surgical education theory’ and ‘adult learning theory medical’. This yielded 1351 abstracts, of which 43 articles with a focus on key concepts in adult education theory were used. Key papers were used to formulate structure and additional cross-referenced papers were included where appropriate. Current concepts within adult learning have a lot to offer when considering how to better deliver surgical education and training. Better integration of adult learning theory can be fruitful. Individual teaching surgical units need to rethink their paradigms and consider how each individual can contribute to the education experience. Up skilling courses for trainers can do much to improve the delivery of surgical education. Understanding adult learning concepts and integrating these into day-to-day teaching can be valuable.

  7. Non-integrability of the Armbruster-Guckenheimer-Kim quartic Hamiltonian through Morales-Ramis theory

    OpenAIRE

    Acosta-Humánez, P.; Alvarez-Ramírez, M.; Stuchi, T.

    2017-01-01

    We show the non-integrability of the three-parameter Armburster-Guckenheimer-Kim quartic Hamiltonian using Morales-Ramis theory, with the exception of the three already known integrable cases. We use Poincar\\'e sections to illustrate the breakdown of regular motion for some parameter values.

  8. Integrating Social Class into Vocational Psychology: Theory and Practice Implications

    Science.gov (United States)

    Diemer, Matthew A.; Ali, Saba Rasheed

    2009-01-01

    Although social class plays a salient and significant role in career development and occupational attainment, social class is underrepresented in vocational psychology theory, scholarship, and practice. Vocational psychologists are in a unique position to meet the career development needs of persons from all social classes by integrating a fuller…

  9. Potential theory, path integrals and the Laplacian of the indicator

    NARCIS (Netherlands)

    R.-J. Lange (Rutger-Jan)

    2012-01-01

    markdownabstractThis paper links the field of potential theory — i.e. the Dirichlet and Neumann problems for the heat and Laplace equation — to that of the Feynman path integral, by postulating the some seemingly ill-defined potential. The Laplacian of the indicator can be interpreted using the

  10. Surface charge algebra in gauge theories and thermodynamic integrability

    International Nuclear Information System (INIS)

    Barnich, Glenn; Compere, Geoffrey

    2008-01-01

    Surface charges and their algebra in interacting Lagrangian gauge field theories are constructed out of the underlying linearized theory using techniques from the variational calculus. In the case of exact solutions and symmetries, the surface charges are interpreted as a Pfaff system. Integrability is governed by Frobenius' theorem and the charges associated with the derived symmetry algebra are shown to vanish. In the asymptotic context, we provide a generalized covariant derivation of the result that the representation of the asymptotic symmetry algebra through charges may be centrally extended. Comparison with Hamiltonian and covariant phase space methods is made. All approaches are shown to agree for exact solutions and symmetries while there are differences in the asymptotic context

  11. Authoritarianism, conservatism, racial diversity threat, and the state distribution of hate groups.

    Science.gov (United States)

    McCann, Stewart J H

    2010-01-01

    On the basis of K. Stenner's (2005) authoritarian dynamic theory, the author hypothesized that there is an interaction between U.S. state conservatism-liberalism and state racial heterogeneity threat, such that greater diversity threat tends to be associated with more hate groups in more conservative states and fewer hate groups in more liberal states. State aggregates of the conservative-liberal ideological preferences of 141,798 participants from 122 CBS News/New York Times national telephone polls conducted between 1976 and 1988 (R. S. Erikson, G. C. Wright, & J. P. McIver, 1993) served as proxies for authoritarian-nonauthoritarian dispositions. For the 47 states with complete data, the hypothesized interaction was tested for 2000, 2005, and 2006 with hierarchical multiple regression strategies and supported. The author's hypothesis was also affirmed with SES and the interaction of SES and diversity threat controlled for. In contrast, SES entirely accounted for simple relationships between threat and hate group frequency.

  12. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment.

  13. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    International Nuclear Information System (INIS)

    Suh, Young A; Yim, Man-Sung

    2016-01-01

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment

  14. Detection of vapor-phase organophosphate threats using wearable conformable integrated epidermal and textile wireless biosensor systems.

    Science.gov (United States)

    Mishra, Rupesh K; Martín, Aida; Nakagawa, Tatsuo; Barfidokht, Abbas; Lu, Xialong; Sempionatto, Juliane R; Lyu, Kay Mengjia; Karajic, Aleksandar; Musameh, Mustafa M; Kyratzis, Ilias L; Wang, Joseph

    2018-03-15

    Flexible epidermal tattoo and textile-based electrochemical biosensors have been developed for vapor-phase detection of organophosphorus (OP) nerve agents. These new wearable sensors, based on stretchable organophosphorus hydrolase (OPH) enzyme electrodes, are coupled with a fully integrated conformal flexible electronic interface that offers rapid and selective square-wave voltammetric detection of OP vapor threats and wireless data transmission to a mobile device. The epidermal tattoo and textile sensors display a good reproducibility (with RSD of 2.5% and 4.2%, respectively), along with good discrimination against potential interferences and linearity over the 90-300mg/L range, with a sensitivity of 10.7µA∙cm 3 ∙mg -1 (R 2 = 0.983) and detection limit of 12mg/L in terms of OP air density. Stress-enduring inks, used for printing the electrode transducers, ensure resilience against mechanical deformations associated with textile and skin-based on-body sensing operations. Theoretical simulations are used to estimate the OP air density over the sensor surface. These fully integrated wearable wireless tattoo and textile-based nerve-agent vapor biosensor systems offer considerable promise for rapid warning regarding personal exposure to OP nerve-agent vapors in variety of decentralized security applications. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. An Integrated Approach of Erikson’s Psychosocial Theory and Adlerian Counseling

    OpenAIRE

    Çelik, Bekir; Ergün, Enes

    2016-01-01

    This study aims to integrate Erikson’s psychosocial theory and Adler’s individual psychology. Adler and Erikson have complimentary descriptions of personality and they both view mankind as a social being in nature, having a desire to belong and motivated for significance in their social environment in order to handle with inferiority. The integration also suggests that four main areas should be taken in consideration during the counseling process: work, friendship, sexual love, and optimism. ...

  16. Balance of threat: The domestic insecurity of Vladimir Putin

    Directory of Open Access Journals (Sweden)

    Robert Person

    2017-01-01

    Full Text Available During the 17 years that Vladimir Putin has ruled Russia, the country has become increasingly authoritarian. However, I argue that this rollback of democracy has not been motivated by Putin's blind desire to maximize his political power, as many have assumed. Rather, his anti-democratic policies have responded to perceived specific threats to his control. In applying theories originally developed in the field of international relations to individual leaders, we can understand Putin as a “defensive realist” who balances against threats in order to maintain security rather than maximize power. This is an essential distinction that produces important conclusions about what motives lie behind the increasingly authoritarian character of the Russian state and gives insights into the possible future trajectory of the regime.

  17. Framework for Analyzing the Future Threat of WMD Terrorism

    Directory of Open Access Journals (Sweden)

    James J.F. Forest

    2012-01-01

    Full Text Available This article examines theories of practical and strategic constraints that collectively explain why so few terrorist groups in history have crossed (or attempted to cross the WMD threshold. From this analysis, it becomes clear that a terrorist group's deliberations about WMD can be influenced (positively or negatively by a variety of factors. Our projections of the future WMD terrorism threat must therefore account for changes in the kinds of practical and strategic constraints that could lead to an increased willingness and/or capability of a group to pursue these kinds of weapons. Further, there are ways in which governments can influence a terrorist group's decision-making and thus have a direct impact on the future evolution of the WMD terrorism threat.

  18. The method of finite-gap integration in classical and semi-classical string theory

    International Nuclear Information System (INIS)

    Vicedo, Benoit

    2011-01-01

    In view of proving the AdS/CFT correspondence one day, a deeper understanding of string theory on certain curved backgrounds such as AdS 5 x S 5 is required. In this review we make a step in this direction by focusing on RxS 3 . It was discovered in recent years that string theory on AdS 5 x S 5 admits a Lax formulation. However, the complete statement of integrability requires not only the existence of a Lax formulation but also that the resulting integrals of motion are in pairwise involution. This idea is central to the first part of this review. Exploiting this integrability we apply algebro-geometric methods to string theory on RxS 3 and obtain the general finite-gap solution. The construction is based on an invariant algebraic curve previously found in the AdS 5 x S 5 case. However, encoding the dynamics of the solution requires specification of additional marked points. By restricting the symplectic structure of the string to these algebro-geometric data we derive the action-angle variables of the system. We then perform a first-principle semiclassical quantization of string theory on RxS 3 as a toy model for strings on AdS 5 x S 5 . The result is exactly what one expects from the dual gauge theory perspective, namely the underlying algebraic curve discretizes in a natural way. We also derive a general formula for the fluctuation energies around the generic finite-gap solution. The ideas used can be generalized to AdS 5 x S 5 . (review)

  19. Empirical data and moral theory. A plea for integrated empirical ethics.

    Science.gov (United States)

    Molewijk, Bert; Stiggelbout, Anne M; Otten, Wilma; Dupuis, Heleen M; Kievit, Job

    2004-01-01

    Ethicists differ considerably in their reasons for using empirical data. This paper presents a brief overview of four traditional approaches to the use of empirical data: "the prescriptive applied ethicists," "the theorists," "the critical applied ethicists," and "the particularists." The main aim of this paper is to introduce a fifth approach of more recent date (i.e. "integrated empirical ethics") and to offer some methodological directives for research in integrated empirical ethics. All five approaches are presented in a table for heuristic purposes. The table consists of eight columns: "view on distinction descriptive-prescriptive sciences," "location of moral authority," "central goal(s)," "types of normativity," "use of empirical data," "method," "interaction empirical data and moral theory," and "cooperation with descriptive sciences." Ethicists can use the table in order to identify their own approach. Reflection on these issues prior to starting research in empirical ethics should lead to harmonization of the different scientific disciplines and effective planning of the final research design. Integrated empirical ethics (IEE) refers to studies in which ethicists and descriptive scientists cooperate together continuously and intensively. Both disciplines try to integrate moral theory and empirical data in order to reach a normative conclusion with respect to a specific social practice. IEE is not wholly prescriptive or wholly descriptive since IEE assumes an interdepence between facts and values and between the empirical and the normative. The paper ends with three suggestions for consideration on some of the future challenges of integrated empirical ethics.

  20. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  1. An Integrated Theory of Prospective Time Interval Estimation: The Role of Cognition, Attention, and Learning

    Science.gov (United States)

    Taatgen, Niels A.; van Rijn, Hedderik; Anderson, John

    2007-01-01

    A theory of prospective time perception is introduced and incorporated as a module in an integrated theory of cognition, thereby extending existing theories and allowing predictions about attention and learning. First, a time perception module is established by fitting existing datasets (interval estimation and bisection and impact of secondary…

  2. Master equations and the theory of stochastic path integrals

    Science.gov (United States)

    Weber, Markus F.; Frey, Erwin

    2017-04-01

    them. Upon expanding the forward and the backward path integrals around stationary paths, we then discuss and extend a recent method for the computation of rare event probabilities. Besides, we also derive path integral representations for processes with continuous state spaces whose forward and backward master equations admit Kramers-Moyal expansions. A truncation of the backward expansion at the level of a diffusion approximation recovers a classic path integral representation of the (backward) Fokker-Planck equation. One can rewrite this path integral in terms of an Onsager-Machlup function and, for purely diffusive Brownian motion, it simplifies to the path integral of Wiener. To make this review accessible to a broad community, we have used the language of probability theory rather than quantum (field) theory and do not assume any knowledge of the latter. The probabilistic structures underpinning various technical concepts, such as coherent states, the Doi-shift, and normal-ordered observables, are thereby made explicit.

  3. Master equations and the theory of stochastic path integrals.

    Science.gov (United States)

    Weber, Markus F; Frey, Erwin

    2017-04-01

    expanding the forward and the backward path integrals around stationary paths, we then discuss and extend a recent method for the computation of rare event probabilities. Besides, we also derive path integral representations for processes with continuous state spaces whose forward and backward master equations admit Kramers-Moyal expansions. A truncation of the backward expansion at the level of a diffusion approximation recovers a classic path integral representation of the (backward) Fokker-Planck equation. One can rewrite this path integral in terms of an Onsager-Machlup function and, for purely diffusive Brownian motion, it simplifies to the path integral of Wiener. To make this review accessible to a broad community, we have used the language of probability theory rather than quantum (field) theory and do not assume any knowledge of the latter. The probabilistic structures underpinning various technical concepts, such as coherent states, the Doi-shift, and normal-ordered observables, are thereby made explicit.

  4. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  5. Classically integrable boundary conditions for affine Toda field theories

    International Nuclear Information System (INIS)

    Bowcock, P.; Corrigan, E.; Dorey, P.E.; Rietdijk, R.H.

    1995-01-01

    Boundary conditions compatible with classical integrability are studied both directly, using an approach based on the explicit construction of conserved quantities, and indirectly by first developing a generalisation of the Lax pair idea. The latter approach is closer to the spirit of earlier work by Sklyanin and yields a complete set of conjectures for permissible boundary conditions for any affine Toda field theory. (orig.)

  6. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  7. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  8. Does self-threat promote social connection? The role of self-esteem and contingencies of self-worth.

    Science.gov (United States)

    Park, Lora E; Maner, Jon K

    2009-01-01

    Six studies examined the social motivations of people with high self-esteem (HSE) and low self-esteem (LSE) following a threat to a domain of contingent self-worth. Whether people desired social contact following self-threat depended on an interaction between an individual's trait self-esteem and contingencies of self-worth. HSE participants who strongly based self-worth on appearance sought to connect with close others following a threat to their physical attractiveness. LSE participants who staked self-worth on appearance wanted to avoid social contact and, instead, preferred a less interpersonally risky way of coping with self-threat (wanting to enhance their physical attractiveness). Implications for theories of self-esteem, motivation, and interpersonal processes are discussed.

  9. An integral approach to town planning: lessons from personal construct theory, part 1

    OpenAIRE

    A Jackson

    1986-01-01

    Personal construct theory is introduced as an all-embracing philosophy which provides a consistent framework for integrating different notions about the planning process. The implication is that 'man-the-planner' does not necessarily have constructs which are better, more accurate, or more predictive than his subject, 'man-the-planned'. Policies can be seen as theories, in which case they should be clearly expressed as such. The theory and its methodology have been used in an empirical invest...

  10. Integrated tracking, classification, and sensor management theory and applications

    CERN Document Server

    Krishnamurthy, Vikram; Vo, Ba-Ngu

    2012-01-01

    A unique guide to the state of the art of tracking, classification, and sensor management. This book addresses the tremendous progress made over the last few decades in algorithm development and mathematical analysis for filtering, multi-target multi-sensor tracking, sensor management and control, and target classification. It provides for the first time an integrated treatment of these advanced topics, complete with careful mathematical formulation, clear description of the theory, and real-world applications. Written by experts in the field, Integrated Tracking, Classification, and Sensor Management provides readers with easy access to key Bayesian modeling and filtering methods, multi-target tracking approaches, target classification procedures, and large scale sensor management problem-solving techniques.

  11. Of Syntheses and Surprises: Toward a Critical Integral Theory

    Directory of Open Access Journals (Sweden)

    Daniel Gustav Anderson

    2006-12-01

    Full Text Available The central concern of this article is how the search for formal structures with universal values functions ideologically, addressing Zizek’s claim that East-West syntheses may represent the dominant ideology par excellance of global capitalism. To this end, the article offers a Foucaultian genealogy of Integral theory, tracing its origins to the cultural and subjective contingencies of the British Empire, primarily in the work of Integral theory’s foundational thinker, Aurobindo Ghose. The article poses a primary critique of synthesis and evolution as mythological keys to Ultimate Reality which suggests that Zizek’s critique may have some validity, and offers the potential for a “critical integral theory” as an alternative. Situated in Deleuze and Guattari’s concept of becoming, and represented in the ideas and practices of a constellation of thinkers inclusive of Gurdjieff, Benjamin, and Trungpa, the article’s view of integration supports radical democracy as presented in the writings of Laclau and Mouffe as a model outcome for social and personal transformational practices.

  12. Of Syntheses and Surprises:Toward a Critical Integral Theory

    Directory of Open Access Journals (Sweden)

    Daniel Gustav Anderson

    2006-12-01

    Full Text Available The central concern of this article is how the search for formal structures with universal values functions ideologically, addressing Zizek’s claim that East-West syntheses may represent the dominant ideology par excellance of global capitalism. To this end, the article offers a Foucaultian genealogy of Integral theory, tracing its origins to the cultural and subjective contingencies of the British Empire, primarily in the work of Integral theory’s foundational thinker, Aurobindo Ghose. The article poses a primary critique of synthesis and evolution as mythological keys to Ultimate Reality which suggests that Zizek’s critique may have some validity, and offers the potential for a “critical integral theory” as an alternative. Situated in Deleuze and Guattari’s concept of becoming, and represented in the ideas and practices of a constellation of thinkers inclusive of Gurdjieff, Benjamin, and Trungpa, the article’s view of integration supports radical democracy as presented in the writings of Laclau and Mouffe as a model outcome for social and personal transformational practices.

  13. Feature confirmation in object perception: Feature integration theory 26 years on from the Treisman Bartlett lecture.

    Science.gov (United States)

    Humphreys, Glyn W

    2016-10-01

    The Treisman Bartlett lecture, reported in the Quarterly Journal of Experimental Psychology in 1988, provided a major overview of the feature integration theory of attention. This has continued to be a dominant account of human visual attention to this day. The current paper provides a summary of the work reported in the lecture and an update on critical aspects of the theory as applied to visual object perception. The paper highlights the emergence of findings that pose significant challenges to the theory and which suggest that revisions are required that allow for (a) several rather than a single form of feature integration, (b) some forms of feature integration to operate preattentively, (c) stored knowledge about single objects and interactions between objects to modulate perceptual integration, (d) the application of feature-based inhibition to object files where visual features are specified, which generates feature-based spreading suppression and scene segmentation, and (e) a role for attention in feature confirmation rather than feature integration in visual selection. A feature confirmation account of attention in object perception is outlined.

  14. BOOK REVIEW - Adrian Liviu Ivan, Teorii și practice ale integrării europene [Theories and Practices of European Integration

    Directory of Open Access Journals (Sweden)

    Adrian Daniel STAN

    2016-06-01

    Full Text Available Teorii și practice ale integrării europene [Theories and Practices of European Integration] is a genuine contribution to understanding how the European Union’s particular character has been adjusted in more than half of century of institutional growth and development. Professor Ivan`s key argument for this book is that the European Union has been shaped as a functional project taking into consideration the diverse heritage and traditions of its Member States. The opening chapter of this book focuses on the particularities of international relations discipline after the Second World War in order to introduce the theme of European Integration Process. This chapter must be analysed in a series of contributions dedicated to the European Integration process and to the theories that made this integration possible because professor Ivan has previously published books such as: Statele Unite ale Europei [The United States of Europe], Sub zodia Statelor Unite ale Europei [Under the Sign of the United States of Europe], in which he debates the origins of the European construction and brings forward arguments to support the importance of each theoretical and functional pillar of this “Common European Project”.

  15. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  16. Chinese Perceptions of Traditional and Nontraditional Security Threats

    Science.gov (United States)

    2007-03-01

    will not be challenged.) For example, during a speech in Singapore in June 2005, the U.S. Secretary of Defense Donald Rumsfeld expressed the belief ...right answer. The individual is paramount and is in control of events around him. Easterners, on the other hand, products of the teachings of Taoism ...seen as American scholars who refute the China threat theory. Their belief in power politics supports the perception that America’s goal is hegemony

  17. Optical propagators in vector and spinor theories by path integral formalism

    International Nuclear Information System (INIS)

    Linares, J.

    1993-01-01

    The construction of an extended parabolic (wide-angle) vector and spinor wave theory is presented. For that, optical propagators in monochromatic vector light optics and monoenergetic spinor electron optics are evaluated by the path integral formalism. The auxiliary parameter method introduced by Fock and the Feynman-Dyson perturbative series are used. The proposed theory supplies, by a generalized Fermat's principle, the Mukunda-Simon-Sudarshan transformation for the passage from scalar to vector light (or spinor electron) optics in an asymptotic approximation. (author). 19 refs

  18. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness.

    Science.gov (United States)

    Bedyńska, Sylwia; Krejtz, Izabela; Sedek, Grzegorz

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement - namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed.

  19. Practitioners' Perspectives on the Application of Integration Theory in the Saudi EFL Context

    Science.gov (United States)

    Almalki, Mansoor S.; Soomro, Abdul Fattah

    2017-01-01

    There is a close connection between reading and writing. Several studies suggest integrating reading in the instruction of teaching writing skills to English as a Foreign Language (EFL) learner. This study seeks to determine the extent Saudi EFL teachers support, apply and understand the theory of integration between reading and writing. To…

  20. Can threat information bias fear learning? : Some tentative results and methodological considerations

    NARCIS (Netherlands)

    Mertens, G.; De Houwer, J.

    2017-01-01

    Whereas it is widely recognized that both verbal threat information and stimulus pairings can install strong and persistent fear, few studies have addressed the interaction between these two pathways of fear. According to the expectancy bias theory of Davey (1992, 1997), verbal information can

  1. Romaphobia among adolescents : the role of perceived threat, nationalism, and acculturation expectations

    NARCIS (Netherlands)

    Ljujic, Vanja

    2011-01-01

    The purpose of the research presented in this thesis was to gain insight into social-psychological mechanisms that underlie negative attitudes towards the Roma, i.e. Romaphobia, among adolescents. Drawing from the threat theory (Stephan & Stephan, 1996, 2000), we found evidence that the perception

  2. The exact $C$-function in integrable $\\lambda$-deformed theories arXiv

    CERN Document Server

    Georgiou, George; Sagkrioti, Eftychia; Sfetsos, Konstantinos; Siampos, Konstantinos

    By employing CFT techniques, we show how to compute in the context of \\lambda-deformations of current algebras and coset CFTs the exact in the deformation parameters C-function for a wide class of integrable theories that interpolate between a UV and an IR point. We explicitly consider RG flows for integrable deformations of left-right asymmetric current algebras and coset CFTs. In all cases, the derived exact C-functions obey all the properties asserted by Zamolodchikov's c-theorem in two-dimensions.

  3. The Role of Threat in the Dynamics of the Philippine-United States Alliance

    Science.gov (United States)

    2014-12-01

    new ones as a measure to counter the effect of threats among both nations. This step ensures that the alliance is functioning efficiently and that...states tend to balance rather than to bandwagon against a threatening state, and bandwagoning cases are manifested only by weak and isolated states...theory, Walt presents the principles of bandwagoning and balancing from the works of Kenneth Waltz in Theory of International Politics, in which he

  4. Three- and two-point one-loop integrals in heavy particle effective theories

    International Nuclear Information System (INIS)

    Bouzas, A.O.

    2000-01-01

    We give a complete analytical computation of three- and two-point loop integrals occurring in heavy particle theories, involving a velocity change, for arbitrary real values of the external masses and residual momenta. (orig.)

  5. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  6. Reconceptualizing children's complex discharge with health systems theory: novel integrative review with embedded expert consultation and theory development.

    Science.gov (United States)

    Noyes, Jane; Brenner, Maria; Fox, Patricia; Guerin, Ashleigh

    2014-05-01

    To report a novel review to develop a health systems model of successful transition of children with complex healthcare needs from hospital to home. Children with complex healthcare needs commonly experience an expensive, ineffectual and prolonged nurse-led discharge process. Children gain no benefit from prolonged hospitalization and are exposed to significant harm. Research to enable intervention development and process evaluation across the entire health system is lacking. Novel mixed-method integrative review informed by health systems theory. DATA  CINAHL, PsychInfo, EMBASE, PubMed, citation searching, personal contact. REVIEW  Informed by consultation with experts. English language studies, opinion/discussion papers reporting research, best practice and experiences of children, parents and healthcare professionals and purposively selected policies/guidelines from 2002-December 2012 were abstracted using Framework synthesis, followed by iterative theory development. Seven critical factors derived from thirty-four sources across five health system levels explained successful discharge (new programme theory). All seven factors are required in an integrated care pathway, with a dynamic communication loop to facilitate effective discharge (new programme logic). Current health system responses were frequently static and critical success factors were commonly absent, thereby explaining ineffectual discharge. The novel evidence-based model, which reconceptualizes 'discharge' as a highly complex longitudinal health system intervention, makes a significant contribution to global knowledge to drive practice development. Research is required to develop process and outcome measures at different time points in the discharge process and future trials are needed to determine the effectiveness of integrated health system discharge models. © 2013 John Wiley & Sons Ltd.

  7. Integral Transport Theory in One-dimensional Geometries

    Energy Technology Data Exchange (ETDEWEB)

    Carlvik, I

    1966-06-15

    A method called DIT (Discrete Integral Transport) has been developed for the numerical solution of the transport equation in one-dimensional systems. The characteristic features of the method are Gaussian integration over the coordinate as described by Kobayashi and Nishihara, and a particular scheme for the calculation of matrix elements in annular and spherical geometry that has been used for collision probabilities in earlier Flurig programmes. The paper gives a general theory including such things as anisotropic scattering and multi-pole fluxes, and it gives a brief description of the Flurig scheme. Annular geometry is treated in some detail, and corresponding formulae are given for spherical and plane geometry. There are many similarities between DIT and the method of collision probabilities. DIT is in many cases faster, because for a certain accuracy in the fluxes DIT often needs fewer space points than the method of collision probabilities needs regions. Several computer codes using DIT, both one-group and multigroup, have been written. It is anticipated that experience gained in calculations with these codes will be reported in another paper.

  8. Cosmological perturbation theory using the FFTLog: formalism and connection to QFT loop integrals

    Science.gov (United States)

    Simonović, Marko; Baldauf, Tobias; Zaldarriaga, Matias; Carrasco, John Joseph; Kollmeier, Juna A.

    2018-04-01

    We present a new method for calculating loops in cosmological perturbation theory. This method is based on approximating a ΛCDM-like cosmology as a finite sum of complex power-law universes. The decomposition is naturally achieved using an FFTLog algorithm. For power-law cosmologies, all loop integrals are formally equivalent to loop integrals of massless quantum field theory. These integrals have analytic solutions in terms of generalized hypergeometric functions. We provide explicit formulae for the one-loop and the two-loop power spectrum and the one-loop bispectrum. A chief advantage of our approach is that the difficult part of the calculation is cosmology independent, need be done only once, and can be recycled for any relevant predictions. Evaluation of standard loop diagrams then boils down to a simple matrix multiplication. We demonstrate the promise of this method for applications to higher multiplicity/loop correlation functions.

  9. Dynamics of attentional bias to threat in anxious adults: bias towards and/or away?

    Science.gov (United States)

    Zvielli, Ariel; Bernstein, Amit; Koster, Ernst H W

    2014-01-01

    The aim of the present study was to question untested assumptions about the nature of the expression of Attentional Bias (AB) towards and away from threat stimuli. We tested the idea that high trait anxious individuals (N = 106; M(SD)age = 23.9(3.2) years; 68% women) show a stable AB towards multiple categories of threatening information using the emotional visual dot probe task. AB with respect to five categories of threat stimuli (i.e., angry faces, attacking dogs, attacking snakes, pointed weapons, violent scenes) was evaluated. In contrast with current theories, we found that 34% of participants expressed AB towards threat stimuli, 20.8% AB away from threat stimuli, and 34% AB towards some categories of threat stimuli and away from others. The multiple observed expressions of AB were not an artifact of a specific criterion AB score cut-off; not specific to certain categories of threat stimuli; not an artifact of differences in within-subject variability in reaction time; nor accounted for by individual differences in anxiety-related variables. Findings are conceptualized as reflecting the understudied dynamics of AB expression, with implications for AB measurement and quantification, etiology, relations, and intervention research.

  10. Non-abelian Z-theory: Berends-Giele recursion for the α{sup ′}-expansion of disk integrals

    Energy Technology Data Exchange (ETDEWEB)

    Mafra, Carlos R. [STAG Research Centre and Mathematical Sciences, University of Southampton,Southampton (United Kingdom); Institute for Advanced Study, School of Natural Sciences,Einstein Drive, Princeton, NJ 08540 (United States); Schlotterer, Oliver [Max-Planck-Institut für Gravitationsphysik, Albert-Einstein-Institut,Am Mühlenberg 1, 14476 Potsdam (Germany)

    2017-01-09

    We present a recursive method to calculate the α{sup ′}-expansion of disk integrals arising in tree-level scattering of open strings which resembles the approach of Berends and Giele to gluon amplitudes. Following an earlier interpretation of disk integrals as doubly partial amplitudes of an effective theory of scalars dubbed as Z-theory, we pinpoint the equation of motion of Z-theory from the Berends-Giele recursion for its tree amplitudes. A computer implementation of this method including explicit results for the recursion up to order α{sup ′7} is made available on the website repo.or.cz/BGap.git.

  11. Scanning of Open Data for Detection of Emerging Organized Crime Threats

    DEFF Research Database (Denmark)

    Pastor Pastor, Raquel; Larsen, Henrik Legind

    2017-01-01

    In fighting organized crime, open data provide an important source for both detecting emerging threats, as well as forecasting future threats. This allows the police to plan their resources and capacity for countering the threats in due time to prevent it or at least to mitigate its effects....... A vital part of a system supporting the police analysts for this purpose is an efficient and effective system for scanning the open data providing information about the relevant factors in the environment. This chapter presents the ePOOLICE project, aimed at developing a solution, the “ePOOLICE system...... in deploying such systems. One of the outcomes from the end-user evaluation of the prototype was the desire to integrate internal data to support not only strategic, but also operational analysis and investigation....

  12. Reward and Cognition: Integrating Reinforcement Sensitivity Theory and Social Cognitive Theory to Predict Drinking Behavior.

    Science.gov (United States)

    Hasking, Penelope; Boyes, Mark; Mullan, Barbara

    2015-01-01

    Both Reinforcement Sensitivity Theory and Social Cognitive Theory have been applied to understanding drinking behavior. We propose that theoretical relationships between these models support an integrated approach to understanding alcohol use and misuse. We aimed to test an integrated model in which the relationships between reward sensitivity and drinking behavior (alcohol consumption, alcohol-related problems, and symptoms of dependence) were mediated by alcohol expectancies and drinking refusal self-efficacy. Online questionnaires assessing the constructs of interest were completed by 443 Australian adults (M age = 26.40, sd = 1.83) in 2013 and 2014. Path analysis revealed both direct and indirect effects and implicated two pathways to drinking behavior with differential outcomes. Drinking refusal self-efficacy both in social situations and for emotional relief was related to alcohol consumption. Sensitivity to reward was associated with alcohol-related problems, but operated through expectations of increased confidence and personal belief in the ability to limit drinking in social situations. Conversely, sensitivity to punishment operated through negative expectancies and drinking refusal self-efficacy for emotional relief to predict symptoms of dependence. Two pathways relating reward sensitivity, alcohol expectancies, and drinking refusal self-efficacy may underlie social and dependent drinking, which has implications for development of intervention to limit harmful drinking.

  13. Towards Enterprise Integration Performance Assessment based on Category Theory

    Science.gov (United States)

    Mikhnovsky, Victoria; Ormandjieva, Olga

    A major difference between what we refer to as a "well-developed" science, such as civil engineering, and sciences which are less so, like enterprise engineering, is the degree to which nonfunctional requirements, such as performance, are integrated into the design and development process, and satisfaction of those requirements is controlled by theoretically valid measurement procedures. This paper introduces the preliminary results, which are aimed at developing a concise formal framework for enterprise performance modeling, measurement, and control during enterprise integration activities. The novelty of this research consists in employing the mathematical category theory for modeling purposes, an approach that is broad enough to formally capture heterogeneous (structural, functional and nonfunctional) requirements, by, for example, using the constructs from the graphical categorical formal language.

  14. Computer algebra in quantum field theory integration, summation and special functions

    CERN Document Server

    Schneider, Carsten

    2013-01-01

    The book focuses on advanced computer algebra methods and special functions that have striking applications in the context of quantum field theory. It presents the state of the art and new methods for (infinite) multiple sums, multiple integrals, in particular Feynman integrals, difference and differential equations in the format of survey articles. The presented techniques emerge from interdisciplinary fields: mathematics, computer science and theoretical physics; the articles are written by mathematicians and physicists with the goal that both groups can learn from the other field, including

  15. Dismantling the present and future threats of testicular cancer: a grounded theory of positive and negative adjustment trajectories.

    Science.gov (United States)

    Matheson, Lauren; Boulton, Mary; Lavender, Verna; Protheroe, Andrew; Brand, Sue; Wanat, Marta; Watson, Eila

    2016-02-01

    Testicular cancer commonly affects men in the prime of their lives. While survival rates are excellent, little previous research has examined men's experiences of adjustment to survivorship. We aimed to explore this issue in younger testicular cancer survivors. In-depth qualitative interviews were conducted with testicular cancer survivors over two time points approximately 6 months apart in the year following treatment completion. Interviews were analysed using a grounded theory approach. The sample included 18 testicular cancer survivors between 22 and 44 years (mean age 34). A grounded theory was developed, which explained the process of positive adjustment over the first year following the treatment completion in terms of men's ability to dismantle the present and future threats of cancer, involving the key transitions of gaining a sense of perspective and striving to get on with life and restore normality. These were facilitated by six key processes. The processes that explained a negative adjustment trajectory are also presented. These findings contribute to the understanding of the psychosocial impact of testicular cancer on younger men's lives and have implications for the provision of support to testicular cancer survivors. Further investigation into the feasibility of one-on-one peer support interventions is warranted, as well as informal support that respects men's desire for independence. Understanding the processes involved in adjustment highlights ways in which health professionals can offer support to those struggling to adjust through challenging illness beliefs, encouraging emotional disclosure and facilitating peer mentoring.

  16. Development of an Integrated Theory of Surgical Recovery in Older Adults.

    Science.gov (United States)

    Ann DiMaria-Ghalili, Rose

    2016-01-01

    Experts argue the health care system is not prepared to meet the unique needs of older surgical patients, including how to provide the best care during the recovery phase. Nutrition plays a critical role in the recovery of surgical patients. Since older adults are at risk for malnutrition, examining the role of nutrition as a mediator for surgical recovery across the care continuum in older adults is critical. Presently there is a paucity of frameworks, models, and guidelines that integrate the role of nutrition on the trajectory of postoperative recovery in older surgical patients. The purpose of this article is to introduce the Integrated Theory of Surgical Recovery in Older Adults, an interdisciplinary middle-range theory, so that scholars, researchers, and clinicians can use this framework to promote recovery from surgery in older adults by considering the contribution of mediators of recovery (nutritional status, functional status, and frailty) unique to the older adults.

  17. Gender Identification Moderates Social Identity Threat Effects on Working Memory

    Science.gov (United States)

    Kaiser, Cheryl R.; Hagiwara, Nao

    2011-01-01

    This investigation examined whether gender identification moderates women's working memory following exposure to situations that threaten the integrity of their gender group. Young adults read sentences that either threatened women's gender identity (in the social identity threat condition) or did not threaten this identity (in the control…

  18. Integrated information theory of consciousness: an updated account.

    Science.gov (United States)

    Tononi, G

    2012-12-01

    This article presents an updated account of integrated information theory of consciousness (liT) and some of its implications. /IT stems from thought experiments that lead to phenomenological axioms (existence, compositionality, information, integration, exclusion) and corresponding ontological postulates. The information axiom asserts that every experience is spec~fic - it is what it is by differing in its particular way from a large repertoire of alternatives. The integration axiom asserts that each experience is unified- it cannot be reduced to independent components. The exclusion axiom asserts that every experience is definite - it is limited to particular things and not others and flows at a particular speed and resolution. /IT formalizes these intuitions with postulates. The information postulate states that only "differences that make a difference" from the intrinsic perpective of a system matter: a mechanism generates cause-effect information if its present state has selective past causes and selective future effects within a system. The integration postulate states that only information that is irreducible matters: mechanisms generate integrated information only to the extent that the information they generate cannot be partitioned into that generated within independent components. The exclusion postulate states that only maxima of integrated information matter: a mechanism specifies only one maximally irreducible set of past causes and future effects - a concept. A complex is a set of elements specifying a maximally irreducible constellation of concepts, where the maximum is evaluated over elements and at the optimal spatiatemporal scale. Its concepts specify a maximally integrated conceptual information structure or quale, which is identical with an experience. Finally, changes in information integration upon exposure to the environment reflect a system's ability to match the causal structure of the world. After introducing an updated definition of

  19. The protection motivation theory within the stages of the transtheoretical model - stage-specific interplay of variables and prediction of exercise stage transitions.

    Science.gov (United States)

    Lippke, Sonia; Plotnikoff, Ronald C

    2009-05-01

    Two different theories of health behaviour have been chosen with the aim of theory integration: a continuous theory (protection motivation theory, PMT) and a stage model (transtheoretical model, TTM). This is the first study to test whether the stages of the TTM moderate the interrelation of PMT-variables and the mediation of motivation, as well as PMT-variables' interactions in predicting stage transitions. Hypotheses were tested regarding (1) mean patterns, stage pair-comparisons and nonlinear trends using ANOVAs; (2) prediction-patterns for the different stage groups employing multi-group structural equation modelling (MSEM) and nested model analyses; and (3) stage transitions using binary logistic regression analyses. Adults (N=1,602) were assessed over a 6 month period on their physical activity stages, PMT-variables and subsequent behaviour. (1) Particular mean differences and nonlinear trends in all test variables were found. (2) The PMT adequately fitted the five stage groups. The MSEM revealed that covariances within threat appraisal and coping appraisal were invariant and all other constrains were stage-specific, i.e. stage was a moderator. Except for self-efficacy, motivation fully mediated the relationship between the social-cognitive variables and behaviour. (3) Predicting stage transitions with the PMT-variables underscored the importance of self-efficacy. Only when threat appraisal and coping appraisal were high, stage movement was more likely in the preparation stage. Results emphasize stage-specific differences of the PMT mechanisms, and hence, support the stage construct. The findings may guide further theory building and research integrating different theoretical approaches.

  20. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    Science.gov (United States)

    Bedyńska, Sylwia; Krejtz, Izabela; Sedek, Grzegorz

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement – namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed. PMID:29666599

  1. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    Directory of Open Access Journals (Sweden)

    Sylwia Bedyńska

    2018-04-01

    Full Text Available Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement – namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed.

  2. Subconscious detection of threat as reflected by an enhanced response bias.

    Science.gov (United States)

    Windmann, S; Krüger, T

    1998-12-01

    Neurobiological and cognitive models of unconscious information processing suggest that subconscious threat detection can lead to cognitive misinterpretations and false alarms, while conscious processing is assumed to be perceptually and conceptually accurate and unambiguous. Furthermore, clinical theories suggest that pathological anxiety results from a crude preattentive warning system predominating over more sophisticated and controlled modes of processing. We investigated the hypothesis that subconscious detection of threat in a cognitive task is reflected by enhanced "false signal" detection rather than by selectively enhanced discrimination of threat items in 30 patients with panic disorder and 30 healthy controls. We presented a tachistoscopic word-nonword discrimination task and a subsequent recognition task and analyzed the data by means of process-dissociation procedures. In line with our expectations, subjects of both groups showed more false signal detection to threat than to neutral stimuli as indicated by an enhanced response bias, whereas indices of discriminative sensitivity did not show this effect. In addition, patients with panic disorder showed a generally enhanced response bias in comparison to healthy controls. They also seemed to have processed the stimuli less elaborately and less differentially. Results are consistent with the assumption that subconscious threat detection can lead to misrepresentations of stimulus significance and that pathological anxiety is characterized by a hyperactive preattentive alarm system that is insufficiently controlled by higher cognitive processes. Copyright 1998 Academic Press.

  3. Accountable care organizations and radiology: threat or opportunity?

    Science.gov (United States)

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  4. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  5. Integrating social capital theory, social cognitive theory, and the technology acceptance model to explore a behavioral model of telehealth systems.

    Science.gov (United States)

    Tsai, Chung-Hung

    2014-05-07

    Telehealth has become an increasingly applied solution to delivering health care to rural and underserved areas by remote health care professionals. This study integrated social capital theory, social cognitive theory, and the technology acceptance model (TAM) to develop a comprehensive behavioral model for analyzing the relationships among social capital factors (social capital theory), technological factors (TAM), and system self-efficacy (social cognitive theory) in telehealth. The proposed framework was validated with 365 respondents from Nantou County, located in Central Taiwan. Structural equation modeling (SEM) was used to assess the causal relationships that were hypothesized in the proposed model. The finding indicates that elderly residents generally reported positive perceptions toward the telehealth system. Generally, the findings show that social capital factors (social trust, institutional trust, and social participation) significantly positively affect the technological factors (perceived ease of use and perceived usefulness respectively), which influenced usage intention. This study also confirmed that system self-efficacy was the salient antecedent of perceived ease of use. In addition, regarding the samples, the proposed model fitted considerably well. The proposed integrative psychosocial-technological model may serve as a theoretical basis for future research and can also offer empirical foresight to practitioners and researchers in the health departments of governments, hospitals, and rural communities.

  6. Integrating Social Capital Theory, Social Cognitive Theory, and the Technology Acceptance Model to Explore a Behavioral Model of Telehealth Systems

    Directory of Open Access Journals (Sweden)

    Chung-Hung Tsai

    2014-05-01

    Full Text Available Telehealth has become an increasingly applied solution to delivering health care to rural and underserved areas by remote health care professionals. This study integrated social capital theory, social cognitive theory, and the technology acceptance model (TAM to develop a comprehensive behavioral model for analyzing the relationships among social capital factors (social capital theory, technological factors (TAM, and system self-efficacy (social cognitive theory in telehealth. The proposed framework was validated with 365 respondents from Nantou County, located in Central Taiwan. Structural equation modeling (SEM was used to assess the causal relationships that were hypothesized in the proposed model. The finding indicates that elderly residents generally reported positive perceptions toward the telehealth system. Generally, the findings show that social capital factors (social trust, institutional trust, and social participation significantly positively affect the technological factors (perceived ease of use and perceived usefulness respectively, which influenced usage intention. This study also confirmed that system self-efficacy was the salient antecedent of perceived ease of use. In addition, regarding the samples, the proposed model fitted considerably well. The proposed integrative psychosocial-technological model may serve as a theoretical basis for future research and can also offer empirical foresight to practitioners and researchers in the health departments of governments, hospitals, and rural communities.

  7. The importance of coping, threat appraisal, and beliefs in understanding and responding to fear of victimization: applications to a male prisoner sample.

    Science.gov (United States)

    Ireland, Jane L

    2011-08-01

    The current study explores conceptualizations of victimization by men, focusing on threat appraisal, coping appraisal, and beliefs, and seeking to apply protection motivation theory, the applied fear response model, and social cognition. Five hundred and sixty-six male prisoners, comprising adults and adolescents, completed a measure of victimization and perpetration (DIPC-SCALED) and of fear, appraisal, and beliefs (TAB). It was predicted that increased threat appraisal and ineffective coping appraisal would predict increased fear of victimization, particularly among the mutual perpetrator/victim group. This group was expected to select strategies for managing the threat of victimization, which carried more risk to them (e.g., such as an aggressive reaction) and to present with beliefs supporting the use of aggression as a response to victimization. Fear of victimization was predicted by threat and coping appraisal although the deficit for victims appeared in coping appraisal only. Mutual perpetrator/victims presented with a specific difficulty in appraising their ability to cope with threat. Differences in beliefs supporting an aggressive response to threat were also noted across perpetrator and/or victimization groups. The article concludes by outlining the implications for theory and clinical practice.

  8. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  9. Pipeline integrity management: integration of geotechnical and mechanical assessment to control potential risks due to external forces

    Energy Technology Data Exchange (ETDEWEB)

    Malpartida Moya, John E.; Sota, Giancarlo Massucco de la; Seri, Walter [Compania Operadora de Gas del Amazonas, Lima (Peru)

    2009-07-01

    Every pipeline integrity management system evaluates and controls various threats. On pipelines which have particular characteristics as it is the case of the Andean pipelines and pipelines crossing jungles, one of the main threats are the external forces. Even, this threat causes a greater number of failures than other threats like corrosion or the third part damage. Facing this situation, the pipeline integrity management system of TgP has achieved an important development in the use and suitable handling of the information provided by diverse techniques of pipeline mechanical inspection and geotechnical inspection of the right-of-way (ROW). This document presents our methodology, which interrelate information of the in-line inspection, information of geotechnical inspections of the ROW, instrumentation (Strain Gages), topographic monitoring, among others. All this information is supported in a Geographic Information System (GIS) which allows us to integrate the information. By means of the pipeline integrity management system we control potential risks due to external forces, we have been able to act before events become critical, with no occurrence of failures. This system allows us simultaneously to optimize efforts and preserve the mechanical integrity of our pipelines, not producing neither personal nor environmental nor economical affectation. (author)

  10. Self-esteem, authoritarianism, and democratic values in the face of threat.

    Science.gov (United States)

    Shaffer, Barbara A; Hastings, Brad M

    2004-08-01

    This study investigated the associations among terrorist threat, right-wing authoritarianism, self-esteem, and their relations in support for democratic values. Students (n = 140) completed Altemeyer's Right-Wing Authoritarianism Scale, Rosenberg's Self-esteem Scale, and the Democratic Values Scale. The participants also read an editorial regarding the events of 9/11/01 and completed two mortality-salience questions to induce a sense of threat. Results showed that self-esteem was a significant contributor to the prediction of scores on the Democratic Values Scale. Furthermore, the interaction between self-esteem and right-wing authoritarianism explained significant variance in the Democratic Values Scale scores. The results are interpreted in light of theories addressing authoritarianism and self-esteem.

  11. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study

    Directory of Open Access Journals (Sweden)

    Samreen Misbah

    2017-12-01

    Full Text Available Purpose The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT analysis of integrating the World Health Organization (WHO patient safety curriculum into undergraduate medical education in Pakistan. Methods A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Results Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. Conclusion The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.

  12. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study.

    Science.gov (United States)

    Misbah, Samreen; Mahboob, Usman

    2017-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.

  13. Justice, Integrity and Fairness: Relevant Questions About Robert Nozick Political Theory

    Directory of Open Access Journals (Sweden)

    Carlos Fernando Cruz da Silva

    2016-11-01

    Full Text Available The present work develops and analysis about Robert Nozick political theory based in thesis defended by Ronald Dworkin. The central objective of this paper is to investigate the validity or the invalidity of the justice principles proposed by Nozick under the integrity theory. The methodology utilized to construct the definitive hypothesis was based, initially, in a theoretical search, developed through of an bibliographical lifting of the principal involved authors texts. After the survey, a descriptive analysis of the texts was executed and, then, was executed and critical analysis. At the end, an definitive proposal was constructed with an deductive reasoning.

  14. The Threat of Common Method Variance Bias to Theory Building

    Science.gov (United States)

    Reio, Thomas G., Jr.

    2010-01-01

    The need for more theory building scholarship remains one of the pressing issues in the field of HRD. Researchers can employ quantitative, qualitative, and/or mixed methods to support vital theory-building efforts, understanding however that each approach has its limitations. The purpose of this article is to explore common method variance bias as…

  15. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  16. Modeling Human Behaviour with Higher Order Logic: Insider Threats

    DEFF Research Database (Denmark)

    Boender, Jaap; Ivanova, Marieta Georgieva; Kammuller, Florian

    2014-01-01

    it to the sociological process of logical explanation. As a case study on modeling human behaviour, we present the modeling and analysis of insider threats as a Higher Order Logic theory in Isabelle/HOL. We show how each of the three step process of sociological explanation can be seen in our modeling of insider’s state......, its context within an organisation and the effects on security as outcomes of a theorem proving analysis....

  17. Twistor theory at fifty: from contour integrals to twistor strings.

    Science.gov (United States)

    Atiyah, Michael; Dunajski, Maciej; Mason, Lionel J

    2017-10-01

    We review aspects of twistor theory, its aims and achievements spanning the last five decades. In the twistor approach, space-time is secondary with events being derived objects that correspond to compact holomorphic curves in a complex threefold-the twistor space. After giving an elementary construction of this space, we demonstrate how solutions to linear and nonlinear equations of mathematical physics-anti-self-duality equations on Yang-Mills or conformal curvature-can be encoded into twistor cohomology. These twistor correspondences yield explicit examples of Yang-Mills and gravitational instantons, which we review. They also underlie the twistor approach to integrability: the solitonic systems arise as symmetry reductions of anti-self-dual (ASD) Yang-Mills equations, and Einstein-Weyl dispersionless systems are reductions of ASD conformal equations. We then review the holomorphic string theories in twistor and ambitwistor spaces, and explain how these theories give rise to remarkable new formulae for the computation of quantum scattering amplitudes. Finally, we discuss the Newtonian limit of twistor theory and its possible role in Penrose's proposal for a role of gravity in quantum collapse of a wave function.

  18. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    NARCIS (Netherlands)

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation

  19. A Database Integrity Pattern Language

    Directory of Open Access Journals (Sweden)

    Octavian Paul ROTARU

    2004-08-01

    Full Text Available Patterns and Pattern Languages are ways to capture experience and make it re-usable for others, and describe best practices and good designs. Patterns are solutions to recurrent problems.This paper addresses the database integrity problems from a pattern perspective. Even if the number of vendors of database management systems is quite high, the number of available solutions to integrity problems is limited. They all learned from the past experience applying the same solutions over and over again.The solutions to avoid integrity threats applied to in database management systems (DBMS can be formalized as a pattern language. Constraints, transactions, locks, etc, are recurrent integrity solutions to integrity threats and therefore they should be treated accordingly, as patterns.

  20. Automated cyber threat analysis and specified process using vector relational data modeling

    OpenAIRE

    Kelly, Ryan Forrest

    2014-01-01

    Approved for public release; distribution is unlimited Computer network defense systems should be sufficiently integrated to pull data from any information source, model an expert cyber analyst’s decision process, continuously adapt to an evolving cyber threat environment, and amalgamate with industry standard network hardware. Unfortunately, cyber defense systems are generally stovepipe solutions that do not natively integrate disparate network systems. Correlation engines are generally l...

  1. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  2. Comment on the consistency of truncated nonlinear integral equation based theories of freezing

    International Nuclear Information System (INIS)

    Cerjan, C.; Bagchi, B.; Rice, S.A.

    1985-01-01

    We report the results of two studies of aspects of the consistency of truncated nonlinear integral equation based theories of freezing: (i) We show that the self-consistent solutions to these nonlinear equations are unfortunately sensitive to the level of truncation. For the hard sphere system, if the Wertheim--Thiele representation of the pair direct correlation function is used, the inclusion of part but not all of the triplet direct correlation function contribution, as has been common, worsens the predictions considerably. We also show that the convergence of the solutions found, with respect to number of reciprocal lattice vectors kept in the Fourier expansion of the crystal singlet density, is slow. These conclusions imply great sensitivity to the quality of the pair direct correlation function employed in the theory. (ii) We show the direct correlation function based and the pair correlation function based theories of freezing can be cast into a form which requires solution of isomorphous nonlinear integral equations. However, in the pair correlation function theory the usual neglect of the influence of inhomogeneity of the density distribution on the pair correlation function is shown to be inconsistent to the lowest order in the change of density on freezing, and to lead to erroneous predictions

  3. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  4. Integrability and the conformal field theory of the Higgs branch

    International Nuclear Information System (INIS)

    Sax, Olof Ohlsson; Sfondrini, Alessandro; Bogdan, Stefański Jr.

    2015-01-01

    In the context of the AdS 3 /CFT 2 correspondence, we investigate the Higgs branch CFT 2 . Witten showed that states localised near the small instanton singularity can be described in terms of vector multiplet variables. This theory has a planar, weak-coupling limit, in which anomalous dimensions of single-trace composite operators can be calculated. At one loop, the calculation reduces to finding the spectrum of a spin-chain with nearest-neighbour interactions. This CFT 2 spin-chain matches precisely the one that was previously found as the weak-coupling limit of the integrable system describing the AdS 3 side of the duality. We compute the one-loop dilatation operator in a non-trivial compact subsector and show that it corresponds to an integrable spin-chain Hamiltonian. This provides the first direct evidence of integrability on the CFT 2 side of the correspondence.

  5. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    Science.gov (United States)

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record.

  6. Random matrix theory and higher genus integrability: the quantum chiral Potts model

    International Nuclear Information System (INIS)

    Angles d'Auriac, J.Ch.; Maillard, J.M.; Viallet, C.M.

    2002-01-01

    We perform a random matrix theory (RMT) analysis of the quantum four-state chiral Potts chain for different sizes of the chain up to size L 8. Our analysis gives clear evidence of a Gaussian orthogonal ensemble (GOE) statistics, suggesting the existence of a generalized time-reversal invariance. Furthermore, a change from the (generic) GOE distribution to a Poisson distribution occurs when the integrability conditions are met. The chiral Potts model is known to correspond to a (star-triangle) integrability associated with curves of genus higher than zero or one. Therefore, the RMT analysis can also be seen as a detector of 'higher genus integrability'. (author)

  7. Developing Integrated Arts Curriculum in Hong Kong: Chaos Theory at Work?

    Science.gov (United States)

    Wong, Marina

    2013-01-01

    This article reports the development of integrated arts curriculum in two Hong Kong secondary schools over a 9-year period. Initial findings display a range of individual responses to educational change that are both non-predictable and non-linear. Chaos theory is used to explain these varied responses in terms of bifurcations. The findings of…

  8. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  9. Stereotype threat and racial differences in citizens' experiences of police encounters.

    Science.gov (United States)

    Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba

    2015-10-01

    We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system. (c) 2015 APA, all rights reserved).

  10. The quartet theory of human emotions: An integrative and neurofunctional model.

    Science.gov (United States)

    Koelsch, Stefan; Jacobs, Arthur M; Menninghaus, Winfried; Liebal, Katja; Klann-Delius, Gisela; von Scheve, Christian; Gebauer, Gunter

    2015-06-01

    Despite an explosion of research in the affective sciences during the last few decades, interdisciplinary theories of human emotions are lacking. Here we present a neurobiological theory of emotions that includes emotions which are uniquely human (such as complex moral emotions), considers the role of language for emotions, advances the understanding of neural correlates of attachment-related emotions, and integrates emotion theories from different disciplines. We propose that four classes of emotions originate from four neuroanatomically distinct cerebral systems. These emotional core systems constitute a quartet of affect systems: the brainstem-, diencephalon-, hippocampus-, and orbitofrontal-centred affect systems. The affect systems were increasingly differentiated during the course of evolution, and each of these systems generates a specific class of affects (e.g., ascending activation, pain/pleasure, attachment-related affects, and moral affects). The affect systems interact with each other, and activity of the affect systems has effects on - and interacts with - biological systems denoted here as emotional effector systems. These effector systems include motor systems (which produce actions, action tendencies, and motoric expression of emotion), peripheral physiological arousal, as well as attentional and memory systems. Activity of affect systems and effector systems is synthesized into an emotion percept (pre-verbal subjective feeling), which can be transformed (or reconfigured) into a symbolic code such as language. Moreover, conscious cognitive appraisal (involving rational thought, logic, and usually language) can regulate, modulate, and partly initiate, activity of affect systems and effector systems. Our emotion theory integrates psychological, neurobiological, sociological, anthropological, and psycholinguistic perspectives on emotions in an interdisciplinary manner, aiming to advance the understanding of human emotions and their neural correlates

  11. The quartet theory of human emotions: An integrative and neurofunctional model

    Science.gov (United States)

    Koelsch, Stefan; Jacobs, Arthur M.; Menninghaus, Winfried; Liebal, Katja; Klann-Delius, Gisela; von Scheve, Christian; Gebauer, Gunter

    2015-06-01

    Despite an explosion of research in the affective sciences during the last few decades, interdisciplinary theories of human emotions are lacking. Here we present a neurobiological theory of emotions that includes emotions which are uniquely human (such as complex moral emotions), considers the role of language for emotions, advances the understanding of neural correlates of attachment-related emotions, and integrates emotion theories from different disciplines. We propose that four classes of emotions originate from four neuroanatomically distinct cerebral systems. These emotional core systems constitute a quartet of affect systems: the brainstem-, diencephalon-, hippocampus-, and orbitofrontal-centred affect systems. The affect systems were increasingly differentiated during the course of evolution, and each of these systems generates a specific class of affects (e.g., ascending activation, pain/pleasure, attachment-related affects, and moral affects). The affect systems interact with each other, and activity of the affect systems has effects on - and interacts with - biological systems denoted here as emotional effector systems. These effector systems include motor systems (which produce actions, action tendencies, and motoric expression of emotion), peripheral physiological arousal, as well as attentional and memory systems. Activity of affect systems and effector systems is synthesized into an emotion percept (pre-verbal subjective feeling), which can be transformed (or reconfigured) into a symbolic code such as language. Moreover, conscious cognitive appraisal (involving rational thought, logic, and usually language) can regulate, modulate, and partly initiate, activity of affect systems and effector systems. Our emotion theory integrates psychological, neurobiological, sociological, anthropological, and psycholinguistic perspectives on emotions in an interdisciplinary manner, aiming to advance the understanding of human emotions and their neural correlates.

  12. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  13. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  14. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  15. Yang-Baxter algebras of monodromy matrices in integrable quantum field theories

    International Nuclear Information System (INIS)

    Vega, H.J. de; Maillet, J.M.; Eichenherr, H.

    1984-01-01

    We consider a large class of two-dimensional integrable quantum field theories with nonabelian internal symmetry and classical scale invariance. We present a general procedure to determine explicitly the conserved quantum monodromy operator generating infinitely many non-local charges. The main features of our methods are a factorization principle and the use of P, T, and internal symmetries. The monodromy operator is shown to satisfy a Yang-Baxter algebra, the structure constants (i.e. the quantum R-matrix) of which are determined by the two-particle S-matrix of the theory. We apply the method to the chiral SU(N) and the O(2N) Gross-Neveu models. (orig.)

  16. Design for human factors (DfHF): a grounded theory for integrating human factors into production design processes.

    Science.gov (United States)

    Village, Judy; Searcy, Cory; Salustri, Filipo; Patrick Neumann, W

    2015-01-01

    The 'design for human factors' grounded theory explains 'how' human factors (HF) went from a reactive, after-injury programme in safety, to being proactively integrated into each step of the production design process. In this longitudinal case study collaboration with engineers and HF Specialists in a large electronics manufacturer, qualitative data (e.g. meetings, interviews, observations and reflections) were analysed using a grounded theory methodology. The central tenet in the theory is that when HF Specialists acclimated to the engineering process, language and tools, and strategically aligned HF to the design and business goals of the organisation, HF became a means to improve business performance. This led to engineers 'pulling' HF Specialists onto their team. HF targets were adopted into engineering tools to communicate HF concerns quantitatively, drive continuous improvement, visibly demonstrate change and lead to benchmarking. Senior management held engineers accountable for HF as a key performance indicator, thus integrating HF into the production design process. Practitioner Summary: Research and practice lack explanations about how HF can be integrated early in design of production systems. This three-year case study and the theory derived demonstrate how ergonomists changed their focus to align with design and business goals to integrate HF into the design process.

  17. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  18. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  19. Spiking Phineas Gage: a neurocomputational theory of cognitive-affective integration in decision making.

    Science.gov (United States)

    Wagar, Brandon M; Thagard, Paul

    2004-01-01

    The authors present a neurological theory of how cognitive information and emotional information are integrated in the nucleus accumbens during effective decision making. They describe how the nucleus accumbens acts as a gateway to integrate cognitive information from the ventromedial prefrontal cortex and the hippocampus with emotional information from the amygdala. The authors have modeled this integration by a network of spiking artificial neurons organized into separate areas and used this computational model to simulate 2 kinds of cognitive-affective integration. The model simulates successful performance by people with normal cognitive-affective integration. The model also simulates the historical case of Phineas Gage as well as subsequent patients whose ability to make decisions became impeded by damage to the ventromedial prefrontal cortex.

  20. Some applications of perturbation theory to numerical integration methods for the Schroedinger equation

    International Nuclear Information System (INIS)

    Killingbeck, J.

    1979-01-01

    By using the methods of perturbation theory it is possible to construct simple formulae for the numerical integration of the Schroedinger equation, and also to calculate expectation values solely by means of simple eigenvalue calculations. (Auth.)

  1. Bending analysis of embedded nanoplates based on the integral formulation of Eringen's nonlocal theory using the finite element method

    Science.gov (United States)

    Ansari, R.; Torabi, J.; Norouzzadeh, A.

    2018-04-01

    Due to the capability of Eringen's nonlocal elasticity theory to capture the small length scale effect, it is widely used to study the mechanical behaviors of nanostructures. Previous studies have indicated that in some cases, the differential form of this theory cannot correctly predict the behavior of structure, and the integral form should be employed to avoid obtaining inconsistent results. The present study deals with the bending analysis of nanoplates resting on elastic foundation based on the integral formulation of Eringen's nonlocal theory. Since the formulation is presented in a general form, arbitrary kernel functions can be used. The first order shear deformation plate theory is considered to model the nanoplates, and the governing equations for both integral and differential forms are presented. Finally, the finite element method is applied to solve the problem. Selected results are given to investigate the effects of elastic foundation and to compare the predictions of integral nonlocal model with those of its differential nonlocal and local counterparts. It is found that by the use of proposed integral formulation of Eringen's nonlocal model, the paradox observed for the cantilever nanoplate is resolved.

  2. The integrated modeled theory on understanding and preventing the incidence of child abuse in South Africa

    CSIR Research Space (South Africa)

    Mbecke, ZP

    2010-07-01

    Full Text Available factors over other contributing factors. The aim of the thesis is three-fold. Firstly, to review theories explaining crime causation in general and child abuse in particular. Secondly to develop the Integrated Modeled Theory as a model that facilitates...

  3. Entanglement entropy of non-unitary integrable quantum field theory

    Directory of Open Access Journals (Sweden)

    Davide Bianchini

    2015-07-01

    Full Text Available In this paper we study the simplest massive 1+1 dimensional integrable quantum field theory which can be described as a perturbation of a non-unitary minimal conformal field theory: the Lee–Yang model. We are particularly interested in the features of the bi-partite entanglement entropy for this model and on building blocks thereof, namely twist field form factors. Non-unitarity selects out a new type of twist field as the operator whose two-point function (appropriately normalized yields the entanglement entropy. We compute this two-point function both from a form factor expansion and by means of perturbed conformal field theory. We find good agreement with CFT predictions put forward in a recent work involving the present authors. In particular, our results are consistent with a scaling of the entanglement entropy given by ceff3log⁡ℓ where ceff is the effective central charge of the theory (a positive number related to the central charge and ℓ is the size of the region. Furthermore the form factor expansion of twist fields allows us to explore the large region limit of the entanglement entropy and find the next-to-leading order correction to saturation. We find that this correction is very different from its counterpart in unitary models. Whereas in the latter case, it had a form depending only on few parameters of the model (the particle spectrum, it appears to be much more model-dependent for non-unitary models.

  4. An Insider Threat Neutralization Mitigation Model Predicated On Cognitive Dissonance (ITNMCD

    Directory of Open Access Journals (Sweden)

    Keshnee Padayachee

    2015-07-01

    Full Text Available The insider threat concern is a complex issue, as the problem domain intersects the social, technical and socio-technical dimensions. Consequently, counteracting the insider threat involves influencing the insider’s perceptions and behaviour in order to ensure compliance. When an individual’s actions and beliefs are incongruent, this induces a phenomenon known as cognitive dissonance. In order to reduce this dissonance, individuals are self-motivated either to change their behaviours or beliefs, or to rationalize their behaviour. Neutralization is a technique used by criminals to rationalize maleficence. In terms of the insider threat, it has been proposed that if the justifications for committing an offence are eliminated, then the insider is less likely to commit the offence. This process is known as neutralization mitigation. The research reported on here proposes that inducing cognitive dissonance may be a means of mitigating the neutralizations that the insider may use to justify maleficence. To integrate these concepts into a pragmatic implementable solution the Insider Threat Neutralization Mitigation model predicated on Cognitive Dissonance (ITNMCD is proposed. A proof-of-concept was developed and the model concept was evaluated using the design science method.

  5. Stokes phenomena and quantum integrability in non-critical string/M theory

    International Nuclear Information System (INIS)

    Chan, Chuan-Tsung; Irie, Hirotaka; Yeh, Chi-Hsien

    2012-01-01

    We study Stokes phenomena of the k×k isomonodromy systems with an arbitrary Poincaré index r, especially which correspond to the fractional-superstring (or parafermionic-string) multi-critical points (p-hat,q-hat)=(1,r-1) in the k-cut two-matrix models. Investigation of this system is important for the purpose of figuring out the non-critical version of M theory which was proposed to be the strong-coupling dual of fractional superstring theory as a two-matrix model with an infinite number of cuts. Surprisingly the multi-cut boundary-condition recursion equations have a universal form among the various multi-cut critical points, and this enables us to show explicit solutions of Stokes multipliers in quite wide classes of (k,r). Although these critical points almost break the intrinsic Z k symmetry of the multi-cut two-matrix models, this feature makes manifest a connection between the multi-cut boundary-condition recursion equations and the structures of quantum integrable systems. In particular, it is uncovered that the Stokes multipliers satisfy multiple Hirota equations (i.e. multiple T-systems). Therefore our result provides a large extension of the ODE/IM correspondence to the general isomonodromy ODE systems endowed with the multi-cut boundary conditions. We also comment about a possibility that N=2 QFT of Cecotti-Vafa would be “topological series” in non-critical M theory equipped with a single quantum integrability.

  6. The Selective Cue Integration Framework: A Theory of Postidentification Witness Confidence Assessment

    Science.gov (United States)

    Charman, Steve D.; Carlucci, Marianna; Vallano, Jon; Gregory, Amy Hyman

    2010-01-01

    The current manuscript proposes a theory of how witnesses assess their confidence following a lineup identification, called the selective cue integration framework (SCIF). Drawing from past research on the postidentification feedback effect, the SCIF details a three-stage process of confidence assessment that is based largely on a…

  7. Chronology of awareness about US National Park external threats.

    Science.gov (United States)

    Shafer, Craig L

    2012-12-01

    The objective of this paper is to raise understanding of the history of protected area external threat awareness in the United States and at World Protected Area Congresses. The earliest concerns about external threats to US national parks began in the late nineteenth century: a potential railroad transgression of Yellowstone National Park in the 1880s. During the early and mid 1930s, George Wright and colleagues focused on outside boundary concerns like of hunting and trapping of furbearers, grazing, logging, disease and hybridization between species. In the 1960s, a worldwide recognition began about the role of outside habitat fragmentation/isolation on nature reserves and human generated stressors crossing their boundaries. The State of the Park Report 1980 added a plethora of threats: oil/gas and geothermal exploration and development, hydropower and reclamation projects, urban encroachment, roads, resorts, and recreational facilities. The early 1980s ushered in political interference with NPS threats abatement efforts as well as Congressional legislative initiatives to support the abatement challenges of the agency. By 1987, the Government Accounting Office issued its first report on National Park Service (NPS) progress in dealing with external threats. Climate change impacts on parks, especially in terms of animals adjusting their temperature and moisture requirements by latitude and altitude, surfaced in the technical literature by the mid-1980s. By 1992, the world parks community stressed the need to integrate protected areas into the surrounding landscape and human community. The importance of the matrix has gradually gained appreciation in the scientific community. This chronology represents one example of national park and protected areas' institutional history contributing to the breath of modern conservation science.

  8. On superwistor geometry and integrability in super gauge theory

    International Nuclear Information System (INIS)

    Wolf, M.

    2006-01-01

    devoted to a more detailed investigation of (classical) integrability of self-dual SYM theories. In particular, we explain the twistor construction of infinite-dimensional algebras of hidden symmetries. Our discussion is exemplified by derive affine extensions of internal and space-time symmetries. Furthermore, we construct self-dual SYM hierarchies and their truncated versions. these hierarchies describe an infinite number of flows on the respective solution space. The lowest level flows are space-time translations. The existence of such hierarchies allows us to embed a given solution to the equations of motion of self-dual SYM theory into an infinite-parameter family of new solutions. the dependence of the self-dual SYM fields on the additional moduli can be recovered by solving the equations of the hierarchy. We in addition derive infinitely many nonlocal conservation lwas. (orig.)

  9. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  10. Expectation values of local fields for a two-parameter family of integrable models and related perturbed conformal field theories

    International Nuclear Information System (INIS)

    Baseilhac, P.; Fateev, V.A.

    1998-01-01

    We calculate the vacuum expectation values of local fields for the two-parameter family of integrable field theories introduced and studied by Fateev (1996). Using this result we propose an explicit expression for the vacuum expectation values of local operators in parafermionic sine-Gordon models and in integrable perturbed SU(2) coset conformal field theories. (orig.)

  11. AN EDUCATIONAL THEORY MODEL--(SIGGS), AN INTEGRATION OF SET THEORY, INFORMATION THEORY, AND GRAPH THEORY WITH GENERAL SYSTEMS THEORY.

    Science.gov (United States)

    MACCIA, ELIZABETH S.; AND OTHERS

    AN ANNOTATED BIBLIOGRAPHY OF 20 ITEMS AND A DISCUSSION OF ITS SIGNIFICANCE WAS PRESENTED TO DESCRIBE CURRENT UTILIZATION OF SUBJECT THEORIES IN THE CONSTRUCTION OF AN EDUCATIONAL THEORY. ALSO, A THEORY MODEL WAS USED TO DEMONSTRATE CONSTRUCTION OF A SCIENTIFIC EDUCATIONAL THEORY. THE THEORY MODEL INCORPORATED SET THEORY (S), INFORMATION THEORY…

  12. Application of a particular class of integrals in the theory of diffraction

    Energy Technology Data Exchange (ETDEWEB)

    Kamishi, Burim, E-mail: burim.kamishi@uni-pr.edu; Bejtullahu, Rasim [Faculty of Natural Sciences and Mathematics, University of Prishtina, Prishtina, Kosovo (Country Unknown); Sykja, Halil [Faculty of Natural Sciences, University of Tirana, Tirana (Albania)

    2016-03-25

    A particular class of integrals appearing in the problems of diffraction is treated in this paper. For the analysis of the classical sources or lasers, Kirchhoff’s integral can be used only for apertures of a determined shape. So far, the problems are solved and analyzed completely, whenever the geomtry of apertures creates the possibility of using Kirchhoff’s integral, namely for the so-called geometry of rectangular apertures. Other apertures exist for which Kirchhoff’s integral cannot be applied, because of difficulties of mathematical character. In this group of apertures belong all the apertures which are bounded with an inclined line, such as those with triangular form. In this paper, the application of a particular class of integrals is shown to give satisfying results in two problems of diffraction theory: double-diffraction phenomena consisting on separating the interferential-diffractional field from the diffractional field, and the case of near-zone of diffraction in the triangular aperture.

  13. How threats influence the evolutionary resolution of within-group conflict.

    Science.gov (United States)

    Cant, Michael A; Johnstone, Rufus A

    2009-06-01

    Most examples of cooperation in nature share a common feature: individuals can interact to produce a productivity benefit or fitness surplus, but there is conflict over how these gains are shared. A central question is how threats to exercise outside options influence the resolution of conflict within such cooperative associations. Here we show how a simple principle from economic bargaining theory, the outside option principle, can help to solve this problem in biological systems. According to this principle, outside options will affect the resolution of conflict only when the payoff of taking up these options exceeds the payoffs individuals can obtain from bargaining or negotiating within the group; otherwise, threats to exercise outside options are not credible and are therefore irrelevant. We show that previous attempts to incorporate outside options in synthetic models of reproductive conflict fail to distinguish between credible and incredible threats, and then we use the outside option principle to develop credible synthetic models in two contexts: reproductive skew and biparental care. A striking prediction of our analysis is that outside options are least relevant to the resolution of conflict in cooperative groups of kin and are most relevant in transient associations or interactions among nonrelatives. Our analysis shows a way to link the resolution of within-group conflict to the environmental setting in which it occurs, and it illuminates the role of threats in the evolution of social behavior.

  14. Social stereotyping as a threat to the integration of the older people. Narrative review.

    Directory of Open Access Journals (Sweden)

    Catalina Aguayo

    2013-12-01

    Full Text Available Introduction: One of the most outstanding characteristics of our time is the increase of older adults (OA. Its emergence claiming a place in society has revealed that there is no adequate preparation to face this reality. One of the major threats for the insertion of OA in the society are the social stereotypes. Aim of the study: To gather the factors that causes a negative perception in relation with OA. Results: The specific literature describes an immediate society, where technological and economic transformations give way to the small (nuclear family, relegating the grandfather. The process of ageing raises new challenges for OA, their families and the Health System. The geriatric service has become a growing and dynamic demand. However, the knowledge of the professionals is rooted in stereotypes and prejudices that lead to an inadequate, negative and mechanistic approach of the OA. The improvement in the care of the OA decreases their psychological burden. The safe and welcoming environment created by the health care team and family will provide emotional, social and better health outcomes. Conclusion: It should sensitize professionals, families and support networks, re-educating their expectations and perceptions. The modification of these factors improves the attitude towards the OA, replaces discriminatory practices by positive behaviors, promotes the integral attention and affects the quality of life of geriatric patients.

  15. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  16. Fracking in the UK press: threat dynamics in an unfolding debate.

    Science.gov (United States)

    Jaspal, Rusi; Nerlich, Brigitte

    2014-04-01

    Shale gas is a novel source of fossil fuel which is extracted by induced hydraulic fracturing, or "fracking". This article examines the socio-political dimension of fracking as manifested in the UK press at three key temporal points in the debate on the practice. Three newspaper corpora were analysed qualitatively using Thematic Analysis and Social Representations Theory. Three overarching themes are discussed: "April-May 2011: from Optimism to Scepticism"; "November 2011: (De-) Constructing and Re-Constructing Risk and Danger"; "April 2012: consolidating Social Representations of Fracking". In this article, we examine the emergence of and inter-relations between competing social representations, discuss the dynamics of threat positioning and show how threat can be re-construed in order to serve particular socio-political ends in the debate on fracking.

  17. FAST-PT: a novel algorithm to calculate convolution integrals in cosmological perturbation theory

    Energy Technology Data Exchange (ETDEWEB)

    McEwen, Joseph E.; Fang, Xiao; Hirata, Christopher M.; Blazek, Jonathan A., E-mail: mcewen.24@osu.edu, E-mail: fang.307@osu.edu, E-mail: hirata.10@osu.edu, E-mail: blazek@berkeley.edu [Center for Cosmology and AstroParticle Physics, Department of Physics, The Ohio State University, 191 W Woodruff Ave, Columbus OH 43210 (United States)

    2016-09-01

    We present a novel algorithm, FAST-PT, for performing convolution or mode-coupling integrals that appear in nonlinear cosmological perturbation theory. The algorithm uses several properties of gravitational structure formation—the locality of the dark matter equations and the scale invariance of the problem—as well as Fast Fourier Transforms to describe the input power spectrum as a superposition of power laws. This yields extremely fast performance, enabling mode-coupling integral computations fast enough to embed in Monte Carlo Markov Chain parameter estimation. We describe the algorithm and demonstrate its application to calculating nonlinear corrections to the matter power spectrum, including one-loop standard perturbation theory and the renormalization group approach. We also describe our public code (in Python) to implement this algorithm. The code, along with a user manual and example implementations, is available at https://github.com/JoeMcEwen/FAST-PT.

  18. Study of the conformal symmetry breaking in field theories in gravitational background using path integrals

    International Nuclear Information System (INIS)

    Souza Alves, Marcelo de.

    1990-03-01

    Some general aspects on field theories in curved space-time and a introduction to conformal symmetry are presented.The behavior of the physical systems under Weyl transformations is discussed. The quantization of such systems are performed through the functional integration method. The regularization in curved space-time is also discussed. An application of this analysis in String theories is made. 42 refs

  19. Comparisons of perturbation and integral equation theories for the angular pair correlation function in molecular fluids

    International Nuclear Information System (INIS)

    Murad, S.; Gubbins, K.E.; Gray, C.G.

    1983-01-01

    We compare several recently proposed theories for the angular pair correlation function g(rω 1 ω 2 ), including first- and second-order perturbation theory (the u-expansion), a Pade approximant to this series, first-order f-expansion, the single superchain, generalized mean field, linearized hypernetted chain, and quadratic hypernetted chain approximations. Numerical results from these theories are compared with available computer simulation data for four model fluids whose intermolecular pair potential is of the form u 0 +usub(a), where u 0 is a hard-sphere of Lennard-Jones model, while usub(a) is a dipole-dipole or quadrupole-quadrupole interaction; we refer to these model fluids as HS+μμ, HS+QQ, LJ+μμ, and LJ+QQ. Properties studied include the angular pair correlation function and its spherical harmonic components, the thermodynamic properties, and the angular correlation parameters G 1 and G 2 that are related to the dielectric and Kerr constants. The second-order perturbation theory is superior to the integral equation theories for the thermodynamic harmonics of g(rω 1 ω 2 ) and for the thermodynamic properties themselves at moderate multipole strengths. For other harmonics and properties, the integral equation theories are better, with the quadratic hypernetted chain approximation being the best overall. (orig.)

  20. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  1. Modern integral equation techniques for quantum reactive scattering theory

    International Nuclear Information System (INIS)

    Auerbach, S.M.

    1993-11-01

    Rigorous calculations of cross sections and rate constants for elementary gas phase chemical reactions are performed for comparison with experiment, to ensure that our picture of the chemical reaction is complete. We focus on the H/D+H 2 → H 2 /DH + H reaction, and use the time independent integral equation technique in quantum reactive scattering theory. We examine the sensitivity of H+H 2 state resolved integral cross sections σ v'j',vj (E) for the transitions (v = 0,j = 0) to (v' = 1,j' = 1,3), to the difference between the Liu-Siegbahn-Truhlar-Horowitz (LSTH) and double many body expansion (DMBE) ab initio potential energy surfaces (PES). This sensitivity analysis is performed to determine the origin of a large discrepancy between experimental cross sections with sharply peaked energy dependence and theoretical ones with smooth energy dependence. We find that the LSTH and DMBE PESs give virtually identical cross sections, which lends credence to the theoretical energy dependence

  2. An Integrative Bio-Psycho-Social Theory of Anorexia Nervosa.

    Science.gov (United States)

    Munro, Calum; Randell, Louise; Lawrie, Stephen M

    2017-01-01

    The need for novel approaches to understanding and treating anorexia nervosa (AN) is well recognized. The aim of this paper is to describe an integrative bio-psycho-social theory of maintaining factors in AN. We took a triangulation approach to develop a clinically relevant theory with face validity and internal consistency. We developed theoretical ideas from our clinical practice and reviewed theoretical ideas within the eating disorders and wider bio-psycho-social literature. The synthesis of these ideas and concepts into a clinically meaningful framework is described here. We suggest eight key factors central to understanding the maintenance and treatment resistance of anorexia nervosa: genetic or experiential predisposing factors; dysfunctional feelings processing and regulation systems; excessive vulnerable feelings; 'feared self' beliefs; starvation as a maladaptive physiological feelings regulation mechanism; maladaptive psychological coping modes; maladaptive social behaviour; and unmet physical and psychological core needs. Each of these factors serves to maintain the disorder. The concept of universal physical and psychological core needs can provide an underpinning integrative framework for working with this distinctly physical and psychological disorder. This framework could be used within any treatment model. We suggest that treatments which help address the profound lack of trust, emotional security and self-acceptance in this patient group will in turn address unmet needs and improve well-being. Copyright © 2016 John Wiley & Sons, Ltd. The concept of unmet physical and psychological needs can be used as an underlying integrative framework for understanding and working with this patient group, alongside any treatment model. A functional understanding of the neuro-biological, physiological and psychological mechanisms involved in anorexia nervosa can help patients reduce self-criticism and shame. Fears about being or becoming fat, greedy, needy

  3. Functional integral approach to string theories

    International Nuclear Information System (INIS)

    Sakita, B.

    1987-01-01

    Fermionic string theory can be made supersymmetric: the superstring. It contains among others mass zero gauge fields of spin 1 and 2. The recent revival of interests in string field theories is due to the recognition of the compactified superstring theory as a viable theory of grandunification of all interactions, especially after Green and Schwarz's discovery of the gauge and gravitational anomaly cancellation in 0(32) superstring theory. New developments include string phenomenology, general discussions of compactification, new models, especially the heterotic string. These are either applications or extensions of string field theories. Although these are very exciting developments, the author limits his attention to the basics of the bosonic string theory

  4. The Role of Verbal Threat Information in the Development of Childhood Fear. "Beware the Jabberwock!"

    NARCIS (Netherlands)

    P.E.H.M. Muris (Peter); A.P. Field (Andy)

    2010-01-01

    textabstractRachman's (Behaviour Research and Therapy 15:372-387, 1977; Clinical Psychology Review 11:155-173, 1991) three pathways theory proposed that childhood fears not only arise as a consequence of direct learning experiences, but can also be elicited by means of threat information

  5. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  6. THE THEORY OF CIVILIZATIONS THROUGH THE LENS OF CONTEMPORARY HUMANITIES

    Directory of Open Access Journals (Sweden)

    T. V. Danylova

    2016-06-01

    Full Text Available Purpose. This paper invites reflections on the further development of civilizational theory through the lens of contemporary humanities. It argues that philosophy is one of the key dimensions of the integral theory of civilizations. The purpose is to promote dialogue-rich interdisciplinary civilizational approach with philosophical understanding of human essence at its core. Methodology. The author has used comparative historical analysis, along with hermeneutical methodology and interdisciplinary approach. Theoretical basis and results. Faced with the challenges of our time, researchers are turning to the civilizational approach, according to which world history appears to us as a colourful spectrum of the options for the development of humanity. At the present stage of scientific development the integral theory of civilizations seems to be the most productive tool for the interpretation of the events taking place in our world. Origianlity. The problem of human being is a key factor in understanding the dynamics of civilizational process and designing a promising theory of civilizations. Philosophy should occupy an important place in the development of a new theory of civilizations: philosophy is the spiritual quintessence of every epoch, every cultural and civilizational community. In particular, a new theory has to take into account both classic and contemporary investigations in the field of philosophical anthropology and theory of values. The increasing threat posed by the clash of civilizations can become a swan song of humanity. For the preservation and further development of the world civilization, there is no other choice but to elaborate the strategies, mechanisms for consultation and dialogue, cooperation and partnership of civilizations and states. That is why the urgent task is to create the certain philosophical position that will contribute to mutual understanding. Conclusions. It is important to involve philosophers in the

  7. Religion, evolution, and mental health: attachment theory and ETAS theory.

    Science.gov (United States)

    Flannelly, Kevin J; Galek, Kathleen

    2010-09-01

    This article reviews the historical origins of Attachment Theory and Evolutionary Threat Assessment Systems Theory (ETAS Theory), their evolutionary basis and their application in research on religion and mental health. Attachment Theory has been most commonly applied to religion and mental health in research on God as an attachment figure, which has shown that secure attachment to God is positively associated with psychological well-being. Its broader application to religion and mental health is comprehensively discussed by Kirkpatrick (2005). ETAS Theory explains why certain religious beliefs--including beliefs about God and life-after-death--should have an adverse association, an advantageous association, or no association at all with mental health. Moreover, it makes specific predictions to this effect, which have been confirmed, in part. The authors advocate the application of ETAS Theory in research on religion and mental health because it explains how religious and other beliefs related to the dangerousness of the world can directly affect psychiatric symptoms through their affects on specific brain structures.

  8. Differential Galois theory and non-integrability of planar polynomial vector fields

    Science.gov (United States)

    Acosta-Humánez, Primitivo B.; Lázaro, J. Tomás; Morales-Ruiz, Juan J.; Pantazi, Chara

    2018-06-01

    We study a necessary condition for the integrability of the polynomials vector fields in the plane by means of the differential Galois Theory. More concretely, by means of the variational equations around a particular solution it is obtained a necessary condition for the existence of a rational first integral. The method is systematic starting with the first order variational equation. We illustrate this result with several families of examples. A key point is to check whether a suitable primitive is elementary or not. Using a theorem by Liouville, the problem is equivalent to the existence of a rational solution of a certain first order linear equation, the Risch equation. This is a classical problem studied by Risch in 1969, and the solution is given by the "Risch algorithm". In this way we point out the connection of the non integrability with some higher transcendent functions, like the error function.

  9. Integrable model of Yang-Mills theory with scalar field and quasi-instantons

    International Nuclear Information System (INIS)

    Yatsun, V.A.

    1988-01-01

    In the framework of Euclidean conformally invariant Yang-Mills theory with a scalar field a study is made of a Hamiltonian system with two degrees of freedom that is integrable for a definite relationship between the coupling constants. A particular solution of the Hamilton-Jacobi equation leads to first-order equations that ensure a nonself-dual solution of instanton type of the considered model. As generalization of the first-order equations a quasiself-dual equation that can be integrated by means of the 't Hooft ansatz and leads to quasiself-dual instantons - quasi-instantons - is proposed

  10. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Science.gov (United States)

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a...

  11. Positive Perception of Aging and Performance in a Memory Task: Compensating for Stereotype Threat?

    Science.gov (United States)

    Fernández-Ballesteros, Rocío; Bustillos, Antonio; Huici, Carmen

    2015-01-01

    BACKGROUND/STUDY CONTEXT: The aim of this research is to explore whether segments of seniors might be immune to aging stereotypes of the older adult group. Stereotype threat research indicates that older adults show low memory recall under conditions of stereotype threat. Stereotype internalization theory (Levy, 2009) predicts that a positive perception of aging has favorable effects on the behavior and health of older people. A total of 112 older adult participants (62% women, aged 55 to 78) attending the University Programme for Older Adults were assigned to one of two conditions: stereotype threat condition and positive information condition. A control group was included from participants in the same program (n = 34; 61% women, aged 55 to 78). Individual differences in self-perception of aging were considered as continuous variable. Participants with better self-perception of aging showed better memory performance than those with poorer self-perception of aging in the stereotype threat condition and control condition. However, no differences were found in the positive information condition between participants with high and low self-perception of aging. These results indicate that positive self-perception of aging moderates the effects of stereotype threat, and that positive information promotes better memory performance for those older adults with a poorer self-perception of aging. As expected, individuals with a positive perception of their own aging were less vulnerable to the activation of a negative older adult stereotype in the stereotype threat condition.

  12. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  13. Evolution of the perception of the threats to security in Spain

    Directory of Open Access Journals (Sweden)

    Rafael Grasa

    1993-07-01

    Full Text Available security was internal, in other words, subversion and opposition to the regime. Public opinion, however, revealed that characteristics very different to those in the context of the western block existed, such as a void perception of the soviet threat as opposed to a marked antiamericanism for its support of the regime.This legacy of threats weighed heavily during the transition together with the existence of a cleavage between the armed forces, the political actors and public opinion regarding the real necessity of intergration into NATO. In the eighties there exists a clear differentiation between the threats perceived by public opinion and those considered by the political elites. With regard to the former,serious threats to Spain do not exist. only certain concerns when the subject of security took on importance in the field of public opinion, such as during the referendum campaign over NATO in 1986 which was mixed with the scarce perception of the soviet threat, theconstant danger represented by the United States and the slight rise in those who believed in the Moroccan threat, and the impact of the Gulf War in 1991 and the consequent increase of the threat represented by the arab countries. For the political actors, the mainthreat contemplated was the protection of territorial integrity on a stage closer to the western Mediterranean instead of a global threat to the western block something only considered at a theoretical level with the strategic concept of Spanish defence within the framework of participation in NATO.From 1992 onwards with the Defence Directive, the threat concept is replaced by that of risk and which recovers the importance given over to North Africa. It is argued in the belief that security is indivisible and must be shared not only with the European members. A greater convergence is also initiated in the nineties between the political actors and public opinion with respect to considering what are the risks in a global

  14. Decentralised bioenergy systems: A review of opportunities and threats

    International Nuclear Information System (INIS)

    Mangoyana, Robert B.; Smith, Timothy F.

    2011-01-01

    Decentralised bioenergy systems are receiving increasing attention due to the potential ability to support local development, create local employment, and contribute to climate change mitigation. These issues, along with other bioenergy sustainability issues, are reviewed through eighteen international case studies with the objective of identifying opportunities and threats to decentralised bioenergy systems. The case studies were selected based on feedstock type, bioenergy type, production capacity, synergistic alliances, ownership structure and physical locations. This variation was used to provide a basis for evaluating opportunities and threats from different contexts. Commercial viability remains the primary concern for the sustainability of decentralised bioenergy systems. There are, however, opportunities for compounding benefits through integrating small scale decentralised bioenergy systems with other production systems. Integrated production, including closed loop models, allow waste materials from one process to be used as inputs in other production processes, and thereby increasing economic, social and environmental outcomes. Synergistic opportunities along the bioenergy production chain, which include feedstock production, bioenergy marketing and distribution could also be exploited by communities and other investors to minimise decentralised production risk. - Research Highlights: → Small scale decentralised bioenergy production is a potentially sustainable energy system. →Economic viability limits small scale decentralised bioenergy production. → Synergistic alliances along the bioenergy production chain could enhance viability.

  15. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  16. IDENTITY AND INTERESTS IN EUROPEAN INTEGRATION THEORY: THE INSTITUTIONALIZATION OF THE CFSP

    Directory of Open Access Journals (Sweden)

    HORIA BARBULESCU

    2011-04-01

    Full Text Available The paper aims to analyze the evolution of the Common Foreign and Security Policy from the stand point of two competing approaches: the intergovernmentalist theory, based on rational institutionalism, and the constructivist theories in integration studies. I also attempt an evaluation of their analytical importance inside the theoretical research concerning CFSP. The contribution of this paper lies in emphasizing that even if interests, material and negotiation power and asymmetrical interdependence are useful starting points in analyzing the potential influence of states on early institutional evolution, power alone does not explain the final outcomes of this evolution or of the policies pursued inside the CFSP.

  17. A Comprehensive Theory of Integration.

    Science.gov (United States)

    Singer, Sara J; Kerrissey, Michaela; Friedberg, Mark; Phillips, Russell

    2018-03-01

    Efforts to transform health care delivery to improve care have increasingly focused on care integration. However, variation in how integration is defined has complicated efforts to design, synthesize, and compare studies of integration in health care. Evaluations of integration initiatives would be enhanced by describing them according to clear definitions of integration and specifying which empirical relationships they seek to test-whether among types of integration or between integration and outcomes of care. Drawing on previous work, we present a comprehensive theoretical model of relationships between types of integration and propose how to measure them.

  18. Artificial Intelligence: Threat or Boon to Radiologists?

    Science.gov (United States)

    Recht, Michael; Bryan, R Nick

    2017-11-01

    The development and integration of machine learning/artificial intelligence into routine clinical practice will significantly alter the current practice of radiology. Changes in reimbursement and practice patterns will also continue to affect radiology. But rather than being a significant threat to radiologists, we believe these changes, particularly machine learning/artificial intelligence, will be a boon to radiologists by increasing their value, efficiency, accuracy, and personal satisfaction. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  19. Integrating critical pedagogy, feminist pedagogy, and standpoint theory;connecting classroom learning with democratic citizenship

    OpenAIRE

    Ganote, Cynthia

    2012-01-01

    In this paper, I argue that processes stemming from feminist pedagogy and feminist standpoint theory can be used to enact two central goals of critical pedagogy in the classroom, those of creating a co-intentional educational space and of pursuing conscientização. Further, this integration of critical and feminist pedagogies and standpoint theory allows educators to model multicultural democracy and hone the tools of democratic citizenry with students in an emergent process that connects poli...

  20. An integrated theory of attention and decision making in visual signal detection.

    Science.gov (United States)

    Smith, Philip L; Ratcliff, Roger

    2009-04-01

    The simplest attentional task, detecting a cued stimulus in an otherwise empty visual field, produces complex patterns of performance. Attentional cues interact with backward masks and with spatial uncertainty, and there is a dissociation in the effects of these variables on accuracy and on response time. A computational theory of performance in this task is described. The theory links visual encoding, masking, spatial attention, visual short-term memory (VSTM), and perceptual decision making in an integrated dynamic framework. The theory assumes that decisions are made by a diffusion process driven by a neurally plausible, shunting VSTM. The VSTM trace encodes the transient outputs of early visual filters in a durable form that is preserved for the time needed to make a decision. Attention increases the efficiency of VSTM encoding, either by increasing the rate of trace formation or by reducing the delay before trace formation begins. The theory provides a detailed, quantitative account of attentional effects in spatial cuing tasks at the level of response accuracy and the response time distributions. (c) 2009 APA, all rights reserved

  1. On the N=1{sup ∗} gauge theory on a circle and elliptic integrable systems

    Energy Technology Data Exchange (ETDEWEB)

    Bourget, Antoine; Troost, Jan [Laboratoire de Physique Théorique, Ecole Normale Supérieure,24 rue Lhomond, 75005 Paris (France)

    2016-01-18

    We continue our study of the N=1{sup ∗} supersymmetric gauge theory on ℝ{sup 2,1}×S{sup 1} and its relation to elliptic integrable systems. Upon compactification on a circle, we show that the semi-classical analysis of the massless and massive vacua depends on the classification of nilpotent orbits, as well as on the conjugacy classes of the component group of their centralizer. We demonstrate that semi-classically massless vacua can be lifted by Wilson lines in unbroken discrete gauge groups. The pseudo-Levi subalgebras that play a classifying role in the nilpotent orbit theory are also key in defining generalized Inozemtsev limits of (twisted) elliptic integrable systems. We illustrate our analysis in the N=1{sup ∗} theories with gauge algebras su(3), su(4), so(5) and for the exceptional gauge algebra G{sub 2}. We map out modular duality diagrams of the massive and massless vacua. Moreover, we provide an analytic description of the branches of massless vacua in the case of the su(3) and the so(5) theory. The description of these branches in terms of the complexified Wilson lines on the circle invokes the Eichler-Zagier technique for inverting the elliptic Weierstrass function. After fine-tuning the coupling to elliptic points of order three, we identify the Argyres-Douglas singularities of the su(3)N=1{sup ∗} theory.

  2. Geometrical interpretation of the topological recursion, and integrable string theories

    CERN Document Server

    Eynard, Bertrand

    2009-01-01

    Symplectic invariants introduced in math-ph/0702045 can be computed for an arbitrary spectral curve. For some examples of spectral curves, those invariants can solve loop equations of matrix integrals, and many problems of enumerative geometry like maps, partitions, Hurwitz numbers, intersection numbers, Gromov-Witten invariants... The problem is thus to understand what they count, or in other words, given a spectral curve, construct an enumerative geometry problem. This is what we do in a semi-heuristic approach in this article. Starting from a spectral curve, i.e. an integrable system, we use its flat connection and flat coordinates, to define a family of worldsheets, whose enumeration is indeed solved by the topological recursion and symplectic invariants. In other words, for any spectral curve, we construct a corresponding string theory, whose target space is a submanifold of the Jacobian.

  3. Provider integration and local market conditions: a contingency theory perspective.

    Science.gov (United States)

    Young, G J; Parker, V A; Charns, M P

    2001-01-01

    In recent years we have witnessed an expanding array of organizational arrangements for providing health care services in the U.S. These arrangements integrate previously independent providers at one or more points on the continuum of care. The presence of so many of these arrangements raises the question of whether certain types are more effective than are others to help providers adapt to their environment. This article discusses contingency theory as a conceptual lens for guiding empirical studies of the effectiveness of different types of arrangements.

  4. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  5. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  6. Effective field theory and integrability in two-dimensional Mott transition

    International Nuclear Information System (INIS)

    Bottesi, Federico L.; Zemba, Guillermo R.

    2011-01-01

    Highlights: → Mott transition in 2d lattice fermion model. → 3D integrability out of 2D. → Effective field theory for Mott transition in 2d. → Double Chern-Simons. → d-Density waves. - Abstract: We study the Mott transition in a two-dimensional lattice spinless fermion model with nearest neighbors density-density interactions. By means of a two-dimensional Jordan-Wigner transformation, the model is mapped onto the lattice XXZ spin model, which is shown to possess a quantum group symmetry as a consequence of a recently found solution of the Zamolodchikov tetrahedron equation. A projection (from three to two space-time dimensions) property of the solution is used to identify the symmetry of the model at the Mott critical point as U q (sl(2)-circumflex)xU q (sl(2)-circumflex), with deformation parameter q = -1. Based on this result, the low-energy effective field theory for the model is obtained and shown to be a lattice double Chern-Simons theory with coupling constant k = 1 (with the standard normalization). By further employing the effective filed theory methods, we show that the Mott transition that arises is of topological nature, with vortices in an antiferromagnetic array and matter currents characterized by a d-density wave order parameter. We also analyze the behavior of the system upon weak coupling, and conclude that it undergoes a quantum gas-liquid transition which belongs to the Ising universality class.

  7. An Integrative Professional Theory and Practice Paper: Personal Reflections from the Journey through Clinical Pastoral Education.

    Science.gov (United States)

    McLean, Gillian

    2015-12-01

    CPE is an experience-based approach to learning spiritual care which combines clinical care with qualified supervision, in-class education and group reflection (CASC--http://www.spiritualcare.ca/). Through didactic seminars, group presentations and personal reading there is opportunity for the student to acquire, apply and integrate relevant theoretical information into their practice. Written for my CPE Specialist application, this paper describes how, through the course of advanced CPE education, I learn to utilize and integrate theory into my clinical work. Beginning with three strands--authenticity, listening and storytelling--I then discuss how the behavioural sciences and theology inform my practice. Focusing on empathy, I speak of the application of disclosure, the use of counter-transference as a diagnostic tool, and the place of therapeutic termination. Group theory, family systems theory, theological reflection, liturgical ministry, and multi-faith practices are considered. © The Author(s) 2015.

  8. A quantum group structure in integrable conformal field theories

    International Nuclear Information System (INIS)

    Smit, D.J.

    1990-01-01

    We discuss a quantization prescription of the conformal algebras of a class of d=2 conformal field theories which are integrable. We first give a geometrical construction of certain extensions of the classical Virasoro algebra, known as classical W algebras, in which these algebras arise as the Lie algebra of the second Hamiltonian structure of a generalized Korteweg-de Vries hierarchy. This fact implies that the W algebras, obtained as a reduction with respect to the nilpotent subalgebras of the Kac-Moody algebra, describe the intergrability of a Toda field theory. Subsequently we determine the coadjoint operators of the W algebras, and relate these to classical Yang-Baxter matrices. The quantization of these algebras can be carried out using the concept of a so-called quantum group. We derive the condition under which the representations of these quantum groups admit a Hilbert space completion by exploring the relation with the braid group. Then we consider a modification of the Miura transformation which we use to define a quantum W algebra. This leads to an alternative interpretation of the coset construction for Kac-Moody algebras in terms of nonlinear integrable hierarchies. Subsequently we use the connection between the induced braid group representations and the representations of the mapping class group of Riemann surfaces to identify an action of the W algebras on the moduli space of stable curves, and we give the invariants of this action. This provides a generalization of the situation for the Virasoro algebra, where such an invariant is given by the so-called Mumford form which describes the partition function of the bosonic string. (orig.)

  9. Threat and vulnerability analysis and conceptual design of countermeasures for a computer center under construction

    International Nuclear Information System (INIS)

    Rozen, A.; Musacchio, J.M.

    1988-01-01

    This project involved the assessment of a new computer center to be used as the main national data processing facility of a large European bank. This building serves as the principal facility in the country with all other branches utilizing the data processing center. As such, the building is a crucial target which may attract terrorist attacks. Threat and vulnerability assessments were performed as a basis to define and overall fully-integrated security system of passive and active countermeasures for the facility. After separately assessing the range of threats and vulnerabilities, a combined matrix of threats and vulnerabilities was used to identify the crucial combinations. A set of architectural-structural passive measures was added to the active components of the security system

  10. Integral transport theory for charged particles in electric and magnetic fields

    International Nuclear Information System (INIS)

    Boffi, V.C.; Molinari, V.G.

    1979-01-01

    An integral transport theory for charged particles which, in the presence of electric and magnetic fields, diffuse by collisions against the atoms (or molecules) of a host medium is proposed. The combined effects of both the external fields and the mechanisms of scattering, removal and creation in building up the distribution function of the charged particles considered are investigated. The eigenvalue problem associated with the sourceless case of the given physical situation is also commented. Applications of the theory to a purely velocity-dependent problem and to a space-dependent problem, respectively, are illustrated for the case of a separable isotropic scattering kernel of synthetic type. Calculations of the distribution function, of the total current density and of relevant electrical conductivity are then carried out for different specializations of the external fields. (author)

  11. A change will do us good: threats diminish typical preferences for male leaders.

    Science.gov (United States)

    Brown, Elizabeth R; Diekman, Amanda B; Schneider, Monica C

    2011-07-01

    The current research explores role congruity processes from a new vantage point by investigating how the need for change might shift gender-based leadership preferences. According to role congruity theory, favorability toward leaders results from alignment between what is desired in a leadership role and the characteristics stereotypically ascribed to the leader. Generally speaking, these processes lead to baseline preferences for male over female leaders. In this research, the authors propose that a shift in gender-based leadership preferences will emerge under conditions of threat. Because the psychological experience of threat signals a need for change, individuals will favor candidates who represent new directions in leadership rather than consistency with past directions in leadership. Specifically, they find that threat evokes an implicit preference for change over stability (Experiment 1) and gender stereotypes align women with change but men with stability (Experiments 2a and 2b). Consequently, the typical preference for male leaders is diminished, or even reversed, under threat (Experiments 3 and 4). Moreover, the shift away from typical gender-based leadership preferences occurs especially among individuals who highly legitimize the sociopolitical system (Experiment 4), suggesting that these preference shifts might serve to protect the underlying system. © 2011 by the Society for Personality and Social Psychology, Inc

  12. Cylindrical integrated optical microresonators: modeling by 3-D vectorial coupled mode theory

    Czech Academy of Sciences Publication Activity Database

    Stoffer, R.; Hiremath, K. R.; Hammer, M.; Prkna, Ladislav; Čtyroký, Jiří

    2005-01-01

    Roč. 256, 1/3 (2005), s. 46-67 ISSN 0030-4018 R&D Projects: GA ČR(CZ) GA102/05/0987 Grant - others:European Commission(XE) IST-2000-28018 NAIS Institutional research plan: CEZ:AV0Z20670512 Keywords : integrated optics * optical waveguide theory * modelling Subject RIV: JA - Electronics ; Optoelectronics, Electrical Engineering Impact factor: 1.456, year: 2005

  13. Activity Theory as a Framework for Investigating District-Classroom System Interactions and Their Influences on Technology Integration

    Science.gov (United States)

    Anthony, Anika Ball

    2012-01-01

    Technology implementation research indicates that teachers' beliefs and knowledge, as well as a host of institutional factors, can influence technology integration. Drawing on third-generation activity theory, this article conceptualizes technology implementation as a network of planning and integration activities carried out by technology…

  14. Integrating Theory, Research, and Practice in Vocational Psychology: Current Status and Future Directions

    Science.gov (United States)

    Sampson, James P., Jr., Ed.; Bullock-Yowell, Emily, Ed.; Dozier, V. Casey, Ed.; Osborn, Debra S., Ed.; Lenz, Janet G., Ed.

    2017-01-01

    This publication is based on the 2016 Society for Vocational Psychology (SVP) Biennial Conference, that was held at the Florida State University on May 16-17, 2016. The conference theme was "Integrating Theory, Research, and Practice in Vocational Psychology." The conference content and the resulting edited book are based on the…

  15. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  16. Research on Disaster Early Warning and Disaster Relief Integrated Service System Based on Block Data Theory

    Science.gov (United States)

    Yang, J.; Zhang, H.; Wang, C.; Tang, D.

    2018-04-01

    With the continuous development of social economy, the interaction between mankind and nature has become increasingly evident. Disastrous global catastrophes have occurred from time to time, causing huge losses to people's lives and property. All governments recognize the importance of the establishment of disaster early warning and release mechanisms, and it is also an urgent issue to improve the comprehensive service level of emergency response and disaster relief. However, disaster early warning and emergency relief information is usually generated by different departments, and the diverse data sources, difficult integration, and limited release speed have always been difficult issues to be solved. Block data is the aggregation of various distributed (point data) and segmentation (data) big data on a specific platform and make them happen continuous polymerization effect, block data theory is a good solution to cross-sectoral, cross-platform Disaster information data sharing and integration problems. This paper attempts to discuss the integrated service mechanism of disaster information aggregation and disaster relief based on block data theory and introduces a location-based integrated service system for disaster early warning and disaster relief.

  17. Pursuing Improvement in Clinical Reasoning: The Integrated Clinical Education Theory.

    Science.gov (United States)

    Jessee, Mary Ann

    2018-01-01

    The link between clinical education and development of clinical reasoning is not well supported by one theoretical perspective. Learning to reason during clinical education may be best achieved in a supportive sociocultural context of nursing practice that maximizes reasoning opportunities and facilitates discourse and meaningful feedback. Prelicensure clinical education seldom incorporates these critical components and thus may fail to directly promote clinical reasoning skill. Theoretical frameworks supporting the development of clinical reasoning during clinical education were evaluated. Analysis of strengths and gaps in each framework's support of clinical reasoning development was conducted. Commensurability of philosophical underpinnings was confirmed, and complex relationships among key concepts were elucidated. Six key concepts and three tenets comprise an explanatory predictive theory-the integrated clinical education theory (ICET). ICET provides critical theoretical support for inquiry and action to promote clinical education that improves development of clinical reasoning skill. [J Nurs Educ. 2018;57(1):7-13.]. Copyright 2018, SLACK Incorporated.

  18. An Integrated Theory of Thinking and Speaking that Draws on Vygotsky and Bakhtin/Vološinov

    Directory of Open Access Journals (Sweden)

    Wolff-Michael Roth

    2013-10-01

    Full Text Available Vygotsky’s social-psychological theory of human development and Bakhtin/Vološinov’s theory of language and the dialogical nature of thought have received increasing interest in the educational research literature but tend to remain unrelated even where co-citation occurs. In this article, I first present a model that integrates the fundamentally common features in the two approaches and present a table with the correspondences of the theoretical terms across four European languages; the model thereby integrates the psychological and sociological dimensions at the heart of the two approaches. I then articulate and elaborate on six main issues that are relevant to and have implications for research: (a sensual life as integrative unit, (b self-movement and development, (c the nested relations between activity and living utterance, (d signification, (e vernacular as the origin and locus of development, and (f unit analysis.

  19. Unified path integral approach to theories of diffusion-influenced reactions

    Science.gov (United States)

    Prüstel, Thorsten; Meier-Schellersheim, Martin

    2017-08-01

    Building on mathematical similarities between quantum mechanics and theories of diffusion-influenced reactions, we develop a general approach for computational modeling of diffusion-influenced reactions that is capable of capturing not only the classical Smoluchowski picture but also alternative theories, as is here exemplified by a volume reactivity model. In particular, we prove the path decomposition expansion of various Green's functions describing the irreversible and reversible reaction of an isolated pair of molecules. To this end, we exploit a connection between boundary value and interaction potential problems with δ - and δ'-function perturbation. We employ a known path-integral-based summation of a perturbation series to derive a number of exact identities relating propagators and survival probabilities satisfying different boundary conditions in a unified and systematic manner. Furthermore, we show how the path decomposition expansion represents the propagator as a product of three factors in the Laplace domain that correspond to quantities figuring prominently in stochastic spatially resolved simulation algorithms. This analysis will thus be useful for the interpretation of current and the design of future algorithms. Finally, we discuss the relation between the general approach and the theory of Brownian functionals and calculate the mean residence time for the case of irreversible and reversible reactions.

  20. Direction of attention bias to threat relates to differences in fear acquisition and extinction in anxious children.

    Science.gov (United States)

    Waters, Allison M; Kershaw, Rachel

    2015-01-01

    Anxious children show attention biases towards and away from threat stimuli. Moreover, threat avoidance compared to vigilance predicts a poorer outcome from exposure-based treatments, such as cognitive-behavioural therapy (CBT), yet the mechanisms underlying this differential response are unclear. Pavlovian fear conditioning is a widely accepted theory to explain the acquisition and extinction of fear, including exposure-based treatments, such as CBT. In typical fear conditioning experiments, anxious children have shown larger physiological responses to an aversive unconditional stimulus (i.e., US on CS+ trials) and to non-reinforced stimuli (CS-) during fear acquisition and to both CSs during fear extinction compared to non-anxious peers. This study examined whether threat avoidance compared to threat vigilance was related to differences in fear acquisition and extinction in anxious children. Thirty-four clinically-anxious children completed a visual probe task including angry-neutral face pairs to determine the direction of threat attention bias as well as a discriminant conditioning and extinction task in which a geometric shape CS+ was paired with an aversive tone US, while the CS- geometric shape was always presented alone during acquisition trials. Both CSs were presented alone during extinction trials. Fear acquisition and extinction were indexed by skin conductance responses (SCR) and subjective measures. Children were classified as threat vigilant (N = 18) and threat avoidant (n = 16) based on the direction of threat attention bias on the visual probe task. During acquisition, threat avoidant relative to threat vigilant anxious children displayed larger orienting SCRs to both CSs during the first block of trials and larger third interval SCRs to the US on CS+ trials as well as on CS- trials. During extinction, threat avoidant anxious children showed delayed extinction of SCRs to both the CS+ and CS- and reported higher subjective anxiety ratings after

  1. Development of a theory of implementation and integration: Normalization Process Theory

    Directory of Open Access Journals (Sweden)

    May Carl R

    2009-05-01

    Full Text Available Abstract Background Theories are important tools in the social and natural sciences. The methods by which they are derived are rarely described and discussed. Normalization Process Theory explains how new technologies, ways of acting, and ways of working become routinely embedded in everyday practice, and has applications in the study of implementation processes. This paper describes the process by which it was built. Methods Between 1998 and 2008, we developed a theory. We derived a set of empirical generalizations from analysis of data collected in qualitative studies of healthcare work and organization. We developed an applied theoretical model through analysis of empirical generalizations. Finally, we built a formal theory through a process of extension and implication analysis of the applied theoretical model. Results Each phase of theory development showed that the constructs of the theory did not conflict with each other, had explanatory power, and possessed sufficient robustness for formal testing. As the theory developed, its scope expanded from a set of observed regularities in data with procedural explanations, to an applied theoretical model, to a formal middle-range theory. Conclusion Normalization Process Theory has been developed through procedures that were properly sceptical and critical, and which were opened to review at each stage of development. The theory has been shown to merit formal testing.

  2. A Risk Management Approach to the "Insider Threat"

    Science.gov (United States)

    Bishop, Matt; Engle, Sophie; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

    Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, manydefine it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policyin a form that can be implemented on a computer system or network, createsgaps in enforcement. This paper defines "insider" precisely, in termsof thesegaps, andexploresan access-based modelfor analyzing threats that include those usually termed "insider threats." This model enables an organization to order its resources based on thebusinessvalue for that resource andof the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which usersareatthe greatestriskofacting inappropriately. We concludebyexamining how to merge this model with one of forensic logging and auditing.

  3. Quantum measure and integration theory

    International Nuclear Information System (INIS)

    Gudder, Stan

    2009-01-01

    This article begins with a review of quantum measure spaces. Quantum forms and indefinite inner-product spaces are then discussed. The main part of the paper introduces a quantum integral and derives some of its properties. The quantum integral's form for simple functions is characterized and it is shown that the quantum integral generalizes the Lebesgue integral. A bounded, monotone convergence theorem for quantum integrals is obtained and it is shown that a Radon-Nikodym-type theorem does not hold for quantum measures. As an example, a quantum-Lebesgue integral on the real line is considered.

  4. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  5. Residents’ Attitude toward Aboriginal Cultural Tourism Development: An Integration of Two Theories

    Directory of Open Access Journals (Sweden)

    Chi-Ming Hsieh

    2017-05-01

    Full Text Available Understanding residents’ attitudes is critical for successfully developing cultural tourism in aboriginal protected areas. This study developed an integration model combining two theories to identify the key determinants of indigenous residents’ attitudes toward cultural tourism development. Social exchange theory stresses the impact of the benefits derived from tourism on indigenous residents’ attitudes toward tourism development. Social capital theory embeds clear rationales for strengthening the internalization process of the formation of residents’ shared values and understanding, enabling them to trust each other and thus support tourism development. The present study was conducted within two indigenous communities in Eastern Taiwan. The results revealed that cultural tourism benefits and structural and relational capital effectively predict indigenous residents’ attitudes toward tourism development; structural capital plays a critical mediating role in the relationship between tourism benefits and residents’ attitudes. The managerial implications provide recommendations for aboriginal community developers or practical sectors to avoid problems or costs caused by tourism development when promoting cultural tourism activities within indigenous communities.

  6. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  7. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Theory-laden experimentation

    DEFF Research Database (Denmark)

    Schindler, Samuel

    2013-01-01

    light bending in 1919 by Eddington and others) to show that TDRs are used by scientists to resolve data conflicts. I argue that the rationality of the practices which employ TDRs can be saved if the independent support of the theories driving TDRs is construed in a particular way.......The thesis of theory-ladenness of observations, in its various guises, is widely considered as either ill-conceived or harmless to the rationality of science. The latter view rests partly on the work of the proponents of New Experimentalism who have argued, among other things, that experimental...... practices are efficient in guarding against any epistemological threat posed by theory-ladenness. In this paper I show that one can generate a thesis of theory-ladenness for experimental practices from an influential New Experimentalist account. The notion I introduce for this purpose is the concept...

  9. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. Social psychological origins of conspiracy theories: The case of the Jewish conspiracy theory in Malaysia

    OpenAIRE

    Viren eSwami; Viren eSwami

    2012-01-01

    Two studies examined correlates of belief in a Jewish conspiracy theory among Malays in Malaysia, a culture in which state-directed conspiracism as a means of dealing with perceived external and internal threats is widespread. In Study 1, 368 participants from Kuala Lumpur, Malaysia, completed a novel measure of belief in a Jewish conspiracy theory, along with measures of general conspiracist ideation and anomie. Initial analysis showed that the novel scale factorially reduced to a single dim...

  11. Social Psychological Origins of Conspiracy Theories: The Case of the Jewish Conspiracy Theory in Malaysia

    OpenAIRE

    Swami, Viren

    2012-01-01

    Two studies examined correlates of belief in a Jewish conspiracy theory among Malays in Malaysia, a culture in which state-directed conspiracism as a means of dealing with perceived external and internal threats is widespread. In Study 1, 368 participants from Kuala Lumpur, Malaysia, completed a novel measure of belief in a Jewish conspiracy theory, along with measures of general conspiracist ideation, and anomie. Initial analysis showed that the novel scale factorially reduced to a single di...

  12. Integrated care: theory to practice.

    Science.gov (United States)

    Stokes, Jonathan; Checkland, Kath; Kristensen, Søren Rud

    2016-10-01

    'Integrated care' is pitched as the solution to current health system challenges. In the literature, what integrated care actually involves is complex and contested. Multi-disciplinary team case management is frequently the primary focus of integrated care when implemented internationally. We examine the practical application of integrated care in the NHS in England to exemplify the prevalence of the case management focus. We look at the evidence for effectiveness of multi-disciplinary team case management, for the focus on high-risk groups and for integrated care more generally. We suggest realistic expectations of what integration of care alone can achieve and additional research questions. © The Author(s) 2016.

  13. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    Science.gov (United States)

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  14. Functional determinants in gauge theory and string theory

    International Nuclear Information System (INIS)

    Della Pietra, V.J.

    1988-01-01

    Determinants arise whenever Gaussian functional integrals are evaluated. As a result, they are pervasive in physics. In this thesis the author studied, in a mathematically precise fashion, some questions concerning functional determinants in Quantum Field Theory and String Theory. The emphasis is on deriving explicit general identities which can be applied to physical problems. In Chapters 1-3, he studies determinants of families of Weyl operators on compact manifolds. The motivation for this work comes from Chiral Gauge Theory. In a theory containing chiral Fermions coupled to Bosons y, a partial integration in the functional integral over the Fermi fields yields terms involving determinants of Weyl operators ∂y. In Chapter 4 he turns his attention to a problem in String Theory. In the Polyakov formulation of string perturbation theory, the partition function and scattering amplitudes are calculated as sums of contributions from different world sheet topologies. The contribution from surfaces of a particular topology is given by a functional integral, which, after gauge-fixing, can be expressed as an integral of a certain measure over an appropriate moduli space. For an arbitrary finite group acting on a compact manifold, he defines an analytic torsion for the invariant subcomplex of the de Rham complex, generalizing the definition given by Ray and Singer in the absence of a group action. Motivated by the work of Quillen, he uses this torsion to define a natural norm on the determinant line of the invariant cohomology

  15. The Role of Verbal Threat Information in the Development of Childhood Fear. "Beware the Jabberwock!"

    Science.gov (United States)

    Muris, Peter; Field, Andy P.

    2010-01-01

    Rachman's ("Behaviour Research and Therapy" 15:372-387, 1977; "Clinical Psychology Review" 11:155-173, 1991) three pathways theory proposed that childhood fears not only arise as a consequence of direct learning experiences, but can also be elicited by means of threat information transmission. This review looks at the scientific evidence for this…

  16. Integration of Information Literacy into the Curriculum: Constructive Alignment from Theory into Practice

    Directory of Open Access Journals (Sweden)

    Claes Dahlqvist

    2016-12-01

    Full Text Available Librarian-teacher cooperation is essential for the integration of information literacy into course syllabi. Therefore, a common theoretical and methodological platform is needed. As librarians at Kristianstad University we have had the opportunity to develop such a platform when teaching information literacy in a basic course for teachers in higher education pedagogy. Information literacy is taught in context with academic writing, distance learning and teaching, and development of course syllabi. Constructive Alignment in Theory: We used constructive alignment in designing our part of the course. John Biggs’ ideas tell us that assessment tasks (ATs should be aligned to what is intended to be learned. Intended learning outcomes (ILOs specify teaching/learning activities (TLAs based on the content of learning. TLAs should be designed in ways that enable students to construct knowledge from their own experience. The ILOs for the course are to have arguments for the role of information literacy in higher education and ideas of implementing them in TLAs. The content of learning is for example the concept of information literacy, theoretical perspectives and constructive alignment for integration in course syllabi. TLAs are written pre-lecture reflections on the concept of information literacy, used as a starting point for the three-hour seminar. Learning reflections are written afterwards. The AT is to revise a syllabus (preferably using constructive alignment for a course the teacher is responsible for, where information literacy must be integrated with the other parts and topics of the course. Constructive Alignment in Practice: Using constructive alignment has taught us that this model serves well as the foundation of the theoretical and methodological platform for librarian-teacher cooperation when integrating information literacy in course syllabi. It contains all important aspects of the integration of information literacy in course

  17. Ontology-based Vaccine and Drug Adverse Event Representation and Theory-guided Systematic Causal Network Analysis toward Integrative Pharmacovigilance Research.

    Science.gov (United States)

    He, Yongqun

    2016-06-01

    Compared with controlled terminologies ( e.g. , MedDRA, CTCAE, and WHO-ART), the community-based Ontology of AEs (OAE) has many advantages in adverse event (AE) classifications. The OAE-derived Ontology of Vaccine AEs (OVAE) and Ontology of Drug Neuropathy AEs (ODNAE) serve as AE knowledge bases and support data integration and analysis. The Immune Response Gene Network Theory explains molecular mechanisms of vaccine-related AEs. The OneNet Theory of Life treats the whole process of a life of an organism as a single complex and dynamic network ( i.e. , OneNet). A new "OneNet effectiveness" tenet is proposed here to expand the OneNet theory. Derived from the OneNet theory, the author hypothesizes that one human uses one single genotype-rooted mechanism to respond to different vaccinations and drug treatments, and experimentally identified mechanisms are manifestations of the OneNet blueprint mechanism under specific conditions. The theories and ontologies interact together as semantic frameworks to support integrative pharmacovigilance research.

  18. When a threat to the brand is a threat to the self: the importance of brand identification and implicit self-esteem in predicting defensiveness.

    Science.gov (United States)

    Lisjak, Monika; Lee, Angela Y; Gardner, Wendi L

    2012-09-01

    This research examines how people respond when a commercial brand they identify with is threatened. Across four studies, the authors found that among participants who identified with a brand, a threat to the brand elicited the same responses as a threat to the self. Specifically, participants with low implicit self-esteem defended the brand when the self was activated, unlike their high implicit self-esteem counterparts. In addition, brand defense was reduced when individuals had the opportunity to affirm a valued aspect of their self-concept. These findings suggest that when a brand that people identify with is threatened, they may defend the brand to preserve the integrity of the self. More broadly, these findings are consistent with the notion that brands may be included into the extended self-concept, which supports William James's original ideas concerning the breadth and heterogeneity of the self.

  19. When does risk perception predict protection motivation for health threats? A person-by-situation analysis

    Science.gov (United States)

    Klein, William M. P.; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation. PMID:29494705

  20. When does risk perception predict protection motivation for health threats? A person-by-situation analysis.

    Science.gov (United States)

    Ferrer, Rebecca A; Klein, William M P; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation.

  1. An integrated model of clinical reasoning: dual-process theory of cognition and metacognition.

    Science.gov (United States)

    Marcum, James A

    2012-10-01

    Clinical reasoning is an important component for providing quality medical care. The aim of the present paper is to develop a model of clinical reasoning that integrates both the non-analytic and analytic processes of cognition, along with metacognition. The dual-process theory of cognition (system 1 non-analytic and system 2 analytic processes) and the metacognition theory are used to develop an integrated model of clinical reasoning. In the proposed model, clinical reasoning begins with system 1 processes in which the clinician assesses a patient's presenting symptoms, as well as other clinical evidence, to arrive at a differential diagnosis. Additional clinical evidence, if necessary, is acquired and analysed utilizing system 2 processes to assess the differential diagnosis, until a clinical decision is made diagnosing the patient's illness and then how best to proceed therapeutically. Importantly, the outcome of these processes feeds back, in terms of metacognition's monitoring function, either to reinforce or to alter cognitive processes, which, in turn, enhances synergistically the clinician's ability to reason quickly and accurately in future consultations. The proposed integrated model has distinct advantages over other models proposed in the literature for explicating clinical reasoning. Moreover, it has important implications for addressing the paradoxical relationship between experience and expertise, as well as for designing a curriculum to teach clinical reasoning skills. © 2012 Blackwell Publishing Ltd.

  2. Unbounded representations of symmetry groups in gauge quantum field theory. II. Integration

    International Nuclear Information System (INIS)

    Voelkel, A.H.

    1986-01-01

    Within the gauge quantum field theory of the Wightman--Garding type, the integration of representations of Lie algebras is investigated. By means of the covariance condition (substitution rules) for the basic fields, it is shown that a form skew-symmetric representation of a Lie algebra can be integrated to a form isometric and in general unbounded representation of the universal covering group of a corresponding Lie group provided the conditions (Nelson, Sternheimer, etc.), which are well known for the case of Hilbert or Banach representations, hold. If a form isometric representation leaves the subspace from which the physical Hilbert space is obtained via factorization and completion invariant, then the same is proved to be true for its differential. Conversely, a necessary and sufficient condition is derived for the transmission of the invariance of this subspace under a form skew-symmetric representation of a Lie algebra to its integral

  3. Formulation of invariant functional integrals and applications to the quantization of gauge theories

    International Nuclear Information System (INIS)

    Botelho, L.C.L.

    1985-01-01

    Introducting a metrical structure into the Configuration Space of Quantum Field Theories with Infinite-Dimensional symetry group, a formulation of Invariant Functional Integrals suitable for their quantization, is obtained. It is apllied to Gauge Theories of Yang-Mills and Polyakov's Bosonic String; obtaining several new facts about them, as well as reproducing some well known results. By following the general idea of invariant functional measures; a fermionic (chiral) change of variables in the fermionic sector of two-dimensional massless Quantum-Chromodynamics is implemented obtaining by the first time, a pure gluonic effective action for the model. In adittion, the complete solution for the Rothe-Stamatesu Model, is obtained. (author) [pt

  4. Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies

    Directory of Open Access Journals (Sweden)

    Paulina Silva

    2016-12-01

    Full Text Available Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC; while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals.

  5. To the Question on the Nature of Military Threats and Non-Military Responses

    Directory of Open Access Journals (Sweden)

    Sambu R. Tsyrendorzhjyev

    2015-01-01

    Full Text Available The notion of "military danger, military threats, military and non-military measures to Parry, and other definitions from the policy of the State to ensure the military security of the now widely used in journalism, conceptual, other documents and research. The attentive reader it is not difficult to notice the ambiguity in the interpretation of these concepts. This makes it difficult to not only the perception of the relevant topics for ensuring military security publications, but also the development of the theory and practice of ensuring the defence and security of the State. The author's view on the essence of the reasoning logic of non-military measures to counter military threats, as the ultimate goal of the article is the following.First the task of analyzing the concept of "national security", "object of national security" and understand the functions of the State, society and the individual to ensure national security. Decomposition of an object of national security, which is "national property" (the content of the concepts described in the article has made it possible to substantiate the basis for classification of national security threats and with better understanding of the nature, variety, Genesis. This provided a rationale for the role and the place of the tasks ensuring military security in the common task of ensuring national security, the correlation of military and non-military threats.The final phase of the research, the results of which are set out in the article is devoted to analysis of military threats, which made it possible to identify their main structural elements: source, media, military-political and strategic nature, install the main factors defining the content of these elements and their interaction. Based on these results, the proposed definition of the essence of non-military measures for counteracting of military threats, as well as guidelines for developing these measures.

  6. Conservation of resources theory in nurse burnout and patient safety.

    Science.gov (United States)

    Prapanjaroensin, Aoyjai; Patrician, Patricia A; Vance, David E

    2017-11-01

    To examine how the Conservation of Resources theory explains burnout in the nursing profession. Burnout, which is an accumulation of work-related mental stress in people-oriented occupations, has been an issue of concern for decades for healthcare workers, especially nurses. Yet, few studies have examined a unified theory that explains the aetiology, progression and consequences of nurse burnout. This discussion article integrates current knowledge on nurse burnout using Conservation of Resources theory, which focuses on four resources (i.e., objects, conditions, personal characteristics and energy). The databases that were used in this study included CINAHL, PubMed and PsycINFO. All reviewed articles were published between January 2006 - June 2016. The Conservation of Resources theory explains that burnout will occur as a result of perceived or actual loss of these four resources. Furthermore, nurse burnout could affect work performance, leading to lower alertness and overall quality of care. Healthcare organizations and nursing administration should develop strategies to protect nurses from the threat of resource loss to decrease nurse burnout, which may improve nurse and patient safety. The Conservation of Resources theory can guide interventions to decrease burnout and future research that examines the relationship between professional nurse burnout and patient safety. The Conservation of Resources theory explains the aetiology, progression and consequences of nurse burnout. Future studies must explore whether nurse performance is a mediating factor between nurse burnout and patient safety. © 2017 John Wiley & Sons Ltd.

  7. Threat, fear, and persuasion: review and critique of questions about functional form

    OpenAIRE

    Shen, Lijiang; Dillard, James Price

    2014-01-01

    Theories of threat appeals have been rightly concerned with the form of the relationship between fear and persuasion: Linear or curvilinear. They have not, however, clearly distinguished the question as a between- or within-persons phenomenon. In fact, the literature often treats these two perspectives as if they were interchangeable. We show that between- versus within-person questions about functional form are distinct from one another. Previous research, which is the product of between-pe...

  8. Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques

    Directory of Open Access Journals (Sweden)

    J. Bruce Johnson

    2014-01-01

    Full Text Available Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity and sampling time scales (from passive mines to rapid rate of march convoy protection for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system possessing a high level of sensitivity to threat agents and a moderate standoff real-time capability appropriate for portal screening of personnel or vehicles. In this work, we focus on several promising, and potentially synergistic, laser-based methods for sensing threat agents. For each method, we have briefly outlined the technique and report on the current level of capability.

  9. Integrating IS and HCI Using Activity Theory as a Philosophical and Theoretical Basis

    Directory of Open Access Journals (Sweden)

    Helen Hasan

    1999-05-01

    Full Text Available The fields of Information Systems (IS and Human Computer Interaction (HCI are both multidisciplinary in nature and each is searching for an identity as a legitimate discipline in its own right, with a firm theoretical basis. Activity Theory offers a set of concepts, structures and terms which are eminently suited to both fields. It has its origins in the cultural historical psychology of Russia, and avoids the dichotomies between thought and action, and between individuals and society, that are prevalent in western thinking. This paper describes the basic principles of Activity Theory as they apply to IS and HCI, with particular emphasis on those systems which provide knowledge about the progress of their organisation to senior managers. Activity Theory principles will be used in a longitudinal case study to analyse an extensive project which attempted, with limited success, to produce management support systems in an organisation. The Activity Theory analysis indicates that an integrated IS and HCI approach would have improved the outcomes of this project.

  10. From behavior to neural dynamics: An integrated theory of attention

    Science.gov (United States)

    Buschman, Timothy J.; Kastner, Sabine

    2015-01-01

    The brain has a limited capacity and therefore needs mechanisms to selectively enhance the information most relevant to one’s current behavior. We refer to these mechanisms as ‘attention’. Attention acts by increasing the strength of selected neural representations and preferentially routing them through the brain’s large-scale network. This is a critical component of cognition and therefore has been a central topic in cognitive neuroscience. Here we review a diverse literature that has studied attention at the level of behavior, networks, circuits and neurons. We then integrate these disparate results into a unified theory of attention. PMID:26447577

  11. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  12. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    Science.gov (United States)

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  13. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    Directory of Open Access Journals (Sweden)

    Mohamed S. Abdalzaher

    2016-06-01

    Full Text Available We present a study of using game theory for protecting wireless sensor networks (WSNs from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  14. When and how experienced incivility dissuades proactive performance: An integration of sociometer and self-identity orientation perspectives.

    Science.gov (United States)

    Schilpzand, Pauline; Huang, Lei

    2018-04-16

    In this article we build on relational Sociometer Theory (Leary, 2005; Leary & Baumeister, 2000) to posit the impact of the belongingness threat of experienced incivility in one's work team on employee feelings of ostracism and subsequent engagement in proactive performance. Integrating the social-relational framework of Self-Identity Orientation Theory (Brewer & Gardner, 1996; Cooper & Thatcher, 2010), we nuance our predictions by hypothesizing that chronic self-identification orientations influence both the effect that experiencing incivility in one's work team exerts on feeling ostracized, and the impact that feeling ostracized has on subsequent employee proactive performance. Using a sample of 212 employees and their 51 supervising managers employed in an Internet service and solution company in China, we found support for our hypothesized model. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  15. Duality and modularity in elliptic integrable systems and vacua of N=1{sup ∗} gauge theories

    Energy Technology Data Exchange (ETDEWEB)

    Bourget, Antoine; Troost, Jan [Laboratoire de Physique Théorique, Ecole Normale Supérieure,24 rue Lhomond, 75005 Paris (France)

    2015-04-23

    We study complexified elliptic Calogero-Moser integrable systems. We determine the value of the potential at isolated extrema, as a function of the modular parameter of the torus on which the integrable system lives. We calculate the extrema for low rank B,C,D root systems using a mix of analytical and numerical tools. For so(5) we find convincing evidence that the extrema constitute a vector valued modular form for the Γ{sub 0}(4) congruence subgroup of the modular group. For so(7) and so(8), the extrema split into two sets. One set contains extrema that make up vector valued modular forms for congruence subgroups (namely Γ{sub 0}(4), Γ(2) and Γ(3)), and a second set contains extrema that exhibit monodromies around points in the interior of the fundamental domain. The former set can be described analytically, while for the latter, we provide an analytic value for the point of monodromy for so(8), as well as extensive numerical predictions for the Fourier coefficients of the extrema. Our results on the extrema provide a rationale for integrality properties observed in integrable models, and embed these into the theory of vector valued modular forms. Moreover, using the data we gather on the modularity of complexified integrable system extrema, we analyse the massive vacua of mass deformed N=4 supersymmetric Yang-Mills theories with low rank gauge group of type B,C and D. We map out their transformation properties under the infrared electric-magnetic duality group as well as under triality for N=1{sup ∗} with gauge algebra so(8). We compare the exact massive vacua on ℝ{sup 3}×S{sup 1} to those found in a semi-classical analysis on ℝ{sup 4}. We identify several intriguing features of the quantum gauge theories.

  16. Threat and parochialism in intergroup relations: lab-in-the-field evidence from rural Georgia.

    Science.gov (United States)

    Schaub, Max

    2017-10-25

    Competition between groups is widely considered to foster cooperation within groups. Evidence from laboratory experiments hints at the existence of a proximate mechanism by which humans increase their level of cooperation with their ingroup when faced with an external threat. Further work suggests that ingroup cooperation should go along with aggressive behaviour towards the outgroup, although these theories are at odds with others that see high investments in outgroup relations as important means of stabilizing intergroup relations. Surprisingly, few of these arguments have been tested in the field, and existing studies are also limited by the lack of a direct measure of threat perception and aggressive behaviour. This study presents lab-in-the-field results from a rural context where exposure to an ethnic outgroup varies between villages. This context makes it possible to capture levels of threat perception, aggressive behaviour and cooperation without inducing intergroup competition artificially in the laboratory. All concepts are measured behaviourally. In- and outgroup cooperation was measured with a standard public goods game, and a novel experimental protocol was developed that measures perceived threat and aggressive behaviour: the threat game. The results show that levels of perceived threat, ingroup cooperation and aggressive behaviour are higher in regions more strongly exposed to ethnic outsiders. However, exposed regions also show high levels of outgroup cooperation and a concomitant lack of elevated ingroup bias. This pattern is explained by theorizing that communities show parochial altruism when faced with an ethnic outgroup, but balance aggressive behaviour with cooperative offers to diffuse tensions and to keep open channels of mutually beneficial exchange. © 2017 The Author(s).

  17. Integrating Technologies to Protect the Home Front against Ballistic Threats and Cruise Missiles

    OpenAIRE

    Yossi Arazi; Gal Perel

    2013-01-01

    This article discusses active protection in response to the rocket threat to Israel’s home front. The defense establishment anticipates that in an allout war, the home front would be attacked for about thirty days, and that every day there would be about one thousand rocket and missile hits that would cause thousands of casualties as well as damage to infrastructures and strategic sites. Israel has an active protection system with five layers of interceptor missiles, and in cooperation with t...

  18. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  19. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  20. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  1. Risk perception and control, an integration of the psychometric research paradigm and social psychology

    International Nuclear Information System (INIS)

    Haugen, K.

    1998-01-01

    Full text of publication follows: this paper argues that perceptual control is an essential component in human risk evaluation. Control is seen as an integrative concept between the psychometric research paradigm and various psychological theories. The psychometric approach to the study of risk has mainly dealt with the intuitive judgements people do when they are asked to evaluate risky activities and technologies. It shows that people judge risk in relation to the possible consequences and probabilities related to an outcome; the former more typical for the public and the latter more often used by experts. The psychometric research tradition has concentrated on doing human risk evaluations quantifiable and the reactions predictable. This paper also relates to possible practical implications of this strategy, namely that humans react heterogeneously to different kinds of threats due to perceived control. Theoretical ability to explain and elaborate perceptions of risk, as well as individual reactions, were the main criteria for the literature selection, which includes work on e.g. attribution theory, locus of control, and learned helplessness. Thus, the paper addresses available psychological views for a contribution to a developed theoretical framework for human risk evaluation. It seeks to compare and integrate the psychometric research tradition within social psychological theories. The way in which people find their informational basis for their risk judgements, either from others or from their own perceptions is also discussed. Furthermore, the theories are related to the social and psychological reactions of the Chernobyl accident. The paper concludes that psychological theories can contribute to a more comprehensive framework for the understanding of human risk evaluation, leading to a more coherent and integrative knowledge. (author)

  2. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  3. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  4. The path dependency theory: analytical framework to study institutional integration. The case of France.

    Science.gov (United States)

    Trouvé, Hélène; Couturier, Yves; Etheridge, Francis; Saint-Jean, Olivier; Somme, Dominique

    2010-06-30

    The literature on integration indicates the need for an enhanced theorization of institutional integration. This article proposes path dependence as an analytical framework to study the systems in which integration takes place. PRISMA proposes a model for integrating health and social care services for older adults. This model was initially tested in Quebec. The PRISMA France study gave us an opportunity to analyze institutional integration in France. A qualitative approach was used. Analyses were based on semi-structured interviews with actors of all levels of decision-making, observations of advisory board meetings, and administrative documents. Our analyses revealed the complexity and fragmentation of institutional integration. The path dependency theory, which analyzes the change capacity of institutions by taking into account their historic structures, allows analysis of this situation. The path dependency to the Bismarckian system and the incomplete reforms of gerontological policies generate the coexistence and juxtaposition of institutional systems. In such a context, no institution has sufficient ability to determine gerontology policy and build institutional integration by itself. Using path dependence as an analytical framework helps to understand the reasons why institutional integration is critical to organizational and clinical integration, and the complex construction of institutional integration in France.

  5. An integrative framework of stress, attention, and visuomotor performance

    Directory of Open Access Journals (Sweden)

    Samuel James Vine

    2016-11-01

    Full Text Available The aim of this article is to present an integrative conceptual framework that depicts the effect of acute stress on the performance of visually guided motor skills. We draw upon seminal theories highlighting the importance of subjective interpretations of stress on subsequent performance and outline how models of disrupted attentional control might explain this effect through impairments in visuomotor control. We first synthesize and critically discuss empirical support for theories examining these relationships in isolation. We then outline our integrative framework that seeks to provide a more complete picture of the interacting influences of stress responses (challenge and threat and attention in explaining how elevated stress may lead to different visuomotor performance outcomes. We propose a number of mechanisms that explain why evaluations of stress are related to attentional control, and highlight the emotion of anxiety as the most likely candidate to explain why negative reactions to stress lead to disrupted attention and poor visuomotor skill performance. Finally, we propose a number of feedback loops that explain why stress responses are often self-perpetuating, as well as a number of proposed interventions that are designed to help improve or maintain performance in real world performance environments (e.g., sport, surgery, military, and aviation.

  6. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  7. Exploring the interplay between Framing and Securitization theory: the case of the Arab Spring protests in Bahrain

    Directory of Open Access Journals (Sweden)

    Vânia Carvalho Pinto

    2014-01-01

    Full Text Available This article advances the theoretical integration between securitization theory and the framing approach, resulting in a set of criteria hereby called security framing. It seeks to make a twofold contribution: to sharpen the study of the ideational elements that underlie the construction of threats, and to advance towards a greater assessment of the audience's preferences. The case study under examination is the 2011 military intervention of the countries of the Gulf Cooperation Council in Bahrain. The security framing of this case will help illuminate the dynamics at play in one of the most important recent events in Gulf politics.

  8. Directions of Development of International Production Specialization Theory in Terms of Integration

    Directory of Open Access Journals (Sweden)

    Lidiya Aleksandrovna Pankova

    2016-06-01

    Full Text Available The article is devoted to the definition of directions of development of the theory of international production specialization in terms of integration based on new trends in various areas of international business. The author proposes a new concept of international industrial specialization in terms of integration. As a result of research the author came to the conclusion that in the current economic conditions the need for a free market constraints associated with the deepening global market failures is becoming more and more obvious. Therefore, in the process of international specialization of production in the conditions of integration of the country should be guided not by comparative advantage in the production of certain goods or services, but also by other criteria. These criteria are: financial criterion determining the financial situation in the country, the trade criterion, reflecting the possibility of benefiting from international trade, technological criterion, considering the technological security of the country in the field of specialization and the cyclical criterion, reflecting the situation in the world economy and the level of integration of the country. On the basis of these criteria, the author identifies three categories of countries according to their ability to benefit from an international industrial specialization in the integration process: effective export, export-neutral and export-inefficient countries.

  9. Developmental Differences in Motor Task Integration: A Test of Pascual-Leone's Theory of Constructive Operators.

    Science.gov (United States)

    Todor, John I.

    1979-01-01

    Assesses the ability of Pascual-Leone's Theory of Constructive Operators to predict the minimum age or maturational level at which integration of a motor task could be achieved. Subjects were 114 elementary school children ranging in age from 5 to 12. (Author/MP)

  10. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  11. Social Ecology of Asthma: Engaging Stakeholders in Integrating Health Behavior Theories and Practice-Based Evidence through Systems Mapping

    Science.gov (United States)

    Gillen, Emily M.; Hassmiller Lich, Kristen; Yeatts, Karin B.; Hernandez, Michelle L.; Smith, Timothy W.; Lewis, Megan A.

    2014-01-01

    This article describes a process for integrating health behavior and social science theories with practice-based insights using participatory systems thinking and diagramming methods largely inspired by system dynamics methods. This integration can help close the gap between research and practice in health education and health behavior by offering…

  12. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  13. Teaching Theory X and Theory Y in Organizational Communication

    Science.gov (United States)

    Noland, Carey

    2014-01-01

    The purpose of the activity described here is to integrate McGregor's Theory X and Theory Y into a group application: design a syllabus that embodies either Theory X or Theory Y tenets. Students should be able to differentiate between Theory X and Theory Y, create a syllabus based on Theory X or Theory Y tenets, evaluate the different syllabi…

  14. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  15. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  16. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  17. Impact of Child Maltreatment on Attachment and Social Rank Systems: Introducing an Integrated Theory.

    Science.gov (United States)

    Sloman, Leon; Taylor, Peter

    2016-04-01

    Child maltreatment is a prevalent societal problem that has been linked to a wide range of social, psychological, and emotional difficulties. Maltreatment impacts on two putative evolved psychobiological systems in particular, the attachment system and the social rank system. The maltreatment may disrupt the child's ability to form trusting and reassuring relationships and also creates a power imbalance where the child may feel powerless and ashamed. The aim of the current article is to outline an evolutionary theory for understanding the impact of child maltreatment, focusing on the interaction between the attachment and the social rank system. We provide a narrative review of the relevant literature relating to child maltreatment and these two theories. This research highlights how, in instances of maltreatment, these ordinarily adaptive systems may become maladaptive and contribute to psychopathology. We identify a number of novel hypotheses that can be drawn from this theory, providing a guide for future research. We finally explore how this theory provides a guide for the treatment of victims of child maltreatment. In conclusion, the integrated theory provides a framework for understanding and predicting the consequences of maltreatment, but further research is required to test several hypotheses made by this theory. © The Author(s) 2015.

  18. Attentional Bias for Threat in Older Adults: Moderation of the Positivity Bias by Trait Anxiety and Stimulus Modality

    Science.gov (United States)

    Lee, Lewina O.; Knight, Bob G.

    2009-01-01

    Socioemotional selectivity theory suggests that emotion regulation goals motivate older adults to preferentially allocate attention to positive stimuli and away from negative stimuli. This study examined whether anxiety moderates the effect of the positivity bias on attention for threat. We employed the dot probe task to compare subliminal and supraliminal attention for threat in 103 young and 44 older adults. Regardless of anxiety, older but not younger adults demonstrated a vigilant-avoidant response to angry faces. Anxiety influenced older adults’ attention such that anxious individuals demonstrated a vigilant-avoidant reaction to sad faces, but an avoidant-vigilant reaction to negative words. PMID:19739931

  19. An(1) affine Toda field theories with integrable boundary conditions revisited

    International Nuclear Information System (INIS)

    Doikou, Anastasia

    2008-01-01

    Generic classically integrable boundary conditions for the A n (1) affine Toda field theories (ATFT) are investigated. The present analysis rests primarily on the underlying algebra, defined by the classical version of the reflection equation. We use as a prototype example the first non-trivial model of the hierarchy i.e. the A 2 (1) ATFT, however our results may be generalized for any A n (1) (n > 1). We assume here two distinct types of boundary conditions called some times soliton preserving (SP), and soliton non-preserving (SNP) associated to two distinct algebras, i.e. the reflection algebra and the (q) twisted Yangian respectively. The boundary local integrals of motion are then systematically extracted from the asymptotic expansion of the associated transfer matrix. In the case of SNP boundary conditions we recover previously known results. The other type of boundary conditions (SP), associated to the reflection algebra, are novel in this context and lead to a different set of conserved quantities that depend on free boundary parameters. It also turns out that the number of local integrals of motion for SP boundary conditions is 'double' compared to those of the SNP case.

  20. [New theory of holistic integrative physiology and medicine. I: New insight of mechanism of control and regulation of breathing].

    Science.gov (United States)

    Sun, Xing-guo

    2015-07-01

    The modern systemic physiology, based on limit-understand functional classification, has significant limitation and one-sidedness. Human being is organic; we should approach the mechanism of control and regulation of breathing integrating all the systems. We use new theory of holistic integrative physiology and medicine to explain the mechanism of control and regulation of breathing. Except the mean level information, the up-down "W" waveform information of arterial blood gas (ABG) is core signal to control and regulate breathing. In order to do so, we must integrate all systems together. New theory will help to explain some unanswered questions in physiology and medicine, for example: fetal does not breathing; how first breath generate; how respiratory rhythm and frequency generate, etc. Breathing is the sign of life. Mechanism of control and regulation of breathing has to integrate respiration, circulation, nerves, metabolism, exercise, sleep and digestion, absorption and elimination and etc altogether.