WorldWideScience

Sample records for life lessons threat-sensitive

  1. Breathing Life into Engineering: A Lesson Study Life Science Lesson

    Science.gov (United States)

    Lawrence, Maria; Yang, Li-Ling; Briggs, May; Hession, Alicia; Koussa, Anita; Wagoner, Lisa

    2016-01-01

    A fifth grade life science lesson was implemented through a lesson study approach in two fifth grade classrooms. The research lesson was designed by a team of four elementary school teachers with the goal of emphasizing engineering practices consistent with the "Next Generation Science Standards" (NGSS) (Achieve Inc. 2013). The fifth…

  2. Stereotype Threat Effects on Learning From a Cognitively Demanding Mathematics Lesson.

    Science.gov (United States)

    Lyons, Emily McLaughlin; Simms, Nina; Begolli, Kreshnik N; Richland, Lindsey E

    2018-03-01

    Stereotype threat-a situational context in which individuals are concerned about confirming a negative stereotype-is often shown to impact test performance, with one hypothesized mechanism being that cognitive resources are temporarily co-opted by intrusive thoughts and worries, leading individuals to underperform despite high content knowledge and ability (see Schmader & Beilock, ). We test here whether stereotype threat may also impact initial student learning and knowledge formation when experienced prior to instruction. Predominantly African American fifth-grade students provided either their race or the date before a videotaped, conceptually demanding mathematics lesson. Students who gave their race retained less learning over time, enjoyed the lesson less, reported a diminished desire to learn more, and were less likely to choose to engage in an optional math activity. The detrimental impact was greatest among students with high baseline cognitive resources. While stereotype threat has been well documented to harm test performance, the finding that effects extend to initial learning suggests that stereotype threat's contribution to achievement gaps may be greatly underestimated. Copyright © 2017 Cognitive Science Society, Inc.

  3. Stress Sensitivity, Aberrant Salience, and Threat Anticipation in Early Psychosis: An Experience Sampling Study

    Science.gov (United States)

    Reininghaus, Ulrich; Kempton, Matthew J.; Valmaggia, Lucia; Craig, Tom K. J.; Garety, Philippa; Onyejiaka, Adanna; Gayer-Anderson, Charlotte; So, Suzanne H.; Hubbard, Kathryn; Beards, Stephanie; Dazzan, Paola; Pariante, Carmine; Mondelli, Valeria; Fisher, Helen L.; Mills, John G.; Viechtbauer, Wolfgang; McGuire, Philip; van Os, Jim; Murray, Robin M.; Wykes, Til; Myin-Germeys, Inez; Morgan, Craig

    2016-01-01

    While contemporary models of psychosis have proposed a number of putative psychological mechanisms, how these impact on individuals to increase intensity of psychotic experiences in real life, outside the research laboratory, remains unclear. We aimed to investigate whether elevated stress sensitivity, experiences of aberrant novelty and salience, and enhanced anticipation of threat contribute to the development of psychotic experiences in daily life. We used the experience sampling method (ESM) to assess stress, negative affect, aberrant salience, threat anticipation, and psychotic experiences in 51 individuals with first-episode psychosis (FEP), 46 individuals with an at-risk mental state (ARMS) for psychosis, and 53 controls with no personal or family history of psychosis. Linear mixed models were used to account for the multilevel structure of ESM data. In all 3 groups, elevated stress sensitivity, aberrant salience, and enhanced threat anticipation were associated with an increased intensity of psychotic experiences. However, elevated sensitivity to minor stressful events (χ2 = 6.3, P = 0.044), activities (χ2 = 6.7, P = 0.036), and areas (χ2 = 9.4, P = 0.009) and enhanced threat anticipation (χ2 = 9.3, P = 0.009) were associated with more intense psychotic experiences in FEP individuals than controls. Sensitivity to outsider status (χ2 = 5.7, P = 0.058) and aberrantly salient experiences (χ2 = 12.3, P = 0.002) were more strongly associated with psychotic experiences in ARMS individuals than controls. Our findings suggest that stress sensitivity, aberrant salience, and threat anticipation are important psychological processes in the development of psychotic experiences in daily life in the early stages of the disorder. PMID:26834027

  4. Stress Sensitivity, Aberrant Salience, and Threat Anticipation in Early Psychosis: An Experience Sampling Study.

    Science.gov (United States)

    Reininghaus, Ulrich; Kempton, Matthew J; Valmaggia, Lucia; Craig, Tom K J; Garety, Philippa; Onyejiaka, Adanna; Gayer-Anderson, Charlotte; So, Suzanne H; Hubbard, Kathryn; Beards, Stephanie; Dazzan, Paola; Pariante, Carmine; Mondelli, Valeria; Fisher, Helen L; Mills, John G; Viechtbauer, Wolfgang; McGuire, Philip; van Os, Jim; Murray, Robin M; Wykes, Til; Myin-Germeys, Inez; Morgan, Craig

    2016-05-01

    While contemporary models of psychosis have proposed a number of putative psychological mechanisms, how these impact on individuals to increase intensity of psychotic experiences in real life, outside the research laboratory, remains unclear. We aimed to investigate whether elevated stress sensitivity, experiences of aberrant novelty and salience, and enhanced anticipation of threat contribute to the development of psychotic experiences in daily life. We used the experience sampling method (ESM) to assess stress, negative affect, aberrant salience, threat anticipation, and psychotic experiences in 51 individuals with first-episode psychosis (FEP), 46 individuals with an at-risk mental state (ARMS) for psychosis, and 53 controls with no personal or family history of psychosis. Linear mixed models were used to account for the multilevel structure of ESM data. In all 3 groups, elevated stress sensitivity, aberrant salience, and enhanced threat anticipation were associated with an increased intensity of psychotic experiences. However, elevated sensitivity to minor stressful events (χ(2)= 6.3,P= 0.044), activities (χ(2)= 6.7,P= 0.036), and areas (χ(2)= 9.4,P= 0.009) and enhanced threat anticipation (χ(2)= 9.3,P= 0.009) were associated with more intense psychotic experiences in FEP individuals than controls. Sensitivity to outsider status (χ(2)= 5.7,P= 0.058) and aberrantly salient experiences (χ(2)= 12.3,P= 0.002) were more strongly associated with psychotic experiences in ARMS individuals than controls. Our findings suggest that stress sensitivity, aberrant salience, and threat anticipation are important psychological processes in the development of psychotic experiences in daily life in the early stages of the disorder. © The Author 2016. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center.

  5. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  6. Early life adversity during the infant sensitive period for attachment: Programming of behavioral neurobiology of threat processing and social behavior

    Directory of Open Access Journals (Sweden)

    Maya Opendak

    2017-06-01

    Full Text Available Animals, including humans, require a highly coordinated and flexible system of social behavior and threat evaluation. However, trauma can disrupt this system, with the amygdala implicated as a mediator of these impairments in behavior. Recent evidence has further highlighted the context of infant trauma as a critical variable in determining its immediate and enduring consequences, with trauma experienced from an attachment figure, such as occurs in cases of caregiver-child maltreatment, as particularly detrimental. This review focuses on the unique role of caregiver presence during early-life trauma in programming deficits in social behavior and threat processing. Using data primarily from rodent models, we describe the interaction between trauma and attachment during a sensitive period in early life, which highlights the role of the caregiver’s presence in engagement of attachment brain circuitry and suppressing threat processing by the amygdala. These data suggest that trauma experienced directly from an abusive caregiver and trauma experienced in the presence of caregiver cues produce similar neurobehavioral deficits, which are unique from those resulting from trauma alone. We go on to integrate this information into social experience throughout the lifespan, including consequences for complex scenarios, such as dominance hierarchy formation and maintenance.

  7. [Life lessons of eight families donating organs of deceased family members].

    Science.gov (United States)

    Avilés R, Lissette; Rivera M, M Soledad; Catoni S, María Isabel

    2014-06-01

    Most organ donors are already death. Therefore family members become an essential link in the final decision for organ donation. To get acquainted about the life lessons of people who accepted donating an organ of a deceased family member. Qualitative research, in depth interviews to eight families that accepted donating an organ of a deceased family member. The interviews were analyzed using the method proposed by Streubert et al and modified by Rivera. The life lessons are described in six comprehensive categories. The painful experience changed towards the feeling that the loved one remains alive. This sensation generated a sense of pride in family members and sensitized them towards the painful experience of other people. Therefore, a desire to help and improve as humans beings was awakened. A compassionate approach towards families donating organs with improve organ donation and humanize the process.

  8. Integration of multiple cues allows threat-sensitive anti-intraguild predator responses in predatory mites

    Science.gov (United States)

    Walzer, Andreas; Schausberger, Peter

    2013-01-01

    Intraguild (IG) prey is commonly confronted with multiple IG predator species. However, the IG predation (IGP) risk for prey is not only dependent on the predator species, but also on inherent (intraspecific) characteristics of a given IG predator such as its life-stage, sex or gravidity and the associated prey needs. Thus, IG prey should have evolved the ability to integrate multiple IG predator cues, which should allow both inter- and intraspecific threat-sensitive anti-predator responses. Using a guild of plant-inhabiting predatory mites sharing spider mites as prey, we evaluated the effects of single and combined cues (eggs and/or chemical traces left by a predator female on the substrate) of the low risk IG predator Neoseiulus californicus and the high risk IG predator Amblyseius andersoni on time, distance and path shape parameters of the larval IG prey Phytoseiulus persimilis. IG prey discriminated between traces of the low and high risk IG predator, with and without additional presence of their eggs, indicating interspecific threat-sensitivity. The behavioural changes were manifest in distance moved, activity and path shape of IG prey. The cue combination of traces and eggs of the IG predators conveyed other information than each cue alone, allowing intraspecific threat-sensitive responses by IG prey apparent in changed velocities and distances moved. We argue that graded responses to single and combined IG predator cues are adaptive due to minimization of acceptance errors in IG prey decision making. PMID:23750040

  9. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  10. Hunted woolly monkeys (Lagothrix poeppigii show threat-sensitive responses to human presence.

    Directory of Open Access Journals (Sweden)

    Sarah Papworth

    Full Text Available Responding only to individuals of a predator species which display threatening behaviour allows prey species to minimise energy expenditure and other costs of predator avoidance, such as disruption of feeding. The threat sensitivity hypothesis predicts such behaviour in prey species. If hunted animals are unable to distinguish dangerous humans from non-dangerous humans, human hunting is likely to have a greater effect on prey populations as all human encounters should lead to predator avoidance, increasing stress and creating opportunity costs for exploited populations. We test the threat sensitivity hypothesis in wild Poeppigi's woolly monkeys (Lagothrix poeppigii in Yasuní National Park, Ecuador, by presenting human models engaging in one of three behaviours "hunting", "gathering" or "researching". These experiments were conducted at two sites with differing hunting pressures. Visibility, movement and vocalisations were recorded and results from two sites showed that groups changed their behaviours after being exposed to humans, and did so in different ways depending on the behaviour of the human model. Results at the site with higher hunting pressure were consistent with predictions based on the threat sensitivity hypothesis. Although results at the site with lower hunting pressure were not consistent with the results at the site with higher hunting pressure, groups at this site also showed differential responses to different human behaviours. These results provide evidence of threat-sensitive predator avoidance in hunted primates, which may allow them to conserve both time and energy when encountering humans which pose no threat.

  11. Date Sensitive Computing Problems: Understanding the Threat

    Science.gov (United States)

    1998-08-29

    equipment on Earth.3 It can also interfere with electromagnetic signals from such devices as cell phones, radio, televison , and radar. By itself, the ...spacecraft. Debris from impacted satellites will add to the existing orbital debris problem, and could eventually cause damage to other satellites...Date Sensitive Computing Problems Understanding the Threat Aug. 17, 1998 Revised Aug. 29, 1998 Prepared by: The National Crisis Response

  12. Biomarkers of threat and reward sensitivity demonstrate unique associations with risk for psychopathology.

    Science.gov (United States)

    Nelson, Brady D; McGowan, Sarah Kate; Sarapas, Casey; Robison-Andrew, E Jenna; Altman, Sarah E; Campbell, Miranda L; Gorka, Stephanie M; Katz, Andrea C; Shankman, Stewart A

    2013-08-01

    Two emotional/motivational constructs that have been posited to underlie anxiety and depressive disorders are heightened sensitivity to threat and reduced sensitivity to reward, respectively. It is unclear, though, whether these constructs are only epiphenomena or also connote risk for these disorders (and relatedly, whether they connote risk for separate disorders). Using family history of psychopathology as an indicator of risk, the present study examined whether biomarkers of sensitivity to threat (startle potentiation) and reward (frontal EEG asymmetry) were associated with similar or different familial liabilities. In addition, the present study examined whether these biomarkers were associated with risk independent of proband DSM-IV diagnosis. One-hundred and seventy-three individuals diagnosed with panic disorder (PD), early onset major depressive disorder (MDD), both (comorbids), or controls completed two laboratory paradigms assessing sensitivity to predictable/unpredictable threat (measured via startle response) and reward (measured via frontal EEG asymmetry during a gambling task). Results indicated that across all participants: (a) startle potentiation to unpredictable threat was associated with family history of PD (but not MDD); and (b) frontal EEG asymmetry while anticipating reward was associated with family history of MDD (but not PD). Additionally, both measures continued to be associated with family history of psychopathology after controlling for proband DSM-IV diagnosis. Results suggest that the proposed biomarkers of sensitivity to unpredictable threat and reward exhibit discriminant validity and may add to the predictive validity of the DSM-IV defined constructs of PD and MDD, respectively. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  13. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  14. Threat/reward-sensitivity and hypomanic-personality modulate cognitive-control and attentional neural processes to emotional stimuli.

    Science.gov (United States)

    Pornpattananangkul, Narun; Hu, Xiaoqing; Nusslock, Robin

    2015-11-01

    Temperamental-traits (e.g. threat/reward-sensitivity) are found to modulate cognitive-control and attentional-processes. Yet, it is unclear exactly how these traits interact with emotional-stimuli in the modulation of cognitive-control, as reflected by the N2 event-related potential (ERP), and attentional-processes, as reflected by the P2 and P3 ERPs. Here in an ERP emotional-Go/NoGo task, 36 participants were instructed to inhibit their response to Fearful- and Happy-faces. Individual-differences in threat-sensitivity, reward-sensitivity and hypomanic-personality were assessed through self-report. Hypomanic-personality was assessed, given its relationship with reward-sensitivity and relevance to mood-disorder symptoms. Concerning cognitive-control, individuals with elevated threat-sensitivity displayed more-negative N2s to Happy-NoGo (relative to Fearful-NoGo) faces, whereas both individuals with elevated reward-sensitivity and hypomanic-personality displayed more-negative N2s to Fearful-NoGo (relative to Happy-NoGo) faces. Accordingly, when cognitive-control is required (during Go/NoGo), a mismatch between one's temperament and the valence of the NoGo-stimulus elevates detection of the need for cognitive-control. Conversely, the modulation of attentional-processing was specific to threat-sensitivity, as there was no relationship between either reward-sensitivity or hypomanic-personality and attentional-processing. Elevated threat-sensitivity was associated with enhanced early (P2s) and later (P3s) attentional-processing to Fearful-NoGo (relative to Happy-NoGo) faces. These latter findings support the negative attentional-bias model relating elevated threat-sensitivity with attentional-biases toward negative-stimuli and away from positive-stimuli. © The Author (2015). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  15. Association of life threat and betrayal with posttraumatic stress disorder symptom severity.

    Science.gov (United States)

    Kelley, Lance P; Weathers, Frank W; Mason, Elizabeth A; Pruneau, Genevieve M

    2012-08-01

    The Diagnostic and Statistical Manual of Mental Disorders (4th ed., text rev.; DSM-IV-TR; American Psychiatric Association [APA], 2000) emphasizes life threat as the defining feature of psychological trauma. Recent theoretical and empirical work, however, indicates the need to identify and evaluate other key aspects of trauma. Betrayal has been proposed as a pertinent, distinct, and complementary factor that can explain effects of trauma not accounted for by life threat alone. This study examined the relationship between injury, perceived life threat (PLT), and betrayal with posttraumatic stress disorder (PTSD) symptom severity. Trauma-exposed college students (N = 185) completed self-report measures of trauma exposure and PTSD, as well as items regarding life threat, betrayal, and level of medical care received. In hierarchical regressions incorporating injury, PLT, and betrayal, betrayal was associated with all PTSD symptom clusters and PTSD total severity (f(2) = .08), whereas PLT was associated with hyperarousal (f(2) = .05) and PTSD total (f(2) = .03), and injury had no association with PTSD symptoms. In a revised model with trauma type as an additional variable, betrayal was associated with avoidance (f(2) = .03), numbing (f(2) = .04), and PTSD total (f(2) = .03), whereas PLT was associated with reexperiencing (f(2) = .04), hyperarousal (f(2) = .04), and PTSD total (f(2) = .03), and injury was associated with avoidance (f(2) = .03). These findings support the idea that betrayal is a core dimension of psychological trauma that may play an important role in the etiology of PTSD. Copyright © 2012 International Society for Traumatic Stress Studies.

  16. The effect of panic disorder versus anxiety sensitivity on event-related potentials during anticipation of threat.

    Science.gov (United States)

    Stevens, Elizabeth S; Weinberg, Anna; Nelson, Brady D; Meissel, Emily E E; Shankman, Stewart A

    2018-03-01

    Attention-related abnormalities are key components of the abnormal defensive responding observed in panic disorder (PD). Although behavioral studies have found aberrant attentional biases towards threat in PD, psychophysiological studies have been mixed. Predictability of threat, an important feature of threat processing, may have contributed to these mixed findings. Additionally, anxiety sensitivity, a dimensional trait associated with PD, may yield stronger associations with cognitive processes than categorical diagnoses of PD. In this study, 171 participants with PD and/or depression and healthy controls completed a task that differentiated anticipation of predictable vs. unpredictable shocks, while startle eyeblink and event-related potentials (ERPs [N100, P300]) were recorded. In all participants, relative to the control condition, probe N100 was enhanced to both predictable and unpredictable threat, whereas P300 suppression was unique to predictable threat. Probe N100, but not P300, was associated with startle eyeblink during both threatening conditions, and was strongest for unpredictable threat. PD was not associated with ERPs, but anxiety sensitivity (physical concerns) was positively associated with probe N100 (indicating reduced responding) in the unpredictable condition independent of PD diagnosis. Vulnerability to panic-related psychopathology may be characterized by aberrant early processing of threat, which may be especially evident during anticipation of unpredictable threats. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Threat-sensitive anti-intraguild predation behaviour: maternal strategies to reduce offspring predation risk in mites.

    Science.gov (United States)

    Walzer, Andreas; Schausberger, Peter

    2011-01-01

    Predation is a major selective force for the evolution of behavioural characteristics of prey. Predation among consumers competing for food is termed intraguild predation (IGP). From the perspective of individual prey, IGP differs from classical predation in the likelihood of occurrence because IG prey is usually more rarely encountered and less profitable because it is more difficult to handle than classical prey. It is not known whether IGP is a sufficiently strong force to evolve interspecific threat sensitivity in antipredation behaviours, as is known from classical predation, and if so whether such behaviours are innate or learned. We examined interspecific threat sensitivity in antipredation in a guild of predatory mite species differing in adaptation to the shared spider mite prey (i.e. Phytoseiulus persimilis, Neoseiulus californicus and Amblyseius andersoni). We first ranked the players in this guild according to the IGP risk posed to each other: A. andersoni was the strongest IG predator; P. persimilis was the weakest. Then, we assessed the influence of relative IGP risk and experience on maternal strategies to reduce offspring IGP risk: A. andersoni was insensitive to IGP risk. Threat sensitivity in oviposition site selection was induced by experience in P. persimilis but occurred independently of experience in N. californicus. Irrespective of experience, P. persimilis laid fewer eggs in choice situations with the high- rather than low-risk IG predator. Our study suggests that, similar to classical predation, IGP may select for sophisticated innate and learned interspecific threat-sensitive antipredation responses. We argue that such responses may promote the coexistence of IG predators and prey.

  18. Threat engagement, disengagement, and sensitivity bias in worry-prone individuals as measured by an emotional go/no-go task.

    Science.gov (United States)

    Gole, Markus; Köchel, Angelika; Schäfer, Axel; Schienle, Anne

    2012-03-01

    The goal of the present study was to investigate a threat engagement, disengagement, and sensitivity bias in individuals suffering from pathological worry. Twenty participants high in worry proneness and 16 control participants low in worry proneness completed an emotional go/no-go task with worry-related threat words and neutral words. Shorter reaction times (i.e., threat engagement bias), smaller omission error rates (i.e., threat sensitivity bias), and larger commission error rates (i.e., threat disengagement bias) emerged only in the high worry group when worry-related words constituted the go-stimuli and neutral words the no-go stimuli. Also, smaller omission error rates as well as larger commission error rates were observed in the high worry group relative to the low worry group when worry-related go stimuli and neutral no-go stimuli were used. The obtained results await further replication within a generalized anxiety disorder sample. Also, further samples should include men as well. Our data suggest that worry-prone individuals are threat-sensitive, engage more rapidly with aversion, and disengage harder. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. Current posttraumatic stress disorder and exaggerated threat sensitivity associated with elevated inflammation in the Mind Your Heart Study.

    Science.gov (United States)

    O'Donovan, Aoife; Ahmadian, Ashkan J; Neylan, Thomas C; Pacult, Mark A; Edmondson, Donald; Cohen, Beth E

    2017-02-01

    Elevated inflammation has been repeatedly observed in posttraumatic stress disorder (PTSD), and it may drive the development of both psychiatric symptoms and physical comorbidities. However, it is not clear if elevated inflammation is a feature of both remitted and current PTSD, and little is known about relationships between specific clusters of PTSD symptoms and inflammation. Exaggerated threat sensitivity, as indexed by threat reactivity and avoidance of perceived threats, may be particularly closely associated with inflammation. We assessed PTSD symptoms and threat sensitivity using the Clinician Administered PTSD Scale in 735 Veterans Affairs patients (35% current PTSD; 16% remitted PTSD) who participated in the Mind Your Heart Study (mean age=59±11; 94% male). High sensitivity C-reactive protein (hsCRP), white blood cell count (WBC), and fibrinogen were used as indices of inflammation. Analysis of covariance models with planned contrasts were used to examine differences in inflammation by PTSD status, adjusting for age, sex, race, kidney function and socioeconomic status. Individuals with current PTSD had significantly higher hsCRP and WBC than patients with no history of PTSD, but there were no significant differences in inflammatory markers between those with remitted versus no history of PTSD. Within patients with current PTSD, higher threat reactivity was independently associated with higher hsCRP (β=0.16, p=0.01) and WBC count (β=0.24, <0.001), and higher effortful avoidance was associated with higher fibrinogen (β=0.13, p=0.04). Our data indicate that elevated inflammation may be a feature of current, but not remitted, PTSD. Within patients with PTSD, higher threat reactivity was also associated with elevated inflammation. A better understanding of the relationship between threat sensitivity and inflammation may inform interventions for patients with PTSD. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Lessons from Cacti: How to Survive the Prickles of Life during Tough Times

    Science.gov (United States)

    Bigger, Alan S.; Bigger, Linda B.

    2009-01-01

    The saguaro cactus looked a little like humans, in different shapes and sizes. How on earth do they survive in a climate that seems so inhospitable? It is possible to learn lessons for life from a cactus, if one can only get beyond the thorns, and that these lessons will assist one to survive during tough or prickly times. These plants survive…

  1. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  2. Mapping infectious disease hospital surge threats to lessons learnt in Singapore: a systems analysis and development of a framework to inform how to DECIDE on planning and response strategies.

    Science.gov (United States)

    Singh, Shweta R; Coker, Richard; Vrijhoef, Hubertus J-M; Leo, Yee Sin; Chow, Angela; Lim, Poh Lian; Tan, Qinghui; Chen, Mark I-Cheng; Hildon, Zoe Jane-Lara

    2017-09-04

    Hospital usage and service demand during an Infectious Disease (ID) outbreak can tax the health system in different ways. Herein we conceptualize hospital surge elements, and lessons learnt from such events, to help build appropriately matched responses to future ID surge threats. We used the Interpretive Descriptive qualitative approach. Interviews (n = 35) were conducted with governance and public health specialists; hospital based staff; and General Practitioners. Key policy literature in tandem with the interview data were used to iteratively generate a Hospital ID Surge framework. We anchored our narrative account within this framework, which is used to structure our analysis. A spectrum of surge threats from combinations of capacity (for crowding) and capability (for treatment complexity) demands were identified. Starting with the Pyramid scenario, or an influx of high screening rates flooding Emergency Departments, alongside fewer and manageable admissions; the Reverse-Pyramid occurs when few cases are screened and admitted but those that are, are complex; during a 'Black' scenario, the system is overburdened by both crowding and complexity. The Singapore hospital system is highly adapted to crowding, functioning remarkably well at constant near-full capacity in Peacetime and resilient to Endemic surges. We catalogue 26 strategies from lessons learnt relating to staffing, space, supplies and systems, crystalizing institutional memory. The DECIDE model advocates linking these strategies to types of surge threats and offers a step-by-step guide for coordinating outbreak planning and response. Lack of a shared definition and decision making of surge threats had rendered the procedures somewhat duplicative. This burden was paradoxically exacerbated by a health system that highly prizes planning and forward thinking, but worked largely in silo until an ID crisis hit. Many such lessons can be put into play to further strengthen our current hospital governance

  3. Exploring Students’ Reflections about Values inside the Implementation of Storied Lessons Based on Students’ Life Experiences

    Directory of Open Access Journals (Sweden)

    Mónica Castiblanco

    2007-12-01

    Full Text Available This article informs on students’ reflections about their life experiences and values based on the implementation of storied lessons compiled in a primer designed by the English teachers-researchers. Each storied lesson comes from some students’ life stories, the values promoted by the school such as respect, honesty, responsibility, and solidarity, and the English topic for each class in order to allow students to feel comfortable reflecting and giving opinions regarding the issues mentioned above.

  4. Insects and their life cycle: Steps to take to assess threats

    Science.gov (United States)

    Alicia M. Bray; Jason B. Oliver

    2013-01-01

    This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...

  5. Assessing social impacts in a life cycle perspective-Lessons learned

    DEFF Research Database (Denmark)

    Hauschild, Michael Zwicky; Jørgensen, Andreas; Dreyer, Louise Camilla

    2008-01-01

    In our globalised economy, important stakeholder groups nowadays hold companies responsible for the social impacts they cause in their product chain through activities like child labour, corruption or discrimination of employees. Many companies thus see themselves in need of a tool which can help...... LCA methodology supplements the traditional environment-oriented LCA and the life cycle costing tools in support of sustainability management addressing all three pillars of sustainability: people, planet and profit....... them make informed decisions about their social impacts throughout the life cycle of their products. The paper presents lessons learned from four years of work with industry on development of a methodology for social Life Cycle Assessment and implementation in the industrial product chain. The Social...

  6. Coastal life is not under threat by the carbon dioxide emissions

    Directory of Open Access Journals (Sweden)

    Albert Parker

    2014-03-01

    Full Text Available The near future of coastal life is threated by the claim of global warming alarmist that sea levels will rise by one to seven metres by 2100, destroying many coastal cities and habitats. This paper shows that sea levels will more likely rise no more than just a few centimetres during this century as the Earth defrosts from the Little Ice Age 500 years ago with a mild warming.

  7. UNLEARNED LESSONS OF CONTEMPORARY HISTORY

    Directory of Open Access Journals (Sweden)

    А Н Данилов

    2017-12-01

    Full Text Available The article considers the complex geopolitical situation in the global world at the end of the second decade of the 21st century as determined by the consequences of the collapse of the Soviet Union and by the new world order. The author seeks to answer the questions who will define the current geopolitical situation, whose aims it will reflect, what will become the basis of new geopolitical realities, the basis of moral solidarity of humankind, and the spiritual basis of future civilizations. The new challenges give rise to a desperate struggle for different scenarios for building a happy life. Moreover, it is not clear which ideal of the future world will be widely supported as a development guideline. The recognition as such of the standard of living and development of the strongest ones becomes a real threat to the new civilization for it leads to the loss of national interests of sovereign states, and to the loss of an independent future. Today, there is an active search for new theories and concepts that will adequately explain con-temporary global processes. In this thematic context, the author identifies main lessons not learned by the world political elites. The first lesson: new states are not born in an empty place, their common history is a great advantage ensuring prospects for the further development of interstate cooperation. The second lesson: the widespread falsification of history has a negative impact on national, cultural and social-group identity in transforming societies. The third lesson: after the collapse of the Soviet Union, the post-war balance of power was destroyed together with the system of checks and balances in world politics (a bipolar model of the world. The fourth lesson: under radical social transformations, the moral system of the population devaluates with numerous crisis consequences.

  8. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  9. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. Evidence for Ancient Life in Mars Meteorites: Lessons Learned

    Science.gov (United States)

    McKay, D. S.

    1998-01-01

    The lines of evidence we first proposed as supporting a hypothesis of early life on Mars are discussed by Treiman, who presents pros and cons of our hypothesis in the light of subsequent research by many groups. Our assessment of the current status of the many controversies over our hypothesis is given in reports by Gibson et al. Rather than repeat or elaborate on that information, I prefer to take an overview and present what I think are some of the "lessons learned" by our team in particular, and by the science community in general.

  11. An Interview with Joe McMann: His Life Lessons

    Science.gov (United States)

    McMann, Joe

    2011-01-01

    Pica Kahn conducted "An Interview with Joe McMann: His Life Lessons" on May 23, 2011. With over 40 years of experience in the aerospace industry, McMann has gained a wealth of knowledge. Many have been interested in his biography, progression of work at NASA, impact on the U.S. spacesuit, and career accomplishments. This interview highlighted the influences and decision-making methods that impacted his technical and management contributions to the space program. McMann shared information about the accomplishments and technical advances that committed individuals can make.

  12. The Knitting Lesson.

    Science.gov (United States)

    Smith, Pamela

    1987-01-01

    Based on Jean-Francois Millet's 1869 painting, "The Knitting Lesson," this lesson's goal is to introduce students in grades seven through nine to genre (everyday life) painting the nineteenth century. The lesson is also designed to show that some aspects of genre may be timeless. (BSR)

  13. Many Species, Many Threats: A Composite Risk Assessment of Climate Impacts for Salmonids in the Pacific Northwest

    Science.gov (United States)

    Graham, M. C.; Greene, C.; Beechie, T. J.; Raymond, C.

    2016-02-01

    The life cycles of salmonid species span freshwater, estuarine, and marine environments, exposing these economically, ecologically, and culturally important species to a wide variety of climate change threats. The diverse life histories of salmonids make them differentially vulnerable to climate change based on their use of different habitat types and the variability in climate change threats across these habitat types. Previous studies have focused mainly on assessing the vulnerability of particular life stages for a few species. Hence, we lack a broad perspective on how multiple climate threats are expected to impact the entire salmonid community, which spend much of their lives in marine waters. This lack of knowledge hampers our ability to prioritize various adaptation strategies for salmonid conservation. In order to conduct a more extensive vulnerability study of salmonids, we performed a life cycle-based risk assessment of climate change threats for nine species of salmonids (species within Oncorhynchus, Salvelinus, and Prosopium genera) inhabiting the Skagit River watershed, which is subject to an array of climate impacts. Our risk assessment integrated projections of impacts from various climate threats in freshwater, estuarine, and marine ecosystems with expert-based assessments of species-specific sensitivity and exposure. We found that projections (multiple global climate models under moderate emission scenarios) of both changes in magnitude and frequency of three flow-related freshwater impacts (flooding, low flows, and suspended sediment pulses) were more severe than threats in estuarine and marine habitats for which we could obtain projections. Combining projections with expert-based sensitivity and exposure scores revealed that these three threats exhibited the highest risk across all species. Of the nine species, the four most vulnerable were Chinook and coho salmon, steelhead, and bull trout. Even though these salmonids spend much of their lives

  14. Sensitivity towards fear of electric shock in passive threat situations.

    Science.gov (United States)

    Ring, Patrick; Kaernbach, Christian

    2015-01-01

    Human judgment and decision-making (JDM) requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs) in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  15. Original article Posttraumatic growth in patients after myocardial infarction: the role of cognitive coping and experience of life threat

    Directory of Open Access Journals (Sweden)

    Władysław Łosiak

    2014-10-01

    Full Text Available Background Posttraumatic growth is described as a process of restructuring of experience and positive changes in life attitudes. According to theoretical postulates, posttraumatic growth is a result of adaptive coping strategies that have cognitive character. The aim of the study was to evaluate relationships between posttraumatic growth, cognitive coping strategies and the severity of life threat experience in a group of patients who had experienced myocardial infarction. Participants and procedure Fifty-three patients who had experienced their first myocardial infarction (32 men and 21 women participated in the study and completed questionnaires measuring posttraumatic growth and cognitive coping strategies as well as a rating scale measuring the severity of life threat experience during the infarction. Results The results indicate that posttraumatic growth in general and in the aspect of changes in self, relationships or affirmation of life was related to cognitive coping strategies. In the case of spiritual changes, severity of life threat experience was significant while coping was not. Patients’ gender, age or post-myocardial infarction time appeared to be non-significant. Conclusions Generally, theories postulating that posttraumatic growth is a result of cognitive coping strategies found some support. Moreover, it may be concluded that posttraumatic growth appears only in some percentage of persons experiencing a specific trauma of myocardial infarction.

  16. Sensitivity towards fear of electric shock in passive threat situations.

    Directory of Open Access Journals (Sweden)

    Patrick Ring

    Full Text Available Human judgment and decision-making (JDM requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  17. Sensitivity analysis in life cycle assessment

    NARCIS (Netherlands)

    Groen, E.A.; Heijungs, R.; Bokkers, E.A.M.; Boer, de I.J.M.

    2014-01-01

    Life cycle assessments require many input parameters and many of these parameters are uncertain; therefore, a sensitivity analysis is an essential part of the final interpretation. The aim of this study is to compare seven sensitivity methods applied to three types of case stud-ies. Two

  18. Stereotypes as stumbling-blocks: how coping with stereotype threat affects life outcomes for people with physical disabilities.

    Science.gov (United States)

    Silverman, Arielle M; Cohen, Geoffrey L

    2014-10-01

    Stereotype threat, the concern about being judged in light of negative stereotypes, causes underperformance in evaluative situations. However, less is known about how coping with stereotypes can aggravate underperformance over time. We propose a model in which ongoing stereotype threat experiences threaten a person's sense of self-integrity, which in turn prompts defensive avoidance of stereotype-relevant situations, impeding growth, achievement, and well-being. We test this model in an important but understudied population: the physically disabled. In Study 1, blind adults reporting higher levels of stereotype threat reported lower self-integrity and well-being and were more likely to be unemployed and to report avoiding stereotype-threatening situations. In Study 2's field experiment, blind students in a compensatory skill-training program made more progress if they had completed a values-affirmation, an exercise that bolsters self-integrity. The findings suggest that stereotype threat poses a chronic threat to self-integrity and undermines life outcomes for people with disabilities. © 2014 by the Society for Personality and Social Psychology, Inc.

  19. Community structure analysis of rejection sensitive personality profiles: A common neural response to social evaluative threat?

    Science.gov (United States)

    Kortink, Elise D; Weeda, Wouter D; Crowley, Michael J; Gunther Moor, Bregtje; van der Molen, Melle J W

    2018-06-01

    Monitoring social threat is essential for maintaining healthy social relationships, and recent studies suggest a neural alarm system that governs our response to social rejection. Frontal-midline theta (4-8 Hz) oscillatory power might act as a neural correlate of this system by being sensitive to unexpected social rejection. Here, we examined whether frontal-midline theta is modulated by individual differences in personality constructs sensitive to social disconnection. In addition, we examined the sensitivity of feedback-related brain potentials (i.e., the feedback-related negativity and P3) to social feedback. Sixty-five undergraduate female participants (mean age = 19.69 years) participated in the Social Judgment Paradigm, a fictitious peer-evaluation task in which participants provided expectancies about being liked/disliked by peer strangers. Thereafter, they received feedback signaling social acceptance/rejection. A community structure analysis was employed to delineate personality profiles in our data. Results provided evidence of two subgroups: one group scored high on attachment-related anxiety and fear of negative evaluation, whereas the other group scored high on attachment-related avoidance and low on fear of negative evaluation. In both groups, unexpected rejection feedback yielded a significant increase in theta power. The feedback-related negativity was sensitive to unexpected feedback, regardless of valence, and was largest for unexpected rejection feedback. The feedback-related P3 was significantly enhanced in response to expected social acceptance feedback. Together, these findings confirm the sensitivity of frontal midline theta oscillations to the processing of social threat, and suggest that this alleged neural alarm system behaves similarly in individuals that differ in personality constructs relevant to social evaluation.

  20. Quality of life threats in recreational and competitive sport

    DEFF Research Database (Denmark)

    Støckel, Jan Toftegaard

    Quality of life threats in recreational and competitive sport Author: ass. Professor Jan Toftegaard Støckel Key words: sport, stress, depression, illness, Previous research has shown that personal issues (nutrition, injury, goals and expectations), coach-athlete issues (coach, coaching style......, selection) and environmental issues (team atmosphere, support structures) are key determinants for stress, depression and illness in elite sports. In a large scale survey among 4,000 Danish athletes from recreational thru to elite sport a regression analysis show an increase in risk of self-reported stress......, depression or illness (SDI) by odds ratio 6,5 in elite sport compared to recreational sport. One in eight athletes reported SDI and highest associations are related to coach behavior. The key question for this abstract is to examine whether men and women are equally vulnerable to SDI at various sport levels...

  1. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  2. From repulsion to attraction: species- and spatial context-dependent threat sensitive response of the spider mite Tetranychus urticae to predatory mite cues

    Science.gov (United States)

    Fernández Ferrari, M. Celeste; Schausberger, Peter

    2013-06-01

    Prey perceiving predation risk commonly change their behavior to avoid predation. However, antipredator strategies are costly. Therefore, according to the threat-sensitive predator avoidance hypothesis, prey should match the intensity of their antipredator behaviors to the degree of threat, which may depend on the predator species and the spatial context. We assessed threat sensitivity of the two-spotted spider mite, Tetranychus urticae, to the cues of three predatory mites, Phytoseiulus persimilis, Neoseiulus californicus, and Amblyseius andersoni, posing different degrees of risk in two spatial contexts. We first conducted a no-choice test measuring oviposition and activity of T. urticae exposed to chemical traces of predators or traces plus predator eggs. Then, we tested the site preference of T. urticae in choice tests, using artificial cages and leaves. In the no-choice test, T. urticae deposited their first egg later in the presence of cues of P. persimilis than of the other two predators and cue absence, indicating interspecific threat-sensitivity. T. urticae laid also fewer eggs in the presence of cues of P. persimilis and A. andersoni than of N. californicus and cue absence. In the artificial cage test, the spider mites preferred the site with predator traces, whereas in the leaf test, they preferentially resided on leaves without traces. We argue that in a nonplant environment, chemical predator traces do not indicate a risk for T. urticae, and instead, these traces function as indirect habitat cues. The spider mites were attracted to these cues because they associated them with the existence of a nearby host plant.

  3. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  4. Aesthetic Inquiry into Chinese University Student Fatherly Life Lessons: "Roots" and Their Implications for Educational Contexts

    Science.gov (United States)

    Liu, Laura Blythe

    2017-01-01

    Globally, teachers are trained to educate and assess children through matrices based on comparative competition, a practice that thrives on ranking. In an era of glocalization, how might educational systems cultivate classroom connections embracing diverse student gifts? This arts-based narrative inquiry explores fatherly life lessons of 17…

  5. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  6. Establishing community partnerships to support late-life anxiety research: lessons learned from the Calmer Life project.

    Science.gov (United States)

    Jameson, John Paul; Shrestha, Srijana; Escamilla, Monica; Clark, Sharonda; Wilson, Nancy; Kunik, Mark; Zeno, Darrell; Harris, Toi B; Peters, Alice; Varner, Ivory L; Scantlebury, Carolyn; Scott-Gurnell, Kathy; Stanley, Melinda

    2012-01-01

    This article outlines the development of the Calmer Life project, a partnership established between researchers and faith-based and social service organizations to examine the effectiveness of cognitive behavioral therapy (CBT) incorporating religious/spiritual components for older African Americans in low-income communities. The program was designed to bypass several barriers to delivery of CBT within the specified community; it allows multimodal delivery (in person or by telephone) that occurs outside traditional mental health settings through faith-based organizations and neighborhood community centers. It includes religion/spirituality as an element, dependent upon the preference of the participant, and is modular, so that people can select the skills they wish to learn. Established relationships within the community were built upon, and initial meetings were held in community settings, allowing feedback from community organizations. This ongoing program is functioning successfully and has strengthened relationships with community partners and facilitated increased availability of education and services in the community. The lessons learned in establishing these partnerships are outlined. The growth of effectiveness research for late-life anxiety treatments in underserved minority populations requires development of functional partnerships between academic institutions and community stakeholders, along with treatment modifications to effectively address barriers faced by these consumers. The Calmer Life project may serve as a model.

  7. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  8. Technostress: measuring a new threat to well-being in later life.

    Science.gov (United States)

    Nimrod, Galit

    2017-05-31

    Technostress is stress induced by Information and Communication Technology (ICT) use. Research on the topic has focused primarily on the workforce and tended to overlook senior citizens. This study presents the development of a new scale, which was designed to measure technostress specifically among older adults. The scale explores five constructs: overload, invasion, complexity, privacy and inclusion. The initial 20-item measure was tested in a pilot study and then included in an online survey of 537 Internet users aged 60 years and over. Based on the statistical analysis, the scale was reduced to 14 items. The constructs had good internal homogeneity, significant inter-construct correlations and high loadings on a single latent factor. The scores were well distributed along the range. Concurrent validity was assessed using the Satisfaction with Life Scale. A significant negative association was found between the two scales - a correlation that remained significant even after controlling for background variables. The new scale is useful for measuring technostress in older people, and technostress ought to be considered a particular threat to well-being in later life. Future research should explore its antecedents and consequences and identify interventions useful in alleviating its harmful effect on older ICT users.

  9. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  10. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  11. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  12. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  13. Lessons from culturally contrasted alternative methods of inquiry and styles of comprehension for the new foundations in the study of life.

    Science.gov (United States)

    Vallverdú, Jordi; Schroeder, Marcin J

    2017-12-01

    Contemporary scientific approaches to Biology are the result of some cultural ideas considered as universal by Western reductionist traditions. The study of the cultural, symbolic and historical approaches to reality and Life provides us important lessons about the necessity of integrating Eastern holistic views into the study of Life. This is both an epistemological and ontological enhancement which provides more powerful and insightful ways to deal with Life and its understanding. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. sensitivity analysis on flexible road pavement life cycle cost model

    African Journals Online (AJOL)

    user

    of sensitivity analysis on a developed flexible pavement life cycle cost model using varying discount rate. The study .... organizations and specific projects needs based. Life-cycle ... developed and completed urban road infrastructure corridor ...

  15. Comparative copper sensitivity between life stages of common subantarctic marine invertebrates.

    Science.gov (United States)

    Holan, Jessica R; King, Catherine K; Davis, Andrew R

    2018-03-01

    The development of environmental guidelines in the Antarctic and subantarctic is essential, because expansion of research, tourism, and fishing is placing these regions at increasing risk of contamination. Data are currently insufficient to create the region-specific guidelines needed for the unique conditions in these areas. To develop the most appropriate environmental guidelines, data from the most sensitive life stages of a species should be included to ensure effective protection throughout its life cycle. It is generally accepted that early life stages are more sensitive to contaminants. We compared the toxicity of copper between juvenile and adult life stages of 4 subantarctic marine invertebrates using sublethal and lethal endpoints. For 2 of the species tested, juveniles were more sensitive than adults. (The 7-d median effect concentration [EC50] values for the gastropod Laevilittorina caliginosa were 79 μg/L at the juvenile stage and 125 μg/L at the adult; for the flatworm Obrimoposthia ohlini, values were 190 μg/L at the juvenile stage and 300 μg/L at the adult.) For the isopod Limnoria stephenseni, juveniles were either more sensitive or of equal sensitivity to adults (7-d EC50 values: juvenile 278 μg/L and adult 320 μg/L). In contrast, for the bivalve Gaimardia trapesina, adults appeared to be more sensitive than young adults (7-d EC50 values: juvenile 23 μg/L and adult life history stages was observed, the present study contributes important information for the development of water quality guidelines in polar regions. Environ Toxicol Chem 2018;37:807-815. © 2017 SETAC. © 2017 SETAC.

  16. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  17. NRC Response to an Act or Threat of Terrorism at an NRC-Licensed Facility

    International Nuclear Information System (INIS)

    Frank Congel

    2000-01-01

    The mandated response to a threat or act of terrorism at a U.S. Nuclear Regulatory Commission (NRC)-licensed facility was examined through a tabletop exercise in May 2000 and a limited field exercise in August 2000. This paper describes some of the new issues addressed and lessons learned from those exercises

  18. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  19. Stereotype Threat Effects on Learning from a Cognitively Demanding Mathematics Lesson

    Science.gov (United States)

    Lyons, Emily McLaughlin; Simms, Nina; Begolli, Kreshnik N.; Richland, Lindsey E.

    2018-01-01

    Stereotype threat--a situational context in which individuals are concerned about confirming a negative stereotype--is often shown to impact test performance, with one hypothesized mechanism being that cognitive resources are temporarily co-opted by intrusive thoughts and worries, leading individuals to underperform despite high content knowledge…

  20. Psychoneurometric operationalization of threat sensitivity: Relations with clinical symptom and physiological response criteria.

    Science.gov (United States)

    Yancey, James R; Venables, Noah C; Patrick, Christopher J

    2016-03-01

    The National Institute of Mental Health's Research Domain Criteria (RDoC) initiative calls for the incorporation of neurobiological approaches and findings into conceptions of mental health problems through a focus on biobehavioral constructs investigated across multiple domains of measurement (units of analysis). Although the constructs in the RDoC system are characterized in "process terms" (i.e., as functional concepts with brain and behavioral referents), these constructs can also be framed as dispositions (i.e., as dimensions of variation in biobehavioral functioning across individuals). Focusing on one key RDoC construct, acute threat or "fear," the current article illustrates a construct-oriented psychoneurometric strategy for operationalizing this construct in individual difference terms-as threat sensitivity (THT+). Utilizing data from 454 adult participants, we demonstrate empirically that (a) a scale measure of THT+ designed to tap general fear/fearlessness predicts effectively to relevant clinical problems (i.e., fear disorder symptoms), (b) this scale measure shows reliable associations with physiological indices of acute reactivity to aversive visual stimuli, and (c) a cross-domain factor reflecting the intersection of scale and physiological indicators of THT+ predicts effectively to both clinical and neurophysiological criterion measures. Results illustrate how the psychoneurometric approach can be used to create a dimensional index of a biobehavioral trait construct, in this case THT+, which can serve as a bridge between phenomena in domains of psychopathology and neurobiology. Implications and future directions are discussed with reference to the RDoC initiative and existing report-based conceptions of psychological traits. © 2016 Society for Psychophysiological Research.

  1. How Do Lessons Learned on the International Space Station (ISS) Help Plan Life Support for Mars?

    Science.gov (United States)

    Jones, Harry W.; Hodgson, Edward W.; Gentry, Gregory J.; Kliss, Mark H.

    2016-01-01

    How can our experience in developing and operating the International Space Station (ISS) guide the design, development, and operation of life support for the journey to Mars? The Mars deep space Environmental Control and Life Support System (ECLSS) must incorporate the knowledge and experience gained in developing ECLSS for low Earth orbit, but it must also meet the challenging new requirements of operation in deep space where there is no possibility of emergency resupply or quick crew return. The understanding gained by developing ISS flight hardware and successfully supporting a crew in orbit for many years is uniquely instructive. Different requirements for Mars life support suggest that different decisions may be made in design, testing, and operations planning, but the lessons learned developing the ECLSS for ISS provide valuable guidance.

  2. Lessons Learned from the Crew Health Care System (CHeCS) Rack 1 Environmental Control and Life Support (ECLS) Design

    Science.gov (United States)

    Williams, David E.

    2006-01-01

    This paper will provide an overview of the International Space Station (ISS) Environmental Control and Life Support (ECLS) design of the Crew Health Care System (CHeCS) Rack 1 and it will document some of the lessons that have been learned to date for the ECLS equipment in this rack.

  3. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  4. Phagocytosis: history's lessons.

    Science.gov (United States)

    Garg, Manish; Chandawarkar, Rajiv Y

    2013-01-01

    The assimilation of lessons from the past is an essential component of education for scientists of tomorrow. These lessons are not easy to find. History books on science are few and usually highly dramatized and biographies of scientists tend to exaggerate the pomp of scientific discovery. Both underplay the hard and laborious work that is integral to any scientific pursuit. Here we illustrate one such example. A century ago, the Nobel Prize in Medicine was awarded to two scientists: Ilya Metchnikoff, a Russian zoologist, for the discovery ofphagocytosis-a cell-mediated ingestion ofmicrobes; and Paul Ehrlich, a distinguished physician-scientist, for discovering a highly antigen-specific serum-derived antibody-based immune defense. These two diametrically opposing views of the host-pathogen interaction set the stage for a strife that led to seminal advancements in immunology. Mirrored in this journey are important lessons for scientists today--ubiquitously as applicable to modern scientific life as they were a century ago. This commentaryhighlights these lessons--a fitting centenary to a well-deserved recognition.

  5. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  6. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  7. Complementary use of life cycle assessment and risk assessment for engineered nanomaterials: Lessons learned from chemicals?

    DEFF Research Database (Denmark)

    Grieger, Khara D.; Laurent, Alexis; Miseljic, Mirko

    2013-01-01

    Successful strategies to handle the potential health and environmental risks of engineered nanomaterials (ENM) often rely upon the well-established frameworks of life cycle assessment (LCA) and risk assessment (RA). However, current research and specific guidance on how to actually apply these two...... scientific research efforts have taken into account some key lessons learned from past experiences with chemicals at the same time that many key challenges remain to applying these frameworks to ENM. In that setting, two main proposed approaches to use LCA and RA together for ENM are identified: i) LC......-based RA, similar to traditional RA applied in a life cycle perspective, and ii) RA-complemented LCA, similar to conventional LCA supplemented by RA in specific life cycle steps. This study finds that these two approaches for using LCA and RA together for ENM are similar to those made for chemicals...

  8. Brucellosis as an emerging threat in developing economies: lessons from Nigeria.

    Science.gov (United States)

    Ducrotoy, Marie J; Bertu, Wilson J; Ocholi, Reuben A; Gusi, Amahyel M; Bryssinckx, Ward; Welburn, Sue; Moriyón, Ignacio

    2014-07-01

    Nigeria is the most populous country in Africa, has a large proportion of the world's poor livestock keepers, and is a hotspot for neglected zoonoses. A review of the 127 accessible publications on brucellosis in Nigeria reveals only scant and fragmented evidence on its spatial and temporal distribution in different epidemiological contexts. The few bacteriological studies conducted demonstrate the existence of Brucella abortus in cattle and sheep, but evidence for B. melitensis in small ruminants is dated and unclear. The bulk of the evidence consists of seroprevalence studies, but test standardization and validation are not always adequately described, and misinterpretations exist with regard to sensitivity and/or specificity and ability to identify the infecting Brucella species. Despite this, early studies suggest that although brucellosis was endemic in extensive nomadic systems, seroprevalence was low, and brucellosis was not perceived as a real burden; recent studies, however, may reflect a changing trend. Concerning human brucellosis, no studies have identified the Brucella species and most reports provide only serological evidence of contact with Brucella in the classical risk groups; some suggest brucellosis misdiagnoses as malaria or other febrile conditions. The investigation of a severe outbreak that occurred in the late 1970s describes the emergence of animal and human disease caused by the settling of previously nomadic populations during the Sahelian drought. There appears to be an increasing risk of re-emergence of brucellosis in sub-Saharan Africa, as a result of the co-existence of pastoralist movements and the increase of intensive management resulting from growing urbanization and food demand. Highly contagious zoonoses like brucellosis pose a threat with far-reaching social and political consequences.

  9. Brucellosis as an Emerging Threat in Developing Economies: Lessons from Nigeria

    Science.gov (United States)

    Ducrotoy, Marie J.; Bertu, Wilson J.; Ocholi, Reuben A.; Gusi, Amahyel M.; Bryssinckx, Ward; Welburn, Sue; Moriyón, Ignacio

    2014-01-01

    Nigeria is the most populous country in Africa, has a large proportion of the world's poor livestock keepers, and is a hotspot for neglected zoonoses. A review of the 127 accessible publications on brucellosis in Nigeria reveals only scant and fragmented evidence on its spatial and temporal distribution in different epidemiological contexts. The few bacteriological studies conducted demonstrate the existence of Brucella abortus in cattle and sheep, but evidence for B. melitensis in small ruminants is dated and unclear. The bulk of the evidence consists of seroprevalence studies, but test standardization and validation are not always adequately described, and misinterpretations exist with regard to sensitivity and/or specificity and ability to identify the infecting Brucella species. Despite this, early studies suggest that although brucellosis was endemic in extensive nomadic systems, seroprevalence was low, and brucellosis was not perceived as a real burden; recent studies, however, may reflect a changing trend. Concerning human brucellosis, no studies have identified the Brucella species and most reports provide only serological evidence of contact with Brucella in the classical risk groups; some suggest brucellosis misdiagnoses as malaria or other febrile conditions. The investigation of a severe outbreak that occurred in the late 1970s describes the emergence of animal and human disease caused by the settling of previously nomadic populations during the Sahelian drought. There appears to be an increasing risk of re-emergence of brucellosis in sub-Saharan Africa, as a result of the co-existence of pastoralist movements and the increase of intensive management resulting from growing urbanization and food demand. Highly contagious zoonoses like brucellosis pose a threat with far-reaching social and political consequences. PMID:25058178

  10. Finnish Students’ Engagement in Science Lessons

    Directory of Open Access Journals (Sweden)

    Janna Linnansaari

    2015-05-01

    Full Text Available The decreasing number of students who are engaged in science learning has been recognised as a problem. The pre-conditions of engagement and actual engagement were examined using a novel research method to obtain detailed information on Finnish students’ engagement in different situations and to gain a better understanding of this phenomenon. The study’s participants consisted of 68 students (31 girls, 37 boys from 9th grade and 67 students (46 girls, 21 boys from 1st grade in upper secondary school. The research aimed to answer the following question: How does Finnish students’ engagement occur in exact and life science lessons? Participants received smartphones equipped with a smartphone application that included an experience sampling method questionnaire. The smartphones were programmed to emit a signal during every science lesson and otherwise randomly during the day (from 8 am to 8 pm. The results reveal that situation and grade had significant effects on students’ pre-conditions of engagement and actual engagement. Our results also show that girls had the highest interest in life science lessons and boys in exact science lessons.

  11. Responsiveness and sensitivity of the Stroke Specific Quality of Life Scale Danish version

    DEFF Research Database (Denmark)

    Muus, Ingrid; Christensen, Doris; Petzold, Max

    2011-01-01

    To test responsiveness and sensitivity to change of the Stroke Specific Quality of Life Scale Danish version (SSQOL-DK) scores in patients following stroke.......To test responsiveness and sensitivity to change of the Stroke Specific Quality of Life Scale Danish version (SSQOL-DK) scores in patients following stroke....

  12. The role of interpersonal sensitivity, social support, and quality of life in rural older adults.

    Science.gov (United States)

    Wedgeworth, Monika; LaRocca, Michael A; Chaplin, William F; Scogin, Forrest

    The mental health of elderly individuals in rural areas is increasingly relevant as populations age and social structures change. While social support satisfaction is a well-established predictor of quality of life, interpersonal sensitivity symptoms may diminish this relation. The current study extends the findings of Scogin et al by investigating the relationship among interpersonal sensitivity, social support satisfaction, and quality of life among rural older adults and exploring the mediating role of social support in the relation between interpersonal sensitivity and quality of life (N = 128). Hierarchical regression revealed that interpersonal sensitivity and social support satisfaction predicted quality of life. In addition, bootstrapping resampling supported the role of social support satisfaction as a mediator between interpersonal sensitivity symptoms and quality of life. These results underscore the importance of nurses and allied health providers in assessing and attending to negative self-perceptions of clients, as well as the perceived quality of their social networks. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Existential and psychological problems connected with Threat Predicting Process

    Directory of Open Access Journals (Sweden)

    Mamcarz Piotr

    2014-01-01

    Full Text Available The aim of the article is to present a very important phenomenon affecting human integrity and homeostasis that is Threat Prediction Process. This process can be defined as “experiencing apprehension concerning results of potential/ actual dangers,” (Mamcarz, 2015 oscillating in terminological area of anxiety, fear, stress, restlessness. Moreover, it highlights a cognitive process distinctive for listed phenomenon’s. The process accompanied with technological and organization changes increases number of health problems affecting many populations. Hard work conditions; changing life style; or many social and political threats have influence on people’s quality of life that are even greater and more dangerous than physical and psychological factors, which, in turn, have much more consequences for human normal functioning. The present article is based on chosen case studies of a qualitative analysis of threat prediction process

  14. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  15. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  16. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    Science.gov (United States)

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  17. Lessons from the use of a long-term energy model for consequential life cycle assessment: the BTL case

    International Nuclear Information System (INIS)

    Menten, Fabio; Tchung-Ming, Stephane; Lorne, Daphne; Bouvart, Frederique

    2013-11-01

    The main objective of this study is to develop a methodology adapted to the prospective environmental evaluation of actions in the energy sector. It describes how a bottom-up long-term energy model can be used in a life cycle assessment (LCA) framework. The proposed methodology is applied in a case study about the global warming impacts occurring as a consequence of the future production of synthetic diesel from biomass 'biomass to liquids' - BTL), a second generation biofuel, in France. The results show a high sensitivity of the system-wide GHG balance to (i) the policy context and to (ii) the economic environment. Both influence the substitutions occurring within the system due to the production of BTL. Under the specific conditions of this study, the consequences of introducing BTL are not clear-cut. Therefore, we focus on the lessons from the detailed analysis of the results more than in the precise-looking projections, illustrating how this type of models can be used for strategic planning (industry and policy makers). TIMES-type models allow a detailed description of the numerous technologies affected by BTL production and how these vary under different policy scenarios. Moreover, some recommendations are presented, which should contribute for a proper systematization of consequential and prospective LCA methodologies. We provide argumentation on how to define a functional unit and system boundaries that are better linked with the goal of the study. Other crucial methodological issues are also discussed: how to treat temporal aspects in such environmental evaluation and how to increase the consistency of life cycle assessments. (authors)

  18. A summary of lessons learned at the Shippingport Station Decommissioning Project (SSDP)

    International Nuclear Information System (INIS)

    Crimi, F.P.; Mullee, G.R.

    1987-10-01

    This paper describes the lessons learned from a management perspective during decommissioning. The lessons learned are presented in a chronological sequence during the life of the project up to the present time. The careful analysis of the lessons learned and the implementation of corresponding actions have contributed toward improving the effectiveness of decommissioning as time progresses. The lessons learned should be helpful in planning future decommissioning projects

  19. Facing death together : Understanding the consequences of mortality threats

    NARCIS (Netherlands)

    Renkema, L.J.

    2009-01-01

    In everyday life people are constantly reminded of the temporary nature of life. Newspapers, television, and the Internet offer a constant stream or death reminders, ranging from terrorist attacks to natural disasters. According to Terror Management Theory, people are able to cope with these threats

  20. "Elements of Astronomy": A Television Course of 30 Lessons

    Science.gov (United States)

    Perez, J. P. D.; Del Pozo, E. P. G.; Rodriguez, R. R. T.; Mendez, A. M. B.; Rodriguez, E. R. F.; Gamez, R. G. D.

    2006-08-01

    It was broadcasted to all Cuba from March to December 2005, one lesson per week, transmitting three times each lesson, this means 90 hours of broadcasting. It was one of the courses of the Program "University for All", that Educative Channel produced. The Thematic: Sky Coordinates and Constellations; Astronomical Instruments; Solar System; Planets and their Moons; Comets, Asteroids and Meteoroids; Sun; Cosmic Environment and Space Weather; Stars; Galaxy and Quasars; Observable Universe; Life, Intelligent Life and Civilizations in the Universe; and History of Astronomy in Cuba. The professor staff was a group of 5 researchers of the Astronomy Department. They did an effort that each lesson had the best information level with a minimum of mathematical expressions. And were used more than 60 slides and various astronomical films fragments per lesson. To make one lesson was analyzed several astronomical films, selected a group of fragments and pre-edited into various blocks with the TV specialists, later a power point presentation was conformed using all available information on-line and bibliography. Then the lesson was recorded by the TV specialist at the Educative Channel and latter reviewed and improved by one AVID edition. The Course groundwork began in April 2003, with the first list of 12 lessons, later in June was increased to18 lessons, and started the work of "Tabloide" making; it is a journal-type book of 32 pages, equivalent to about 120 normal pages including 64 illustrations. At December 2004 the Course was increased to 30 lessons and the "Tabloide" was send to editor, later 200,000 exemplars was published. Many people followed Course and "Tabloide" was shopped in some months.

  1. Affirming Life in the Face of Death: Ricoeur's Living Up to Death as a modern ars moriendi and a lesson for palliative care.

    Science.gov (United States)

    de Lange, Ds Frits

    2014-11-01

    In his posthumously published Living Up to Death Paul Ricoeur left an impressive testimony on what it means to live at a high old age with death approaching. In this article I present him as a teacher who reminds us of valuable lessons taught by patients in palliative care and their caretakers who accompany them on their way to death, and also as a guide in our search for a modern ars moriendi, after--what many at least experience as--the breakdown of traditional religious belief in a personal afterlife. These lessons can be summarized in the following theses. 'Living up to death, one cannot experience one's own death. Therefore, never consider someone dying as moribund'. 'Though everybody is alone in dying, nobody should die alone.' 'The preparation for death is an affirmation of life'. 'Life experienced as a gift can be given up'. The plausibility of the last thesis, however, may go beyond the confines of austere philosophical thinking.

  2. Lessons from Fukushima: New Concerns for the Future

    International Nuclear Information System (INIS)

    Matsumura, Akio; Girard, Odile

    2016-01-01

    In this article, the author, former Japanese diplomat, expresses lessons he learned from the catastrophe. He outlines that several aspects of this crisis keep on affecting population's health and environmental safety. He outlines several aspects: experts as well as the public have been looking for technical solutions during the first two weeks, experts knew from the beginning that the crisis was largely beyond the current technical capacities. He states that, without the intervention of experts from different fields, important information would have remained in the government's and public operator's hands rather than been communicated to the public. According to him, the main lesson is that we are now living surrounded by new threats which have been actually present for ten years, and that Fukushima is a matter of new concerns about nuclear plants

  3. Human Factors Throughout the Life Cycle: Lessons Learned from the Shuttle Program. [Human Factors in Ground Processing

    Science.gov (United States)

    Kanki, Barbara G.

    2011-01-01

    With the ending of the Space Shuttle Program, it is critical that we not forget the Human Factors lessons we have learned over the years. At every phase of the life cycle, from manufacturing, processing and integrating vehicle and payload, to launch, flight operations, mission control and landing, hundreds of teams have worked together to achieve mission success in one of the most complex, high-risk socio-technical enterprises ever designed. Just as there was great diversity in the types of operations performed at every stage, there was a myriad of human factors that could further complicate these human systems. A single mishap or close call could point to issues at the individual level (perceptual or workload limitations, training, fatigue, human error susceptibilities), the task level (design of tools, procedures and aspects of the workplace), as well as the organizational level (appropriate resources, safety policies, information access and communication channels). While we have often had to learn through human mistakes and technological failures, we have also begun to understand how to design human systems in which individuals can excel, where tasks and procedures are not only safe but efficient, and how organizations can foster a proactive approach to managing risk and supporting human enterprises. Panelists will talk about their experiences as they relate human factors to a particular phase of the shuttle life cycle. They will conclude with a framework for tying together human factors lessons-learned into system-level risk management strategies.

  4. Methods for global sensitivity analysis in life cycle assessment

    NARCIS (Netherlands)

    Groen, Evelyne A.; Bokkers, Eddy; Heijungs, Reinout; Boer, de Imke J.M.

    2017-01-01

    Purpose: Input parameters required to quantify environmental impact in life cycle assessment (LCA) can be uncertain due to e.g. temporal variability or unknowns about the true value of emission factors. Uncertainty of environmental impact can be analysed by means of a global sensitivity analysis to

  5. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  6. Life lessons.

    Science.gov (United States)

    Nitschke, Jonathan R

    2015-01-01

    Reminiscing about his younger self: "I mean I can't very well just 86 [in American slang, to "86" is to eject, remove, or discard someone or something, J.R.N.] this guy from my life. On the other hand, if through some as yet undeveloped technology I were to run into him today, how comfortable would I feel about lending him money, or for that matter even stepping down the street to have a beer and talk over old times?" - Thomas Pynchon, Slow Learner.

  7. Transmitting the sum of all fears: Iranian nuclear threat salience among offspring of Holocaust survivors.

    Science.gov (United States)

    Shrira, Amit

    2015-07-01

    Many Israelis are preoccupied with the prospect of a nuclear-armed Iran, frequently associating it with the danger of annihilation that existed during the Holocaust. The current article examined whether offspring of Holocaust survivors (OHS) are especially preoccupied and sensitive to the Iranian threat, and whether this susceptibility is a part of their increased general image of actual and potential threats, defined as the hostile world scenario (HWS). Study 1 (N = 106) showed that relative to comparisons, OHS reported more preoccupation with the Iranian nuclear threat. Moreover, the positive relationship between the salience of the Iranian threat and symptoms of anxiety was stronger among OHS. Study 2 (N = 450) replicated these findings, while focusing on the Iranian nuclear threat salience and symptoms of psychological distress. It further showed that OHS reported more negative engagement with the HWS (i.e., feeling that surrounding threats decrease one's sense of competence), which in turn mediated their increased preoccupation with the Iranian threat. The results suggest that intergenerational transmission of the Holocaust trauma includes heightened preoccupation with and sensitivity to potential threats of annihilation, and that the specific preoccupation with threats of annihilation reflects a part of a more general preoccupation with surrounding threats. (c) 2015 APA, all rights reserved).

  8. Preventing plane-assisted suicides through the lessons of research on homicide and suicide-homicide.

    Science.gov (United States)

    Rice, Timothy R; Sher, Leo

    2016-08-01

    The Germanwings 9525 incident drew significant attention to the 'plane-assisted suicide' construct, yet little scientific literature exists on this topic. This paper reviews the available literature and applies lessons from the suicide-homicide and men's mental health literature to better understand this construct from a scientific perspective. A systematic review of the relevant clinical literature was undertaken. Multiple lines of evidence suggests the applicability and relevance of suicide-homicide research and men's mental health to the plane-assisted suicide phenomenon. Plane-assisted suicides occur within an overwhelmingly male, middle aged population who, in addition to suicide, commit large scale acts of murder. Issues of divorce, separation, and threats to masculinity appear integral to an effective prevention program. Further research in the understanding of plane-assisted suicide as a product of neuropsychiatric disorder may advance such prevention efforts and have the opportunity to reduce the loss of life in future tragedies.

  9. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  10. "Hamlet" Meets "Chushingura": Traditions of the Revenge Tragedy. [Lesson Plan].

    Science.gov (United States)

    2002

    This lesson seeks to sensitize students to the similarities and difference between cultures by comparing the Shakespearean and the Bunraki/Kabuki dramas of Japan. In the lesson, the focus of this comparison is the complex nature of revenge explored in "The Tragedy of Hamlet, Prince of Denmark" and "Chusingura," or "The…

  11. USING LITERATURE IN GEOGRAPHY LESSONS

    Directory of Open Access Journals (Sweden)

    ROXANA HOBAI

    2015-01-01

    Full Text Available Including in a novel information about relief, climate, vegetation, fauna and various aspects of socio-economic life can make literature a real source of geographical information. Using realistic literary works in Geography lessons has multiple benefits, which are not limited only to geographical knowledge. In this paper there are some fragments from literature, suggestions of activities about how to integrate the fragments during Geography lessons and the results of these activities. The activities are from fifth to twelfth grade, passing through a first example of water pollution resulting from a Hercules labour, through the lyricism of the aurora borealis description, through the dramatic life of a refugee from Darfur, through the Dobrudgea winter landscape, through the grey urban landscape of Bucharest in the 90s and so on. Students were put into learning situations that stimulated their creativity, developed communication competencies and enriched their general knowledge.

  12. Global health security: the wider lessons from the west African Ebola virus disease epidemic

    Science.gov (United States)

    Heymann, David L; Chen, Lincoln; Takemi, Keizo; Fidler, David P; Tappero, Jordan W; Thomas, Mathew J; Kenyon, Thomas A; Frieden, Thomas R; Yach, Derek; Nishtar, Sania; Kalache, Alex; Olliaro, Piero L; Horby, Peter; Torreele, Els; Gostin, Lawrence O; Ndomondo-Sigonda, Margareth; Carpenter, Daniel; Rushton, Simon; Lillywhite, Louis; Devkota, Bhimsen; Koser, Khalid; Yates, Rob; Dhillon, Ranu S; Rannan-Eliya, Ravi P

    2018-01-01

    The Ebola virus disease outbreak in West Africa was unprecedented in both its scale and impact. Out of this human calamity has come renewed attention to global health security—its definition, meaning, and the practical implications for programmes and policy. For example, how does a government begin to strengthen its core public health capacities, as demanded by the International Health Regulations? What counts as a global health security concern? In the context of the governance of global health, including WHO reform, it will be important to distil lessons learned from the Ebola outbreak. The Lancet invited a group of respected global health practitioners to reflect on these lessons, to explore the idea of global health security, and to offer suggestions for next steps. Their contributions describe some of the major threats to individual and collective human health, as well as the values and recommendations that should be considered to counteract such threats in the future. Many different perspectives are proposed. Their common goal is a more sustainable and resilient society for human health and wellbeing. PMID:25987157

  13. What Recent History Has Taught Us About Responding to Emerging Infectious Disease Threats.

    Science.gov (United States)

    Paules, Catharine I; Eisinger, Robert W; Marston, Hilary D; Fauci, Anthony S

    2017-12-05

    Presidential administrations face any number of unexpected crises during their tenure, and global pandemics are among the most challenging. As of January 2017, one of the authors had served under 5 presidents as the director of the National Institute of Allergy and Infectious Diseases at the National Institutes of Health. During each administration, the government faced unexpected pandemics, ranging from the HIV/AIDS pandemic, which began during the Reagan administration, to the recent Zika outbreak in the Americas, which started during the Obama administration. These experiences underscored the need to optimize preparation for and response to these threats whenever and wherever they emerge. This article recounts selected outbreaks occurring during this period and highlights lessons that were learned that can be applied to the infectious disease threats that will inevitably be faced in the current presidential administration and beyond.

  14. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    International Nuclear Information System (INIS)

    Upadhyayula, Venkata K.K.

    2012-01-01

    Highlights: ► Smart sensors are needed for detection of chemical and biological threat agents. ► Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. ► Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. ► Functionalized GNPs support multiple analytical methods for sensing threat agents. ► Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and

  15. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyayula, Venkata K.K., E-mail: Upadhyayula.Venkata@epa.gov [Oak Ridge Institute of Science and Education (ORISE), MC-100-44, PO Box 117, Oak Ridge, TN 37831 (United States)

    2012-02-17

    Highlights: Black-Right-Pointing-Pointer Smart sensors are needed for detection of chemical and biological threat agents. Black-Right-Pointing-Pointer Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. Black-Right-Pointing-Pointer Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. Black-Right-Pointing-Pointer Functionalized GNPs support multiple analytical methods for sensing threat agents. Black-Right-Pointing-Pointer Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad

  16. Life history variation in Barents Sea fish: implications for sensitivity to fishing in a changing environment.

    Science.gov (United States)

    Wiedmann, Magnus A; Primicerio, Raul; Dolgov, Andrey; Ottesen, Camilla A M; Aschan, Michaela

    2014-09-01

    Under exploitation and environmental change, it is essential to assess the sensitivity and vulnerability of marine ecosystems to such stress. A species' response to stress depends on its life history. Sensitivity to harvesting is related to the life history "fast-slow" continuum, where "slow" species (i.e., large, long lived, and late maturing) are expected to be more sensitive to fishing than "fast" ones. We analyze life history traits variation for all common fish species in the Barents Sea and rank fishes along fast-slow gradients obtained by ordination analyses. In addition, we integrate species' fast-slow ranks with ecosystem survey data for the period 2004-2009, to assess life history variation at the community level in space and time. Arctic fishes were smaller, had shorter life spans, earlier maturation, larger offspring, and lower fecundity than boreal ones. Arctic fishes could thus be considered faster than the boreal species, even when body size was corrected for. Phylogenetically related species possessed similar life histories. Early in the study period, we found a strong spatial gradient, where members of fish assemblages in the southwestern Barents Sea displayed slower life histories than in the northeast. However, in later, warmer years, the gradient weakened caused by a northward movement of boreal species. As a consequence, the northeast experienced increasing proportions of slower fish species. This study is a step toward integrating life history traits in ecosystem-based areal management. On the basis of life history traits, we assess the fish sensitivity to fishing, at the species and community level. We show that climate warming promotes a borealization of fish assemblages in the northeast, associated with slower life histories in that area. The biology of Arctic species is still poorly known, and boreal species that now establish in the Arctic are fishery sensitive, which calls for cautious ecosystem management of these areas.

  17. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  18. Plant invasions in mountains: Global lessons for better management

    Science.gov (United States)

    McDougall, K.L.; Khuroo, A.A.; Loope, L.L.; Parks, C.G.; Pauchard, A.; Reshi, Z.A.; Rushworth, I.; Kueffer, C.

    2011-01-01

    Mountains are one of few ecosystems little affected by plant invasions. However, the threat of invasion is likely to increase because of climate change, greater anthropogenic land use, and continuing novel introductions. Preventive management, therefore, will be crucial but can be difficult to promote when more pressing problems are unresolved and predictions are uncertain. In this essay, we use management case studies from 7 mountain regions to identify common lessons for effective preventive action. The degree of plant invasion in mountains was variable in the 7 regions as was the response to invasion, which ranged from lack of awareness by land managers of the potential impact in Chile and Kashmir to well-organized programs of prevention and containment in the United States (Hawaii and the Pacific Northwest), including prevention at low altitude. In Australia, awareness of the threat grew only after disruptive invasions. In South Africa, the economic benefits of removing alien plants are well recognized and funded in the form of employment programs. In the European Alps, there is little need for active management because no invasive species pose an immediate threat. From these case studies, we identify lessons for management of plant invasions in mountain ecosystems: (i) prevention is especially important in mountains because of their rugged terrain, where invasions can quickly become unmanageable; (ii) networks at local to global levels can assist with awareness raising and better prioritization of management actions; (iii) the economic importance of management should be identified and articulated; (iv) public acceptance of management programs will make them more effective; and (v) climate change needs to be considered. We suggest that comparisons of local case studies, such as those we have presented, have a pivotal place in the proactive solution of global change issues. ?? International Mountain Society.

  19. Lessons from the response to the threat of transfusion-transmitted vCJD in Ireland.

    Science.gov (United States)

    Murphy, W G

    2013-09-01

    By the time vCJD was first described in 1996, it was already far too late to offset further disaster from transmission of the disease by blood transfusion: almost all the humans who would be infected and infectious were already diseased. Nothing done by the blood transfusion services around that time, with the exception of excluding transfusion recipients as blood donors, would have made any useful contribution to containing the extent of the epidemic. The ability to spread emerging diseases before the problem is manifest or understood is a fixed and unavoidable feature of blood transfusion as it is practiced today. A second fixed property of blood transfusion is that the root cause of disaster is not within the control of the blood transfusion universe. Strategies that have emerged to cope with similar threat in other enterprises that also contain these properties comprise the components of robust design: surveillance, preparedness for action, engagement, herding together, evasion or avoidance, early adoption of potentially useful measures, engineered resilience, defence in depth, damage limitation including modularity and removal of feedback loops, and contingency, redundancy and failure management, and ultimately, individual escape. Early adoption of leucodepletion based on the possibility that it might work rather than any hard evidence was a good example of threat management. Exclusion of previously transfused donors is a robust mechanism for containing any future infection; optimal blood use structures that provide a national transfusion rate as low as possible also constitute an effective threat management strategy. Copyright © 2013 Elsevier Masson SAS. All rights reserved.

  20. Experimental Garden Plots for Botany Lessons

    Science.gov (United States)

    Gorodnicheva, V. V.; Vasil'eva, E. I.

    1976-01-01

    Discussion of the botany lessons used at two schools points out the need for fifth and sixth grade students to be taught the principles of plant life through observations made at an experimental garden plot at the school. (ND)

  1. Early life trauma exposure and stress sensitivity in young children.

    Science.gov (United States)

    Grasso, Damion J; Ford, Julian D; Briggs-Gowan, Margaret J

    2013-01-01

    The current study replicates and extends work with adults that highlights the relationship between trauma exposure and distress in response to subsequent, nontraumatic life stressors. The sample included 213 2-4-year-old children in which 64.3% had a history of potential trauma exposure. Children were categorized into 4 groups based on trauma history and current life stress. In a multivariate analysis of variance, trauma-exposed children with current life stressors had elevated internalizing and externalizing problems compared with trauma-exposed children without current stress and nontrauma-exposed children with and without current stressors. The trauma-exposed groups with or without current stressors did not differ on posttraumatic stress disorder symptom severity. Accounting for number of traumatic events did not change these results. These findings suggest that early life trauma exposure may sensitize young children and place them at risk for internalizing or externalizing problems when exposed to subsequent, nontraumatic life stressors.

  2. Life extension, overpopulation and the right to life: against lethal ethics.

    Science.gov (United States)

    Cutas, D E

    2008-09-01

    Some of the objections to life-extension stem from a concern with overpopulation. I will show that whether or not the overpopulation threat is realistic, arguments from overpopulation cannot ethically demand halting the quest for, nor access to, life-extension. The reason for this is that we have a right to life, which entitles us not to have meaningful life denied to us against our will and which does not allow discrimination solely on the grounds of age. If the threat of overpopulation creates a rights conflict between the right to come into existence, the right to reproduce, the right to more opportunities and space (if, indeed, these rights can be successfully defended), and the right to life, the latter ought to be given precedence.

  3. Organizational Security Threats Related to Portable Data Storage Devices: Qualitative Exploratory Inquiry

    Science.gov (United States)

    Cooper, Paul K.

    2017-01-01

    There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…

  4. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  5. Maintaining Research Integrity While Balancing Cultural Sensitivity: A Case Study and Lessons From the Field.

    Science.gov (United States)

    Sibbald, Rebekah; Loiseau, Bethina; Darren, Benedict; Raman, Salem A; Dimaras, Helen; Loh, Lawrence C

    2016-04-01

    Contemporary emphasis on creating culturally relevant and context specific knowledge increasingly drives researchers to conduct their work in settings outside their home country. This often requires researchers to build relationships with various stakeholders who may have a vested interest in the research. This case study examines the tension between relationship development with stakeholders and maintaining study integrity, in the context of potential harms, data credibility and cultural sensitivity. We describe an ethical breach in the conduct of global health research by a arising from the ad-hoc participation of a community stakeholder external to the visiting research group. A framework for reflection is developed from a careful examination of underlying factors and presented with a discussion of consequences and mitigation measures. This framework aims to present lessons learned for researchers working abroad who might face similar situations in their work. © 2015 John Wiley & Sons Ltd.

  6. Early-life sensitization to hen's egg predicts asthma and rhinoconjunctivitis at 14 years of age

    DEFF Research Database (Denmark)

    Christiansen, Elisabeth Soegaard; Kjaer, Henrik Fomsgaard; Eller, Esben

    2017-01-01

    to groups of and to individual allergens and asthma and RC at 6 and 14 years compared to a reference group with no sensitization. RESULTS: Both transient and persistent early-life sensitization to cow's milk or hen's egg proteins were associated with asthma (aOR 3.99(1.41-11.32) and 5.95(1.78-19.92)) and RC...... (aOR 2.94(1.19-7.28) and 6.18(1.86-20.53)) at 14 years, this association being driven mainly by sensitization to hen's egg. Transient early-life sensitization to HDM had increased risk of asthma (aOR 3.80(1.17-12.41)) at 14 years. CONCLUSIONS: Early transient and persistent IgE sensitization to hen......'s egg was associated with asthma and RC at 14 years. Furthermore, sensitization to HDM was associated with asthma at 14 years. This article is protected by copyright. All rights reserved....

  7. A hard lesson for Europeans: the ASEAN CDC.

    Science.gov (United States)

    Tibayrenc, Michel

    2005-06-01

    Despite the growing threat of major pandemics, the European Union is planning no more than a meager surveillance agency staffed with 70 people on the 2007 horizon: the new European Centre for Disease Control. I argue that an effective structure should be much larger and include a strong research activity. Asian countries, inspired by the US CDC, are now taking this concept in hand and creating an ASEAN Center For Disease Control, with sophisticated laboratory facilities to be included. This is a tough lesson for us Europeans, and our avarice in this domain could have tragic consequences in the future.

  8. Lessons learned in crisis management.

    Science.gov (United States)

    Olson, Chris

    2014-01-01

    This paper will explore lessons learned following a series of natural and man-made disasters affecting the Massachusetts Mutual Life Insurance Company and/or its subsidiaries. The company employs a team of certified continuity professionals who are charged with overseeing resilience on behalf of the enterprise and leading recovery activities wherever and whenever necessary.

  9. ELPSA AS A LESSON DESIGN FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Tom Lowrie

    2015-07-01

    Full Text Available This paper offers a framework for mathematics lesson design that is consistent with the way we learn about, and discover, most things in life. In addition, the framework provides a structure for identifying how mathematical concepts and understanding are acquired and developed. This framework is called ELPSA and represents five learning components, namely: Experience, Language, Pictorial, Symbolic and Applications. This framework has been used in developing lessons and teacher professional programs in Indonesia since 2012 in cooperation with the World Bank. This paper describes the theory that underlines the framework in general and in relation to each inter-connected component. Two explicit learning sequences for classroom practice are described, associated with Pythagoras theorem and probability. This paper then concludes with recommendations for using ELPSA in various institutional contexts.Keywords: ELPSA, lesson design framework, Pythagoras theorem, probability DOI: dx.doi.org/10.22342/jme.62.77

  10. Specifically altered brain responses to threat in generalized anxiety disorder relative to social anxiety disorder and panic disorder

    Directory of Open Access Journals (Sweden)

    Christine Buff

    2016-01-01

    Conclusion: The findings present the first evidence for GAD-specific neural correlates of hyper-responsive threat processing, possibly reflecting exaggerated threat sensitivity, maladaptive appraisal and attention-allocation processes.

  11. "Hamlet" and the Elizabethan Revenge Ethic in Text and Film. [Lesson Plan].

    Science.gov (United States)

    2002

    This lesson seeks to sensitize students to the complex nature of revenge as it is portrayed in William Shakespeare's "The Tragedy of Hamlet, Prince of Denmark." In the lesson, students learn how Shakespeare's play interprets Elizabethan attitudes toward revenge, as reflected in the structure of the Elizabethan revenge tragedy, one of the…

  12. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  13. The metaphysical lessons of synthetic biology and neuroscience.

    Science.gov (United States)

    Baertschi, Bernard

    2015-01-01

    In this paper, I examine some important metaphysical lessons that are often presented as derived from two new scientific disciplines: synthetic biology and neuroscience. I analyse four of them: the nature of life, the existence of a soul (the mind-body problem), personhood, and free will. Many caveats are in order, and each 'advance' or each case should be assessed for itself. I conclude that a main lesson can nevertheless be learned: in conjunction with modern science, neuroscience and synthetic biology allow us to enrich old metaphysical debates, to deepen and even renew them. In particular, it becomes less and less plausible to consider life, mind, person, and agency as non-natural or non-physical entities. Copyright © 2015 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  14. Operational experience, the open joint stock company IZOTOP, on reducing radiological threat in Russia and Commonwealth of Independent States countries from radioactive sources at the end of their life cycle

    International Nuclear Information System (INIS)

    Akakiev, B.V.; Makarevich, I.M.; Nesterov, V.P.; Gasselblat, A.D.; Filatov, K.V.

    2010-01-01

    Full text: The issues of radiological threat from radioactive sources at the end of their life cycle is described in the paper. The order of works execution is described by the example of radioisotope irradiation facilities discharge including works on transportation and preparation for radioactive sources storage. The procedure of development and agreement of organizational and technical documentation on un-shipping of ionizing radiation sources is described. The safe work organization structure and transportation of radioactive materials to Joint Stock Company IZOTOP is considered. Standard examples of taking over the control of different radioactive sources is presented, which presents radiological threat. Sources disposal technology in Russia is shown. Summary of Joint Stock Company IZOTOP activities in 2004-2009 years in Russia and Commonwealth of Independent States member-countries on radiological threat is provided.

  15. Sensitivity of UK butterflies to local climatic extremes: which life stages are most at risk?

    Science.gov (United States)

    McDermott Long, Osgur; Warren, Rachel; Price, Jeff; Brereton, Tom M; Botham, Marc S; Franco, Aldina M A

    2017-01-01

    There is growing recognition as to the importance of extreme climatic events (ECEs) in determining changes in species populations. In fact, it is often the extent of climate variability that determines a population's ability to persist at a given site. This study examined the impact of ECEs on the resident UK butterfly species (n = 41) over a 37-year period. The study investigated the sensitivity of butterflies to four extremes (drought, extreme precipitation, extreme heat and extreme cold), identified at the site level, across each species' life stages. Variations in the vulnerability of butterflies at the site level were also compared based on three life-history traits (voltinism, habitat requirement and range). This is the first study to examine the effects of ECEs at the site level across all life stages of a butterfly, identifying sensitive life stages and unravelling the role life-history traits play in species sensitivity to ECEs. Butterfly population changes were found to be primarily driven by temperature extremes. Extreme heat was detrimental during overwintering periods and beneficial during adult periods and extreme cold had opposite impacts on both of these life stages. Previously undocumented detrimental effects were identified for extreme precipitation during the pupal life stage for univoltine species. Generalists were found to have significantly more negative associations with ECEs than specialists. With future projections of warmer, wetter winters and more severe weather events, UK butterflies could come under severe pressure given the findings of this study. © 2016 The Authors. Journal of Animal Ecology © 2016 British Ecological Society.

  16. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  17. A study of insider threat in nuclear security analysis using game theoretic modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Yim, Man-Sung; Schneider, Erich

    2017-01-01

    Highlights: • Implications of an insider threat in nuclear security were quantitatively analyzed. • The analysis was based on of a hypothetical nuclear facility and using game theoretic approach. • Through a sensitivity analysis, vulnerable paths and important parameters were identified. • The methodology can be utilized to prioritize the implementation of PPS improvements in a facility. - Abstract: An Insider poses a greater threat to the security system of a nuclear power plant (NPP) because of their ability to take advantage of their access rights and knowledge of a facility, to bypass dedicated security measures. If an insider colludes with an external terrorist group, this poses a key threat to the safety-security interface. However, despite the importance of the insider threat, few studies have been conducted to quantitatively analyze an insider threat. This research examines the quantitative framework for investigating the implications of insider threat, taking a novel approach. Conventional tools assessing the security threats to nuclear facilities focus on a limited number of attack pathways. These are defined by the modeler and are based on simple probabilistic calculations. They do not capture the adversary’s intentions nor do they account for their response and adaptation to defensive investments. As an alternative way of performing physical protection analysis, this research explores the use of game theoretic modeling of Physical Protection Systems (PPS) analysis by incorporating the implications of an insider threat, to address the issues of intentionality and interactions. The game theoretic approach has the advantage of modeling an intelligent adversary and insider who has an intention to do harm and complete knowledge of the facility. Through a quantitative assessment and sensitivity analysis, vulnerable but important parameters in this model were identified. This made it possible to determine which insider threat is more important. The

  18. Y2K lessons learned for electric grid stability

    International Nuclear Information System (INIS)

    Gueorguiev, B.; Ianev, I. L.; Purvis, E. E.

    2000-01-01

    Y2K was an example of a worldwide infrastructure threat. Actions to understand infrastructure risks and mitigate infrastructure threats are a continuing and increasing part of the worlds corporate, government, and international organizations systems, and the severe implications of infrastructure failures to the health, safety, and financial well being of people and organizations are the deriving force. The IAEA conducted a number of Y2K related activities in nuclear power and fuel cycle activities. A set of these activities address the interface between electric power generation facilities and electric power grids in the region of Eastern Europe and the countries of the former Soviet Union. This addressed a continuing infrastructure risks and actions to mitigate these risk. The results were shown by events to have made positive contributions. The potential loss of nuclear power plant generation is a significant risk to electric power grids, an important critical infrastructure. Not only does the threat constitute a problem with the potential loss of the grid, loss of the electric power grid increases the probability of accidents in nuclear power plants. Recognizing that these activities addressed only one area of infrastructure risk in one region, there are some key lessons that were learned that could have general applicability

  19. Sensitivity and responsiveness of the health-related quality of life in stroke patients-40 (HRQOLISP-40) scale.

    Science.gov (United States)

    Vincent-Onabajo, Grace O; Owolabi, Mayowa O; Hamzat, Talhatu K

    2014-01-01

    To investigate the sensitivity and responsiveness of the Health-Related Quality of Life in Stroke Patients-40 (HRQOLISP-40) scale in evaluating stroke patients from onset to 12 months. Fifty-five patients with first-incidence stroke were followed-up for 12 months. The HRQOLISP-40 scale was used to assess health-related quality of life (HRQOL) while stroke severity was assessed with the Stroke Levity Scale. Sensitivity to change was assessed by analyzing changes in the HRQOLISP-40 scores between pairs of months with paired samples t-test. Standardized effect size (SES) and standardized response mean (SRM) were used to express responsiveness. Overall HRQOL and domains in the physical sphere of the HRQOLISP-40 were sensitive to change at different time intervals in the first 12 months post-stroke. Marked responsiveness (SES and SRM >0.7) was demonstrated by the overall scale, and the physical, psycho-emotional and cognitive domains at varying time intervals. For instance, SRM was greater than 0.7 between 1 and 6, 3 and 12, 1 and 9, and 1 and 12 months for both the physical and psycho-emotional domains. The HRQOLISP-40 is a sensitive and responsive stroke-specific quality of life measure that can be used to evaluate the outcome of stroke rehabilitation. Enhancing the health-related quality of life (HRQOL) of stroke survivors can be regarded as the ultimate goal of stroke rehabilitation. Sensitive and responsive stroke-specific HRQOL measures are required for use in evaluative studies, and clinical trials and practice. The Health-Related Quality of Life in Stroke Patients-40 (HRQOLISP-40) is a sensitive and responsive stroke-specific scale.

  20. Rock slopes and reservoirs - lessons learned

    International Nuclear Information System (INIS)

    Moore, D.P.

    1999-01-01

    Lessons learned about slope stability in the course of four decades of monitoring, and in some cases stabilizing, slopes along British Columbia's hydroelectric reservoirs are discussed. The lessons are illustrated by short case histories of some of the more important slopes such as Little Chief Slide, Dutchman's Ridge, Downie Slide, Checkerboard Creek and Wahleach. Information derived from the monitoring and other investigations are compared with early interpretations of geology and slope performance. The comparison serves as an indicator of progress in slope stability determination and as a measure of the value of accumulated experience in terms of the potential consequences to safety and cost savings over the long life-span of hydroelectric projects.14 refs., 2 tabs., 15 figs

  1. Twain's "Hannibal." Learning Page Lesson Plan.

    Science.gov (United States)

    Wood, Jan; Thiese, Norma

    Writers are influenced by their environment including family, community, lifestyle, or location. One such writer was Mark Twain. With this lesson plan the learner will become familiar with and analyze life around Mark Twain's hometown, Hannibal, Missouri, during the latter half of the 19th century by using various online and print resources to…

  2. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  3. Cyber threats to health information systems: A systematic review.

    Science.gov (United States)

    Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott

    2016-01-01

    Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.

  4. A cross-cultural comparison of biology lessons between China and Germany: a video study

    Science.gov (United States)

    Liu, Ning; Neuhaus, Birgit Jana

    2017-08-01

    Given the globalization of science education and the different cultures between China and Germany, we tried to compare and explain the differences on teacher questions and real life instances in biology lessons between the two countries from a culture-related perspective. 22 biology teachers from China and 21 biology teachers from Germany participated in this study. Each teacher was videotaped for one lesson on the unit blood and circulatory system. Before the teaching unit, students' prior knowledge was tested with a pretest. After the teaching unit, students' content knowledge was tested with a posttest. The aim of the knowledge tests here was for the better selection of the four samples for qualitative comparison in the two countries. The quantitative analysis showed that more lower-order teacher questions and more real life instances that were introduced after learning relevant concepts were in Chinese lessons than in German lessons. There were no significant differences in the frequency of higher-order questions or real life instances that were introduced before learning concepts. Qualitative analysis showed that both German teachers guided students to analyze the reasoning process of Landsteiner experiment, but nor Chinese teachers did that. The findings reflected the subtle influence of culture on classroom teaching. Relatively, Chinese biology teachers focused more on learning content and the application of the content in real life; German biology teachers emphasized more on invoking students' reasoning and divergent thinking.

  5. Diet Quality throughout Early Life in Relation to Allergic Sensitization and Atopic Diseases in Childhood

    Directory of Open Access Journals (Sweden)

    Anh N. Nguyen

    2017-08-01

    Full Text Available Early-life nutrition is an important modifiable determinant in the development of a child’s immune system, and may thereby influence the risk of allergic sensitization and atopic diseases. However, associations between overall dietary patterns and atopic diseases in childhood remain unclear. We examined associations of diet quality in early life with allergic sensitization, self-reported physician-diagnosed inhalant and food allergies, eczema, and asthma among 5225 children participating in a population-based cohort in the Netherlands. Diet was assessed during pregnancy, infancy, and childhood using validated food-frequency questionnaires. We calculated food-based diet quality scores (0–10 or 0–15, reflecting adherence to dietary guidelines. At age 10 years, allergic sensitization was assessed with skin prick tests. Information on physician-diagnosed inhalant and food allergies, eczema, and asthma was obtained with questionnaires. We observed no associations between diet quality during pregnancy and allergic sensitization (odds ratio (OR = 1.05 per point in the diet score, 95% confidence interval (CI: 0.99, 1.13, allergies (0.96, 95% CI: 0.88, 1.04, eczema (0.99, 95% CI: 0.93, 1.06, or asthma (0.93, 95% CI: 0.85, 1.03 in childhood. Also, diet quality in infancy or childhood were not associated with atopic outcomes in childhood. Our findings do not support our hypothesis that a healthy dietary pattern in early life is associated with a lower risk of allergic sensitization or atopic diseases in childhood.

  6. Best Practices and Controls for Mitigating Insider Threats

    Science.gov (United States)

    2013-08-08

    Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University MERIT CORP Man-in-the-Middle (MITM) Proxy SSL / TLS ...Handshake SSL / TLS Handshake Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon...to upload attachments present an opportunity for sensitive data to leave the organization. •  Communications that are secured with SSL encryption

  7. Economics in "Global Health 2035": a sensitivity analysis of the value of a life year estimates.

    Science.gov (United States)

    Chang, Angela Y; Robinson, Lisa A; Hammitt, James K; Resch, Stephen C

    2017-06-01

    In "Global health 2035: a world converging within a generation," The Lancet Commission on Investing in Health (CIH) adds the value of increased life expectancy to the value of growth in gross domestic product (GDP) when assessing national well-being. To value changes in life expectancy, the CIH relies on several strong assumptions to bridge gaps in the empirical research. It finds that the value of a life year (VLY) averages 2.3 times GDP per capita for low- and middle-income countries (LMICs) assuming the changes in life expectancy they experienced from 2000 to 2011 are permanent. The CIH VLY estimate is based on a specific shift in population life expectancy and includes a 50 percent reduction for children ages 0 through 4. We investigate the sensitivity of this estimate to the underlying assumptions, including the effects of income, age, and life expectancy, and the sequencing of the calculations. We find that reasonable alternative assumptions regarding the effects of income, age, and life expectancy may reduce the VLY estimates to 0.2 to 2.1 times GDP per capita for LMICs. Removing the reduction for young children increases the VLY, while reversing the sequencing of the calculations reduces the VLY. Because the VLY is sensitive to the underlying assumptions, analysts interested in applying this approach elsewhere must tailor the estimates to the impacts of the intervention and the characteristics of the affected population. Analysts should test the sensitivity of their conclusions to reasonable alternative assumptions. More work is needed to investigate options for improving the approach.

  8. Narrative foreclosure in later life: Preliminary considerations for a new sensitizing concept

    NARCIS (Netherlands)

    Bohlmeijer, Ernst Thomas; Westerhof, Gerben Johan; Randall, W.; Tromp, T.; Kenyon, G.

    2011-01-01

    The objective of the paper is to explore narrative foreclosure as a sensitizing concept for studying the ways in which narrative identity development falters in later life. Two main characters in famous movies are contrasted to provide a better understanding of narrative foreclosure. The concept is

  9. Improving the Identification, Dissemination and Implementation of Deactivation and Decommissioning Lessons Learned and Best Practices

    International Nuclear Information System (INIS)

    Waisley, Sandra L.; Lackey, Michael B.; Dusek, Lansing G.

    2008-01-01

    Approximately $150 billion of work currently remains in the United States Department of Energy's (DoE's) Office of Environmental Management (EM) life cycle budget for U.S. projects. Contractors who manage facilities for the DOE have been challenged to identify transformational changes to reduce the life cycle costs and to develop a knowledge-management system that identifies, disseminates, and tracks the implementation of lessons learned and best practices. This paper discusses DoE's rationale for using lessons learned and best practices to improve safety and performance while reducing life cycle costs for Deactivation and Decommissioning (D and D) projects. It also provides an update on the Energy Facility Contractors Group's (EFCOG's) progress in supporting DoE's efforts. At this juncture the best practice efforts described are in developmental stages; however, the commitment to and the concrete nature of the work thus far is noteworthy in regard to improving the way D and D lessons learned and best practices are identified, disseminated and implemented across the DOE Complex

  10. Lesson learned from two radiological incidents in industrial radiography in Iran

    International Nuclear Information System (INIS)

    Samimi, Bijan; Deevband Mohammad, Reza; Kardan Mohammad, Reza; Eshraghi, Ahmad

    2006-01-01

    This paper discussed two incidents occurred in Iran, follow-up investigations as well as lessons learned. Two Industrial Gamma Radiography Projectors (I.G.R.P.) included Ir-192 source with activities 24 and 30 Curies respectively were stolen. One of them was stolen in an industrial area with high security provision and the other one has been stolen at the home town without any security provision. The lessons learned from these incidents are discussed and the results are proposed as recommendations. Investigations show that the reasons for these incidents are as follows: 1. Insufficient training programs for radiographers. 2. Lack of specific emergency procedure for this type of incident in the company. 3. Not efficient National Emergency Plan for this type of threat. 4. Lack of technical and administrative measures to separate radioactive sources from unauthorized persons. 5. Lack of security plan in the company. 6. Insufficient supervision of Radiation Protection Officer (R.P.O.) or responsible person at the site. (authors)

  11. Lesson learned from two radiological incidents in industrial radiography in Iran

    Energy Technology Data Exchange (ETDEWEB)

    Samimi, Bijan; Deevband Mohammad, Reza; Kardan Mohammad, Reza; Eshraghi, Ahmad [National Radiation Protection Department (NRPD) Atomic Energy Organization of Iran (AEOI) (Iran, Islamic Republic of)

    2006-07-01

    This paper discussed two incidents occurred in Iran, follow-up investigations as well as lessons learned. Two Industrial Gamma Radiography Projectors (I.G.R.P.) included Ir-192 source with activities 24 and 30 Curies respectively were stolen. One of them was stolen in an industrial area with high security provision and the other one has been stolen at the home town without any security provision. The lessons learned from these incidents are discussed and the results are proposed as recommendations. Investigations show that the reasons for these incidents are as follows: 1. Insufficient training programs for radiographers. 2. Lack of specific emergency procedure for this type of incident in the company. 3. Not efficient National Emergency Plan for this type of threat. 4. Lack of technical and administrative measures to separate radioactive sources from unauthorized persons. 5. Lack of security plan in the company. 6. Insufficient supervision of Radiation Protection Officer (R.P.O.) or responsible person at the site. (authors)

  12. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    Science.gov (United States)

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  13. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  14. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  15. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  16. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  17. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  18. Radiation sensitivity and DNA repair in Caenorhabditis elegans strains with different mean life spans

    Energy Technology Data Exchange (ETDEWEB)

    Hartman, P S; Simpson, V J; Johnson, T; Mitchell, D

    1988-06-01

    The sensitivities to three DNA damaging agents (UV and ..gamma..-radiation, methyl methanesulfonate) were measured in four recombinant inbred (RI) strains of Caenorhabditis elegans with mean life spans ranging from 13 to 30.9 days, as well as in the wild-type strains used to derive these RI's. Sensitivities at several stages in the developmental cycle were tested. There were no significant correlations between mean life span and the lethal effects of these 3 agents. Excision of two UV-radiation-induced DNA photoproducts was also measured. Long-lived strains were no more repair competent than shorter-lived strains. These data indicate that DNA repair plays at best a minor role in the aging process of C. elegans. 33 refs.; 4 figs.

  19. Placing Human Behavior at the Center of the Fight to Eradicate Polio: Lessons Learned and Their Application to Other Life-Saving Interventions.

    Science.gov (United States)

    Guirguis, Sherine; Obregon, Rafael; Coleman, Michael; Hickler, Benjamin; SteelFisher, Gillian

    2017-07-01

    Today, acceptance of oral polio vaccine is the highest ever. Reaching this level of acceptance has depended on decades of engaging with communities, building trust amid extraordinary social contexts, and responding to the complex variables that trigger behavioral and social change. Drawing on both the successes and setbacks in the 28 years of the Global Polio Eradication Initiative (GPEI), this article articulates what happened when the GPEI began to pay more attention to the dynamics of human and social behavior change. Three particular lessons for other health and immunization programs can be drawn from the experience of GPEI: change begins from within (ie, success needs institutional recognition of the importance of human behavior), good data are not enough for good decision-making, and health workers are important agents of behavior change. These lessons should be harnessed and put into practice to build demand and trust for the last stages of polio eradication, as well as for other life-saving health interventions. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America.

  20. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  1. Risk and Threat via Online Social Network among Academia at Higher Education

    Science.gov (United States)

    Shaker Hussain, Hanizan; Din, Roshidi; Zulkarnaen Khidzir, Nik; Azhar Mat Daud, Khairul; Ahmad, Suzastri

    2018-05-01

    The evolution of information and communication technologies (ICT) nowadays has changed the life style of human living. The current modern societies have adopted ICT as an important thing that they are really needed in their life, especially as a tool to be used for communications activity. However, unfortunately ICT also exposed its user in circumstances of risk, threats and vulnerability. This paper will discuss the risk and threats to the users who are using social media as a medium to communicate. In this paper, the fraction of user will be divided by two types which are gender and working experience. The data that obtained from the distributed of questionnaires among respondent will be analysed by using SPSS. Data will be analysed by using two-way ANOVA statistic in order to examine the significant level in between gender and working experience as an independent variable in this study with the level of threats in cybersecurity risk towards lecturers who are working in higher education institutions in Malaysia. This article also will provide an empirical data and will be referred to another researcher in the future for their further research perhaps.

  2. Exploring the Relationship between Noise Sensitivity, Annoyance and Health-Related Quality of Life in a Sample of Adults Exposed to Environmental Noise

    Directory of Open Access Journals (Sweden)

    Daniel Shepherd

    2010-10-01

    Full Text Available The relationship between environmental noise and health is poorly understood but of fundamental importance to public health. This study estimated the relationship between noise sensitivity, noise annoyance and health-related quality of life in a sample of adults residing close to the Auckland International Airport, New Zealand. A small sample (n = 105 completed surveys measuring noise sensitivity, noise annoyance, and quality of life. Noise sensitivity was associated with health-related quality of life; annoyance and sleep disturbance mediated the effects of noise sensitivity on health.

  3. ELPSA as A Lesson Design Framework

    Directory of Open Access Journals (Sweden)

    Tom Lowrie

    2015-07-01

    Full Text Available This paper offers a framework for mathematics lesson design that is consistent with the way we learn about, and discover, most things in life. In addition, the framework provides a structure for identifying how mathematical concepts and understanding are acquired and developed. This framework is called ELPSA and represents five learning components, namely: Experience, Language, Pictorial, Symbolic and Applications. This framework has been used in developing lessons and teacher professional programs in Indonesia since 2012 in cooperation with the World Bank. This paper describes the theory that underlines the framework in general and in relation to each inter-connected component. Two explicit learning sequences for classroom practice are described, associated with Pythagoras theorem and probability. This paper then concludes with recommendations for using ELPSA in various institutional contexts.

  4. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  5. Camouflage for patients with vitiligo vulgaris improved their quality of life.

    Science.gov (United States)

    Tanioka, Miki; Yamamoto, Yosuke; Kato, Mayumi; Miyachi, Yoshiki

    2010-03-01

    Cosmetic camouflage is important for patients with vitiligo vulgaris. However, few studies have investigated its benefit for vitiligo patients. To analyze the psychological effects on patients with vitiligo vulgaris by camouflage lessons performed in vitiligo clinics in Kyoto University Hospital and Fukui Red Cross Hospital, Dermatological Life Quality Index (DLQI) questionnaires were collected before and 1 month after camouflage lessons. Patients with vitiligo vulgaris, who visited our clinics in 2008 and had never experienced camouflage, were enrolled in this study. They took camouflage lessons and continued subsequent self-camouflage for 1 month. Control patients took no lessons and no camouflage. Camouflage improved the scores of DLQI when compared with those without camouflage (P = 0.005). Camouflage improved DLQI scores from 5.90 to 4.48. In DLQI subcategories, camouflage lessons improved a subcategory of "symptoms and feelings" (P = 0.0037). These data supported the idea that camouflage for patients with vitiligo not only covers the white patches but also improves their quality of life.

  6. Separate and interactive contributions of weak inhibitory control and threat sensitivity to prediction of suicide risk.

    Science.gov (United States)

    Venables, Noah C; Sellbom, Martin; Sourander, Andre; Kendler, Kenneth S; Joiner, Thomas E; Drislane, Laura E; Sillanmäki, Lauri; Elonheimo, Henrik; Parkkola, Kai; Multimaki, Petteri; Patrick, Christopher J

    2015-04-30

    Biobehavioral dispositions can serve as valuable referents for biologically oriented research on core processes with relevance to many psychiatric conditions. The present study examined two such dispositional variables-weak response inhibition (or disinhibition; INH-) and threat sensitivity (or fearfulness; THT+)-as predictors of the serious transdiagnostic problem of suicide risk in two samples: male and female outpatients from a U.S. clinic (N=1078), and a population-based male military cohort from Finland (N=3855). INH- and THT+ were operationalized through scores on scale measures of disinhibition and fear/fearlessness, known to be related to DSM-defined clinical conditions and brain biomarkers. Suicide risk was assessed by clinician ratings (clinic sample) and questionnaires (both samples). Across samples and alternative suicide indices, INH- and THT+ each contributed uniquely to prediction of suicide risk-beyond internalizing and externalizing problems in the case of the clinic sample where diagnostic data were available. Further, in both samples, INH- and THT+ interactively predicted suicide risk, with individuals scoring concurrently high on both dispositions exhibiting markedly augmented risk. Findings demonstrate that dispositional constructs of INH- and THT+ are predictive of suicide risk, and hold potential as referents for biological research on suicidal behavior. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  7. Mergers & Acquisitions in Japan : Lessons for Dutch companies

    NARCIS (Netherlands)

    Grotenhuis, F.D.J.

    2009-01-01

    This article deals with lessons learned from mergers and acquisitions in Japan. In general, such combinations are not success stories, since 50–80 percent of them do not bring the benefits that were expected. Several reasons for such failures have been brought up in the literature, but real-life

  8. Physiological and emotional responses to subjective social evaluative threat in daily life.

    Science.gov (United States)

    Lehman, Barbara J; Cane, Arianna C; Tallon, Shannon J; Smith, Stephanie F

    2015-01-01

    This study examined concurrent and delayed emotional and cardiovascular correlates of naturally occurring experiences with subjective social evaluative threat (SSET) and tested whether individual differences in social interaction anxiety moderated those associations. Sixty-eight participants wore ambulatory blood pressure monitors for three days. Following each blood pressure reading, participants reported on SSET and negative emotions, yielding 1770 momentary measures. Multilevel modeling suggested that reports of greater SSET uniquely predicted elevations in anxiety and embarrassment, with elevations in anxiety, embarrassment, and shame extending to the hour following SSET. Reports of concurrent and previous-hour SSET also predicted cardiovascular elevations. Linkages between SSET and anxiety and shame, but not cardiovascular measures, were moderated by social interaction anxiety. Those higher in social interaction anxiety showed especially strong associations between SSET and both concurrent and delayed anxiety and greater delayed shame. This research suggests an important role for anxiety, embarrassment, and shame as emotional consequences of naturally occurring evaluative threat, especially for those who are more socially anxious. Further, this work replicates other naturalistic studies that have documented increased blood pressure at times of SSET and extends that work by documenting cardiovascular responses into the following hour.

  9. When sexual threat cues shape attitudes toward immigrants: The role of insecurity and benevolent sexism

    Directory of Open Access Journals (Sweden)

    Oriane eSarrasin

    2015-07-01

    Full Text Available Drawing on psychological and political science research on individuals’ sensitivity to threat cues, the present study examines reactions to political posters that depict male immigrants as a sexual danger. We expect anti-immigrant attitudes to be more strongly predicted by feelings of insecurity or representations of men and women as strong and fragile, when individuals are exposed to sexual threat cues than when they are not. Results from two online experiments conducted in Switzerland and Germany largely confirmed these assumptions. Comparing two anti-immigrant posters (general and non-sexual threat vs. sexual threat, Experiment 1 (n = 142 showed that feelings of insecurity were related to an increased support for expelling immigrants from the host country in both cases. However, only in the sexual threat cues condition and among female participants, were perceptions of women as fragile—as measured with benevolent sexism items—related to support for expelling immigrants. Further distinguishing between different forms of violence threat cues, Experiment 2 (n = 181 showed that collective feelings of insecurity were most strongly related to support for expelling immigrants when a male immigrant was presented as a violent criminal. In contrast, benevolent sexist beliefs were related to anti-immigrant stances only when participants were exposed to a depiction of a male immigrant as a rapist. In both cases attitudes were polarized: On the one hand, representations of immigrants as criminals provoked reactance reactions—that is, more positive attitudes—among participants scoring low in insecurity feelings or benevolent sexism. On the other hand, those scoring high in these dimensions expressed slightly more negative attitudes. Overall, by applying social psychological concepts to the study of anti-immigrant political campaigning, the present study demonstrated that individuals are sensitive to specific threat cues in posters.

  10. When sexual threat cues shape attitudes toward immigrants: the role of insecurity and benevolent sexism.

    Science.gov (United States)

    Sarrasin, Oriane; Fasel, Nicole; Green, Eva G T; Helbling, Marc

    2015-01-01

    Drawing on psychological and political science research on individuals' sensitivity to threat cues, the present study examines reactions to political posters that depict male immigrants as a sexual danger. We expect anti-immigrant attitudes to be more strongly predicted by feelings of insecurity or representations of men and women as strong and fragile when individuals are exposed to sexual threat cues than when they are not. Results from two online experiments conducted in Switzerland and Germany largely confirmed these assumptions. Comparing two anti-immigrant posters (general and non-sexual threat vs. sexual threat), Experiment 1 (n = 142) showed that feelings of insecurity were related to an increased support for expelling immigrants from the host country in both cases. However, only in the sexual threat cues condition and among female participants, were perceptions of women as fragile-as measured with benevolent sexism items-related to support for expelling immigrants. Further distinguishing between different forms of violence threat cues, Experiment 2 (n = 181) showed that collective feelings of insecurity were most strongly related to support for expelling immigrants when a male immigrant was presented as a violent criminal. In contrast, benevolent sexist beliefs were related to anti-immigrant stances only when participants were exposed to a depiction of a male immigrant as a rapist. In both cases attitudes were polarized: on the one hand, representations of immigrants as criminals provoked reactance reactions-that is, more positive attitudes-among participants scoring low in insecurity feelings or benevolent sexism. On the other hand, those scoring high in these dimensions expressed slightly more negative attitudes. Overall, by applying social psychological concepts to the study of anti-immigrant political campaigning, the present study demonstrated that individuals are sensitive to specific threat cues in posters.

  11. Scaling range sizes to threats for robust predictions of risks to biodiversity.

    Science.gov (United States)

    Keith, David A; Akçakaya, H Resit; Murray, Nicholas J

    2018-04-01

    Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  12. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  13. Impact of attention biases to threat and effortful control on individual variations in negative affect and social withdrawal in very young children.

    Science.gov (United States)

    Cole, Claire E; Zapp, Daniel J; Fettig, Nicole B; Pérez-Edgar, Koraly

    2016-01-01

    Early temperamental sensitivity may form the basis for the later development of socioemotional maladjustment. In particular, temperamental negative affect places children at risk for the development of anxiety. However, not all children who show negative affect go on to develop anxiety or extreme social withdrawal. Recent research indicates that reactive control, in the form of attention to threat, may serve as a bridge between early temperament and the development of later social difficulties. In addition, variation in effortful control may also modulate this trajectory. Children (mean age=5.57 years) were assessed for attention bias to threatening and pleasant faces using a dot-probe paradigm. Attention bias to threatening (but not happy) faces moderated the direct positive relation between negative affect and social withdrawal. Children with threat biases showed a significant link between negative affect and social withdrawal, whereas children who avoided threat did not. In contrast, effortful control did not moderate the relation between negative affect and social withdrawal. Rather, there was a direct negative relation between effortful control and social withdrawal. The findings from this short report indicate that the relations among temperament, attention bias, and social withdrawal appears early in life and point to early emerging specificity in reactive and regulatory functioning. Copyright © 2015 Elsevier Inc. All rights reserved.

  14. Developing written information for cancer survivors from culturally and linguistically diverse backgrounds: Lessons learnt

    Directory of Open Access Journals (Sweden)

    Georgina Wiley

    2018-01-01

    Full Text Available Australia is a multicultural nation with a large migrant population. Migrants with cancer report inferior quality of life and the need for more information in their own language. This paper describes lessons learnt from developing culturally appropriate written information resources with and for Arabic, Italian, and Vietnamese cancer survivors and carers. The information needs of survivors from these language groups as well as guidelines for the development of written resources for culturally diverse populations were identified through literature review. Community consultation was undertaken with focus groups. The content was developed and tested with health professionals who spoke the appropriate language and focus group participants, ensuring relevance and appropriateness. Resource design and dissemination were informed through community consultation. A number of key tasks for developing resources were identified as follows: (1 community engagement and consultation; (2 culturally sensitive data collection; (3 focus group facilitators (recruitment and training; (4 content development; (5 translation and review process; (6 design; and (7 sustainability. This project reinforced literature review findings on the importance of cultural sensitivity in the development of resources. Engaging with community groups and incorporating culturally appropriate recruitment strategies optimises recruitment to focus groups and facilitates content development. Stakeholders and lay persons from the intended ethnic-minority communities should be involved in the development and formative evaluation of resources to ensure appropriateness and relevance and in the dissemination strategy to optimize penetration. We believe the lessons we have learnt will be relevant to any group intending to develop health information for culturally and linguistic diverse groups.

  15. Analyzing Cyber-Physical Threats on Robotic Platforms †

    Science.gov (United States)

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  16. Lessons learned bulletin

    International Nuclear Information System (INIS)

    1994-05-01

    During the past four years, the Department of Energy -- Savannah River Operations Office and the Westinghouse Savannah River Company (WSRC) Environmental Restoration (ER) Program completed various activities ranging from waste site investigations to closure and post closure projects. Critiques for lessons learned regarding project activities are performed at the completion of each project milestone, and this critique interval allows for frequent recognition of lessons learned. In addition to project related lessons learned, ER also performs lessons learned critiques. T'he Savannah River Site (SRS) also obtains lessons learned information from general industry, commercial nuclear industry, naval nuclear programs, and other DOE sites within the complex. Procedures are approved to administer the lessons learned program, and a database is available to catalog applicable lessons learned regarding environmental remediation, restoration, and administrative activities. ER will continue to use this database as a source of information available to SRS personnel

  17. Rumination mediates the relationship between structural variations in ventrolateral prefrontal cortex and sensitivity to negative life events.

    Science.gov (United States)

    Qiao, L; Wei, D T; Li, W F; Chen, Q L; Che, X W; Li, B B; Li, Y D; Qiu, J; Zhang, Q L; Liu, Y J

    2013-01-01

    Individuals have different levels of stress sensitivity. An individual's predisposition to experience negative life events (NLEs) may make him/her more vulnerable to a series of psychopathological and physical diseases. However, the neuroanatomical correlates of individual differences in sensitivity to NLEs remain unknown. In this study, voxel-based morphometry was used to identify the gray matter (GM) associations of individual differences in sensitivity to NLEs measured by adolescent self-rating life events checklist. Results showed that there was a positive association between individual NLEs sensitivity and regional GM volume (rGMV) in the ventrolateral prefrontal cortex (VLPFC). GM was mostly evident in the left frontal operculum and a small part of the left middle frontal gyrus. This region was thought to play an important role in introception. Importantly, our study revealed that rumination served as a mediator between the rGMV of the VLPFC and individual NLEs sensitivity. These findings suggest that people with greater VLPFC might be more inclined to ruminate and the ruminative response style might make them more sensitive to NLEs. Copyright © 2013 IBRO. Published by Elsevier Ltd. All rights reserved.

  18. Lessons Learned from the Node 1 Temperature and Humidity Control Subsystem Design

    Science.gov (United States)

    Williams, David E.

    2010-01-01

    Node 1 flew to the International Space Station (ISS) on Flight 2A during December 1998. To date the National Aeronautics and Space Administration (NASA) has learned a lot of lessons from this module based on its history of approximately two years of acceptance testing on the ground and currently its twelve years on-orbit. This paper will provide an overview of the ISS Environmental Control and Life Support (ECLS) design of the Node 1 Temperature and Humidity Control (THC) subsystem and it will document some of the lessons that have been learned to date for this subsystem and it will document some of the lessons that have been learned to date for these subsystems based on problems prelaunch, problems encountered on-orbit, and operational problems/concerns. It is hoped that documenting these lessons learned from ISS will help in preventing them in future Programs. 1

  19. Women's land rights and the challenge of patriachy: lessons from ...

    African Journals Online (AJOL)

    Women's land rights and the challenge of patriachy: lessons from ozalla community, edo state, Nigeria. ... production output and ensuring higher incomes. KEYWORDS: Cultural practices, customary, economic life, food crisis, food production, gender equity, land rights, patriarchy, rural agriculture, rural areas, social justice ...

  20. Freedom Lessons: Black Mothers Asserting "Smartness" of Their Children

    Science.gov (United States)

    Sankofa Waters, Billye

    2016-01-01

    It is imperative to explore multiple approaches to intelligence and public education that fundamentally integrate the ideas and lived experiences of students--with particular interest to those who are most disenfranchised. Within various black communities, the oral traditions transmitted at home are life-affirming "freedom lessons,"…

  1. Explosive and chemical threat detection by surface-enhanced Raman scattering: A review

    DEFF Research Database (Denmark)

    Hakonen, Aron; Andersson, Per Ola; Schmidt, Michael Stenbæk

    2015-01-01

    Acts of terror and warfare threats are challenging tasks for defense agencies around the world and of growing importance to security conscious policy makers and the general public. Explosives and chemical warfare agents are two of the major concerns in this context, as illustrated by the recent...... progressively better, smaller and cheaper, and can today be acquired for a retail price close to 10,000 US$. This contribution aims to give a comprehensive overview of SERS as a technique for detection of explosives and chemical threats. We discuss the prospects of SERS becoming a major tool for convenient in......-situ threat identification and we summarize existing SERS detection methods and substrates with particular focus on ultra-sensitive real-time detection. General concepts, detection capabilities and perspectives are discussed in order to guide potential users of the technique for homeland security and anti-warfare...

  2. CLIL in physics lessons at grammar school

    Science.gov (United States)

    Štefančínová, Iveta; Valovičová, Ľubomíra

    2017-01-01

    Content and Language Integrated Learning (CLIL) is one of the most outstanding approaches in foreign language teaching. This teaching method has promising prospects for the future of modern education as teaching subject and foreign languages are combined to offer a better preparation for life in Europe, especially when the mobility is becoming a highly significant factor of everyday life. We realized a project called Foreign languages in popularizing science at grammar school. Within the project five teachers with approbation subjects of English, French, German and Physics attended the methodological courses abroad. The teachers applied the gained experience in teaching and linking science teaching with the teaching of foreign languages. Outputs of the project (e.g. English-German-French-Slovak glossary of natural science terminology, student activity sheets, videos with natural science orientation in a foreign language, physical experiments in foreign languages, multimedia fairy tales with natural contents, posters of some scientists) are prepared for the CLIL-oriented lessons. We collected data of the questionnaire for students concerning attitude towards CLIL. The questionnaire for teachers showed data about the attitude, experience, and needs of teachers employing CLIL in their lessons.

  3. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  4. Subconscious detection of threat as reflected by an enhanced response bias.

    Science.gov (United States)

    Windmann, S; Krüger, T

    1998-12-01

    Neurobiological and cognitive models of unconscious information processing suggest that subconscious threat detection can lead to cognitive misinterpretations and false alarms, while conscious processing is assumed to be perceptually and conceptually accurate and unambiguous. Furthermore, clinical theories suggest that pathological anxiety results from a crude preattentive warning system predominating over more sophisticated and controlled modes of processing. We investigated the hypothesis that subconscious detection of threat in a cognitive task is reflected by enhanced "false signal" detection rather than by selectively enhanced discrimination of threat items in 30 patients with panic disorder and 30 healthy controls. We presented a tachistoscopic word-nonword discrimination task and a subsequent recognition task and analyzed the data by means of process-dissociation procedures. In line with our expectations, subjects of both groups showed more false signal detection to threat than to neutral stimuli as indicated by an enhanced response bias, whereas indices of discriminative sensitivity did not show this effect. In addition, patients with panic disorder showed a generally enhanced response bias in comparison to healthy controls. They also seemed to have processed the stimuli less elaborately and less differentially. Results are consistent with the assumption that subconscious threat detection can lead to misrepresentations of stimulus significance and that pathological anxiety is characterized by a hyperactive preattentive alarm system that is insufficiently controlled by higher cognitive processes. Copyright 1998 Academic Press.

  5. Life Threat and Sleep Disturbances in Adolescents: A Two-Year Follow-Up of Survivors From the 2011 Utøya, Norway, Terror Attack.

    Science.gov (United States)

    Grønli, Janne; Melinder, Annika; Ousdal, Olga Therese; Pallesen, Ståle; Endestad, Tor; Milde, Anne Marita

    2017-06-01

    A significant number of adolescents have been exposed to traumatic life events. However, knowledge about the specific sleep disturbance that occurs in individuals after trauma exposure is predominantly based on studies of adults. This study reports specific sleep disturbance in 42 survivors of the 2011 mass shooting at a youth summer camp on the Norwegian island Utøya, mean age = 20.91 years, SD = 2.32, 62.5% females. When compared with matched controls, significantly more survivors reported having sleep disturbances, 52.4% versus 13.6%, d = 0.93, of which onset began at the time of the shooting, χ 2 = 14.9, p 1.7, ps = .044 to .028. These results corroborate the effects of a life threat on the range and extent of sleep disturbances, and emphasize the need to better assess and treat sleep disorders in adolescents exposed to trauma. Copyright © 2017 International Society for Traumatic Stress Studies.

  6. “I Felt Like My Life Had Been Given to Me to Start Over”: Alice Kaplan’s Language Memoir, French Lessons

    Directory of Open Access Journals (Sweden)

    Eleonora Rao

    2016-06-01

    Full Text Available Alice Kaplan’s memoir French Lessons (1993 is a story that deals as much with the issue of language learning as with that of cultural belonging(s. This “language memoir,” as it is typical of this sub-genre, is an intimate tale of the transition between languages and cultures. French Lessons recounts her evolving relationship with French language and culture in various phases of her life: starting from childhood, continuing through her graduate student years at Yale and finally as professor of French at Duke. Soon, however, in this unconventional Bildung, the second language turns out to be a verbal safe-house, an instant refuge when her first language and culture happen to be too uncomfortable. Ultimately, French provides a psychic space and a hiding place. Ultimately, however, as Derrida has shown, we are alienated from both the first and the second; we find ourselves to be more comfortable in one than in the other. This essay will analyze such processes with special attention to the part played by the body in Kaplan’s building as a student and eventually as a teacher. The analysis will be linked with the text’s peculiar narrative style: fast-paced, with simple, concise sentences, nevertheless extremely effective and moving.

  7. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  8. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  9. Anguishes caused by the nuclear threat. Results of international psychological research

    International Nuclear Information System (INIS)

    Schmidt, F.; Boehnke, K.

    1990-01-01

    The conference of December 10th and 11th, 1987 dealt with life under the nuclear threat and the perspectives of pedagogic-psychological research. The individual contributions are in condensed form; they are discussed from the angle of how the psyche of individuals copes with military and non-military nuclear hazards. (DG) [de

  10. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  11. Environmental impacts of lighting technologies - Life cycle assessment and sensitivity analysis

    International Nuclear Information System (INIS)

    Welz, Tobias; Hischier, Roland; Hilty, Lorenz M.

    2011-01-01

    With two regulations, 244/2009 and 245/2009, the European Commission recently put into practice the EuP Directive in the area of lighting devices, aiming to improve energy efficiency in the domestic lighting sector. This article presents a comprehensive life cycle assessment comparison of four different lighting technologies: the tungsten lamp, the halogen lamp, the conventional fluorescent lamp and the compact fluorescent lamp. Taking advantage of the most up-to-date life cycle inventory database available (ecoinvent data version 2.01), all life cycle phases were assessed and the sensitivity of the results for varying assumptions analysed: different qualities of compact fluorescent lamps (production phase), different electricity mixes (use phase), and end-of-life scenarios for WEEE recycling versus municipal solid waste incineration (disposal phase). A functional unit of 'one hour of lighting' was defined and the environmental burdens for the whole life cycle for all four lamp types were calculated, showing a clearly lower impact for the two gas-discharge lamps, i.e. the fluorescent and the compact fluorescent lamp. Differences in the product quality of the compact fluorescent lamps reveal to have only a very small effect on the overall environmental performance of this lamp type; a decline of the actual life time of this lamp type doesn't result in a change of the rank order of the results of the here examined four lamp types. It was also shown that the environmental break-even point of the gas-discharge lamps is reached long before the end of their expected life-span. All in all, it can be concluded that a change from today's tungsten lamp technology to a low-energy-consuming technology such as the compact fluorescent lamp results in a substantial environmental benefit.

  12. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    Science.gov (United States)

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  13. Sensitivity analysis of the use of Life Cycle Impact Assessment methods: a case study on building materials

    DEFF Research Database (Denmark)

    Bueno, Cristiane; Hauschild, Michael Zwicky; Rossignolo, Joao Adriano

    2016-01-01

    The main aim of this research is to perform a sensitivity analysis of a Life Cycle Assessment (LCA) case study to understand if the use of different Life Cycle Impact Assessment (LCIA) methods may lead to different conclusions by decision makers and stakeholders. A complete LCA was applied to non...

  14. Uncertainty and sensitivity analyses of ballast life-cycle cost and payback period

    OpenAIRE

    Mcmahon, James E.

    2000-01-01

    The paper introduces an innovative methology for evaluating the relative significance of energy-efficient technologies applied to fluorescent lamp ballasts. The method involves replacing the point estimates of life cycle cost of the ballasts with uncertainty distributions reflecting the whole spectrum of possible costs, and the assessed probability associated with each value. The results of uncertainty and sensitivity analyses will help analysts reduce effort in data collection and carry on a...

  15. Space Stirling Cryocooler Contamination Lessons Learned and Recommended Control Procedures

    Science.gov (United States)

    Glaister, D. S.; Price, K.; Gully, W.; Castles, S.; Reilly, J.

    The most important characteristic of a space cryocooler is its reliability over a lifetime typically in excess of 7 years. While design improvements have reduced the probability of mechanical failure, the risk of internal contamination is still significant and has not been addressed in a consistent approach across the industry. A significant fraction of the endurance test and flight units have experienced some performance degradation related to internal contamination. The purpose of this paper is to describe and assess the contamination issues inside long life, space cryocoolers and to recommend procedures to minimize the probability of encountering contamination related failures and degradation. The paper covers the sources of contamination, the degradation and failure mechanisms, the theoretical and observed cryocooler sensitivity, and the recommended prevention procedures and their impact. We begin with a discussion of the contamination sources, both artificial and intrinsic. Next, the degradation and failure mechanisms are discussed in an attempt to arrive at a contaminant susceptibility, from which we can derive a contamination budget for the machine. This theoretical sensitivity is then compared with the observed sensitivity to illustrate the conservative nature of the assumed scenarios. A number of lessons learned on Raytheon, Ball, Air Force Research Laboratory, and NASA GSFC programs are shared to convey the practical aspects of the contamination problem. Then, the materials and processes required to meet the proposed budget are outlined. An attempt is made to present a survey of processes across industry.

  16. Lessons Learned in International Safeguards - Implementation of Safeguards at the Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Ehinger, Michael H.; Johnson, Shirley

    2010-01-01

    The focus of this report is lessons learned at the Rokkasho Reprocessing Plant (RRP). However, the subject of lessons learned for application of international safeguards at reprocessing plants includes a cumulative history of inspections starting at the West Valley (New York, U.S.A.) reprocessing plant in 1969 and proceeding through all of the efforts over the years. The RRP is the latest and most challenging application the International Atomic Energy Agency has faced. In many ways the challenges have remained the same, timely inspection and evaluation with limited inspector resources, with the continuing realization that planning and preparations can never start early enough in the life cycle of a facility. Lessons learned over the years have involved the challenges of using ongoing advances in technology and dealing with facilities with increased throughput and continuous operation. This report will begin with a review of historical developments and lessons learned. This will provide a basis for a discussion of the experiences and lessons learned from the implementation of international safeguards at RRP.

  17. Attention biases to threat and behavioral inhibition in early childhood shape adolescent social withdrawal.

    Science.gov (United States)

    Pérez-Edgar, Koraly; Bar-Haim, Yair; McDermott, Jennifer Martin; Chronis-Tuscano, Andrea; Pine, Daniel S; Fox, Nathan A

    2010-06-01

    Behavioral inhibition (BI) is a temperament characterized in young children by a heightened sensitivity to novelty, social withdrawal, and anxious behaviors. For many children, these social difficulties dissipate over time. For others, patterns of social withdrawal continue into adolescence. Over time, attention biases to threat may influence the stability of BI and its association with social withdrawal, ultimately modulating the risk for anxiety disorders in BI children. However, we know relatively little about the cognitive processes that accompany BI and shape later socio-emotional functioning. We examined the relations among BI in childhood, attention biases to threat in adolescence, and adolescent social withdrawal in a longitudinal study (N = 126, Mean age = 15 years). As has been reported in anxious adults, adolescents who were behaviorally inhibited as toddlers and young children showed heightened attention bias to threat. In addition, attention bias to threat moderated the relation between childhood BI and adolescent social withdrawal.

  18. Meeting report: Measuring endocrine-sensitive endpoints within the first years of life

    DEFF Research Database (Denmark)

    Arbuckle, T.E.; Hauser, R.; Swan, S.H.

    2008-01-01

    An international workshop tided "Assessing Endocrine-Related Endpoints within the First Years of Life" was held 30 April-1 May 2007, in Ottawa, Ontario, Canada. Representatives from a number of pregnancy cohort studies in North America and Europe presented options for measuring various endocrine......-sensitive endpoints in early life and discussed issues related to performing and using those measures. The workshop focused on measuring reproductive tract developmental endpoints [e.g., anogenital distance (AGD)], endocrine status, and infant anthropometry. To the extent possible, workshop participants strove...... on the genital exam. Although a number of outcome measures recommended during the genital exam have been associated with exposure to endocrine-disrupting chemicals, little is known about how predictive these effects are of later reproductive health or other chronic health conditions....

  19. 20(s)-Protopanaxadiol (PPD) increases the radiotherapy sensitivity of laryngeal carcinoma.

    Science.gov (United States)

    Teng, Bo; Zhao, Lijing; Gao, Jing; He, Peng; Li, Hejie; Chen, Junyu; Feng, Qingjie; Yi, Chunhui

    2017-12-13

    Laryngeal carcinoma (LC) is one of the most prevalent malignant tumors in the head and neck area. Due to its high morbidity and mortality, LC poses a serious threat to human life and health. Even with surgical removal, some patients were not sensitive to radiotherapy or experienced transfer or recurrence. 20(s)-Protopanaxadiol (PPD), a natural product from Panax ginseng, has been reported to have cytotoxic effects against several cancer cell lines. However, whether it can improve the radiation sensitivity and the underlying mechanism of PPD's sensitization effect is still unknown. Herein, from in vitro and in vivo experiments, we found that the combination of PPD and radiation not only significantly inhibited proliferation and induced apoptosis, but also suppressed the tumor growth in mouse models. These findings confirmed the role of PPD in enhancing the sensitivity of radiotherapy. Moreover, our work showed that the expression levels of mTOR and its downstream effectors decreased remarkably after PPD addition when compared to radiation only. This result suggested that PPD's excellent synergistic effects with radiation might be associated with the down-regulation of the mTOR signaling pathway in Hep-2 cells.

  20. Pieter Claesz, "Still-Life." and Georgia O'Keefe, "Two Jimson Weeds with Green Leaves and Sky."

    Science.gov (United States)

    Jenke, Veronika; McCoy, E. Sue

    1986-01-01

    Presents two art lessons, the first of which introduces elementary students to Dutch still life painting and to the Dutch painter Claesz. The second lesson introduces intermediate grade students to still life as a subject for painting and to the possibility of personal interpretation by an artist, as shown in an O'Keefe painting. (RM)

  1. Analysis of current research addressing complementary use of life-cycle assessment and risk assessment for engineered nanomaterials: have lessons been learned from previous experience with chemicals?

    DEFF Research Database (Denmark)

    Grieger, Khara Deanne; Laurent, Alexis; Miseljic, Mirko

    2012-01-01

    of research focused on applying LCA and RA together for NM, it appears that current research efforts have taken into account some key ‘‘lessons learned’’ from previous experience with chemicals while many key challenges remain for practically applying these methods to NM. We identified two main approaches...... for using these methods together for NM: ‘‘LC-based RA’’ (traditional RA applied in a life-cycle perspective) and ‘‘RA-complemented LCA’’ (conventional LCA supplemented by RA in specific life-cycle steps). Hence, the latter is the only identified approach which genuinely combines LC- and RA-based methods......While it is generally agreed that successful strategies to address the health and environmental impacts of engineered nanomaterials (NM) should consider the well-established frameworks for conducting life-cycle assessment (LCA) and risk assessment (RA), scientific research, and specific guidance...

  2. The neurobiology of safety and threat learning in infancy.

    Science.gov (United States)

    Debiec, Jacek; Sullivan, Regina M

    2017-09-01

    What an animal needs to learn to survive is altered dramatically as they change from dependence on the parent for protection to independence and reliance on self-defense. This transition occurs in most altricial animals, but our understanding of the behavioral neurobiology has mostly relied on the infant rat. The transformation from dependence to independence occurs over three weeks in pups and is accompanied by complex changes in responses to both natural and learned threats and the supporting neural circuitry. Overall, in early life, the threat system is quiescent and learning is biased towards acquiring attachment related behaviors to support attachment to the caregiver and proximity seeking. Caregiver-associated cues learned in infancy have the ability to provide a sense of safety throughout lifetime. This attachment/safety system is activated by learning involving presumably pleasurable stimuli (food, warmth) but also painful stimuli (tailpinch, moderate shock). At about the midway point to independence, pups begin to have access to the adult-like amygdala-dependent threat system and amygdala-dependent responses to natural dangers such as predator odors. However, pups have the ability to switch between the infant and adult-like system, which is controlled by maternal presence and modification of stress hormones. Specifically, if the pup is alone, it will learn fear but if with the mother it will learn attachment (10-15days of age). As pups begin to approach weaning, pups lose access to the attachment system and rely only on the amygdala-dependent threat system. However, pups learning system is complex and exhibits flexibility that enables the mother to override the control of the attachment circuit, since newborn pups may acquire threat responses from the mother expressing fear in their presence. Together, these data suggest that the development of pups' threat learning system is not only dependent upon maturation of the amygdala, but it is also exquisitely

  3. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  4. Examining the relationships between challenge and threat cognitive appraisals and coaching behaviours in football coaches.

    Science.gov (United States)

    Dixon, Martin; Turner, Martin J; Gillman, Jamie

    2017-12-01

    Previous research demonstrates that sports coaching is a stressful activity. This article investigates coaches' challenge and threat cognitive appraisals of stressful situations and their impact on coaching behaviour, using Blascovich and Mendes' (2000) biopsychosocial model as a theoretical framework. A cross-sectional correlational design was utilised to examine the relationships between irrational beliefs (Shortened general attitude and belief scale), challenge and threat appraisals (Appraisal of life events scale), and coaching behaviours (Leadership scale for sports) of 105 professional football academy coaches. Findings reveal significant positive associations between challenge appraisals and social support, and between threat appraisals and autocratic behaviour, and a significant negative association between threat appraisals and positive feedback. Results also show that higher irrational beliefs are associated with greater threat, and lesser challenge cognitive appraisals. However, no associations were revealed between irrational beliefs and challenge cognitive appraisals. Additionally, findings demonstrate a positive relationship between age and training and instruction. Results suggest that practitioners should help coaches to appraise stressful situations as a challenge to promote positive coaching behaviours.

  5. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  6. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  7. The Use of Lesson Study Combined with Content Representation in the Planning of Physics Lessons During Field Practice to Develop Pedagogical Content Knowledge

    Science.gov (United States)

    Juhler, Martin Vogt

    2016-08-01

    Recent research, both internationally and in Norway, has clearly expressed concerns about missing connections between subject-matter knowledge, pedagogical competence and real-life practice in schools. This study addresses this problem within the domain of field practice in teacher education, studying pre-service teachers' planning of a Physics lesson. Two means of intervention were introduced. The first was lesson study, which is a method for planning, carrying out and reflecting on a research lesson in detail with a learner and content-centered focus. This was used in combination with a second means, content representations, which is a systematic tool that connects overall teaching aims with pedagogical prompts. Changes in teaching were assessed through the construct of pedagogical content knowledge (PCK). A deductive coding analysis was carried out for this purpose. Transcripts of pre-service teachers' planning of a Physics lesson were coded into four main PCK categories, which were thereafter divided into 16 PCK sub-categories. The results showed that the intervention affected the pre-service teachers' potential to start developing PCK. First, they focused much more on categories concerning the learners. Second, they focused far more uniformly in all of the four main categories comprising PCK. Consequently, these differences could affect their potential to start developing PCK.

  8. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  9. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  10. The history of a lesson

    DEFF Research Database (Denmark)

    Rasmussen, Mikkel Vedby

    2003-01-01

    and emphasises the need to study the history of lessons rather than the lessons of history. This approach shows that Munich is the end point of a constitutive history that begins in the failure of the Versailles treaty to create a durable European order following the First World War. The Munich lesson is thus......The article investigates the concept of lessons in IR. By means of a constructivist critique of the 'lessons literature', the article analyses one of the most important of IR lessons: that of Munich. Examining how the Munich lesson came about, the article shows the praxeological nature of lessons...... one element of the lesson of Versailles, which is a praxeology that defines how the West is to make peace, and against whom peace must be defended. The lesson of Versailles has been, at least in part, constitutive of the outbreak of the Cold War, and it continues to define the Western conception...

  11. Denmark's Master of Public Governance Program: Assessment and Lessons Learned

    Science.gov (United States)

    Greve, Carsten; Pedersen, Anne Reff

    2017-01-01

    This paper focuses on Denmark's Master of Public Governance and its assessments and lessons learned. Denmark is seen to have an efficient economy and public sector, a digitalized public service delivery system, and an advanced work-life balance. The Danish government invested substantial resources into developing a Master of Public Governance…

  12. Use of Vertically Integrated Ice in WRF-Based Forecasts of Lightning Threat

    Science.gov (United States)

    McCaul, E. W., jr.; Goodman, S. J.

    2008-01-01

    Previously reported methods of forecasting lightning threat using fields of graupel flux from WRF simulations are extended to include the simulated field of vertically integrated ice within storms. Although the ice integral shows less temporal variability than graupel flux, it provides more areal coverage, and can thus be used to create a lightning forecast that better matches the areal coverage of the lightning threat found in observations of flash extent density. A blended lightning forecast threat can be constructed that retains much of the desirable temporal sensitivity of the graupel flux method, while also incorporating the coverage benefits of the ice integral method. The graupel flux and ice integral fields contributing to the blended forecast are calibrated against observed lightning flash origin density data, based on Lightning Mapping Array observations from a series of case studies chosen to cover a wide range of flash rate conditions. Linear curve fits that pass through the origin are found to be statistically robust for the calibration procedures.

  13. Acidophilus Milk Shelf-life Prolongation by the Use of Cold Sensitive Mutants of Lactobacillus acidophilus MDC 9626

    Directory of Open Access Journals (Sweden)

    Alireza Goodarzi

    2017-09-01

    Full Text Available  Background and Objective: The shelf-life of Acidophilus milk fermented by probiotic culture Lactobacillus acidophilus is limited due to acidification caused by continued organic acid formation at low temperatures. Increasing of titrable acidity in turn causes reducing of the total viable count of probiotic bacteria. To overcome acidification we suggested to use coldsensitive mutants of Lactobacillus acidophilus, with limited metabolism at low temperatures. In order to facilitate the selection of cold sensitive mutants, it was decided to use Rifampicin and Streotomycin mutations affecting thermostability of the key molecules of cell metabolism the RNA polymerase and ribosome, respectively.Material and Methods: Ultra violet mutagenesis was used to enhance the yield and diversity of rifampicin and streptomycin resistant mutants of Lactobacillus acidophilus. To perform negative selection of cold sensitive mutants, antibiotic resistant colonies replica plated and incubated at 23ºC. The growth rate, milk fermenting rate, titratable acidity were measured.Results and Conclusion: Among tested resistant to either rifampicin or streptomycin clones with frequency mean of 1.0 %, ten mutants were isolated which have lost the ability to grow at minimal temperature. Fermented with cold-sensitive mutants of Lactobacillus acidophilus milks, during storage in the refrigerator, almost twice as long retained high amount of probiotic bacteria and low titratable acidity as compared to the parent strain. Thus, direct relationship between temperature sensitivity of the starter and shelf life of acidophilic milk was confirmed. Rifampicin and Streptomycin resistant mutations are powerful tools for selection of cold-sensitive dairy starters for preparing dairy fermented products with long shelf-life.Conflict of interest: The authors declare no conflict of interest.

  14. Lesson Learning at JPL

    Science.gov (United States)

    Oberhettinger, David

    2011-01-01

    A lessons learned system is a hallmark of a mature engineering organization A formal lessons learned process can help assure that valuable lessons get written and published, that they are well-written, and that the essential information is "infused" into institutional practice. Requires high-level institutional commitment, and everyone's participation in gathering, disseminating, and using the lessons

  15. The empty carriage: lessons in leadership from Florence Nightingale.

    Science.gov (United States)

    Hegge, Marge

    2011-01-01

    Florence Nightingale made a profound statement about leadership when she returned from the Crimean War without the fanfare offered to her. Promoters paraded her empty carriage around the city of Southampton England to applaud her accomplishments in the war. Her absence signaled a new leadership, one of quiet determination, humility, and political strategy to improve quality of life. The lessons to be learned for today's nurse leaders revolve around mindfulness, clarity of purpose, reverence for human life, collaborative partnerships, co-evolution, engagement, keeping up with a world in motion, and making meaning.

  16. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  17. Affective state influences perception by affecting decision parameters underlying bias and sensitivity.

    Science.gov (United States)

    Lynn, Spencer K; Zhang, Xuan; Barrett, Lisa Feldman

    2012-08-01

    Studies of the effect of affect on perception often show consistent directional effects of a person's affective state on perception. Unpleasant emotions have been associated with a "locally focused" style of stimulus evaluation, and positive emotions with a "globally focused" style. Typically, however, studies of affect and perception have not been conducted under the conditions of perceptual uncertainty and behavioral risk inherent to perceptual judgments outside the laboratory. We investigated the influence of perceivers' experienced affect (valence and arousal) on the utility of social threat perception by combining signal detection theory and behavioral economics. We compared 3 perceptual decision environments that systematically differed with respect to factors that underlie uncertainty and risk: the base rate of threat, the costs of incorrect identification threat, and the perceptual similarity of threats and nonthreats. We found that no single affective state yielded the best performance on the threat perception task across the 3 environments. Unpleasant valence promoted calibration of response bias to base rate and costs, high arousal promoted calibration of perceptual sensitivity to perceptual similarity, and low arousal was associated with an optimal adjustment of bias to sensitivity. However, the strength of these associations was conditional upon the difficulty of attaining optimal bias and high sensitivity, such that the effect of the perceiver's affective state on perception differed with the cause and/or level of uncertainty and risk.

  18. Analysis of inland crude oil spill threats, vulnerabilities, and emergency response in the midwest United States.

    Science.gov (United States)

    Brody, Thomas M; Di Bianca, Paisly; Krysa, Jan

    2012-10-01

    Although coastal oil spills tend to be highly publicized, crude oil spills in the United States affect inland areas relatively often. Spills to inland areas often affect sensitive environments and can have greater impacts to health and welfare than spills to coastal areas. For these reasons, the authors investigated inland crude oil spill threats, vulnerabilities, and emergency response in the midwestern U.S. states of Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin. These states work with the Region 5 Offices of the U.S. Environmental Protection Agency. Region 5's geospatial data in the Inland Sensitivity Atlas were turned into metrics indicating inland crude oil spill threats and vulnerabilities among the Region's sub-watersheds. These threats and vulnerabilities were weighted using data from the National Response Center and the Department of Energy's Environmental Restoration Priority System. The locations of the Region's emergency responders were geocoded in GIS. The GIS calculated the emergency response times to the Region's sub-watersheds. The resulting scatter plots are connected to the sub-watersheds in the map so stakeholders can (1) see the outlying sub-watersheds of concern and (2) better understand how reducing threats and better response time can reduce the risk of inland crude oil spills. Published 2012. This article is a U.S. Government work and is in the public domain in the U.S.A.

  19. Putting all your eggs in one basket: life-history strategies, bet hedging, and diversification.

    Science.gov (United States)

    White, Andrew Edward; Li, Yexin Jessica; Griskevicius, Vladas; Neuberg, Steven L; Kenrick, Douglas T

    2013-05-01

    Diversification of resources is a strategy found everywhere from the level of microorganisms to that of giant Wall Street investment firms. We examine the functional nature of diversification using life-history theory-a framework for understanding how organisms navigate resource-allocation trade-offs. This framework suggests that diversification may be adaptive or maladaptive depending on one's life-history strategy and that these differences should be observed under conditions of threat. In three studies, we found that cues of mortality threat interact with one index of life-history strategy, childhood socioeconomic status (SES), to affect diversification. Among those from low-SES backgrounds, mortality threat increased preferences for diversification. However, among those from high-SES backgrounds, mortality threat had the opposite effect, inclining people to put all their eggs in one basket. The same interaction pattern emerged with a potential biomarker of life-history strategy, oxidative stress. These findings highlight when, and for whom, different diversification strategies can be advantageous.

  20. Emotional non-acceptance links early life stress and blunted cortisol reactivity to social threat.

    Science.gov (United States)

    Cărnuţă, Mihai; Crişan, Liviu G; Vulturar, Romana; Opre, Adrian; Miu, Andrei C

    2015-01-01

    Early life stress (ELS) has been recently associated with blunted cortisol reactivity and emotion dysregulation, but no study until now examined whether these characteristics are related. The main goal of this study was to examine the potential mediator role of emotion dysregulation in the relation between ELS and cortisol reactivity to social threat. Only women who were free of psychiatric and endocrine disorders, had regular menstrual cycle and did not use oral contraceptives were selected for this study (N=62). After filling in ELS and multidimensional emotion dysregulation measures, participants underwent the Trier Social Stress Test during which cortisol and autonomic responses were assessed. Most participants (85.5%) reported one or more major stressful events (i.e., physical abuse, sexual abuse, major parental conflicts, death of a family or close friend, severe illness) experienced before age 17. ELS was negatively associated with cortisol reactivity and positively associated with skin conductance level (SCL) reactivity, but it did not influence heart rate and respiratory sinus arrhythmia. In addition, ELS was positively related to emotional non-acceptance (i.e., a tendency to develop secondary emotional responses to one's negative emotions), and the latter was negatively related to cortisol responses and positively related to SCL responses. Bootstrapping analyses indicated that emotional non-acceptance was a significant mediator in the relationships between ELS and both cortisol and SCL responses. Emotional non-acceptance is thus one of the psychological mechanisms underlying blunted cortisol and increased sympathetic reactivity in young healthy volunteers with a history of ELS. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Worldwide Overview of Lessons Learned from Decommissioning Projects

    International Nuclear Information System (INIS)

    Laraia, Michele

    2008-01-01

    With an increasing number of radioactive facilities and reactors now reaching the end of their useful life and being taken out of service, there is a growing emphasis worldwide on the safe and efficient decommissioning of such plants. There is a wealth of experience already gained in decommissioning projects for all kinds of nuclear facilities. It is now possible to compare and discuss progress and accomplishments worldwide. In particular, rather than on the factual descriptions of projects, technologies and case histories, it is important to focus on lessons learned: in this way, the return of experience is felt to effectively contribute to progress. Key issues - inevitably based on a subjective ranking - are presented in this paper. Through the exchange of lessons learned, it is possible to achieve full awareness of the need for resources for and constraints of safe and cost-effective decommissioning. What remains now is the identification of specific, remaining issues that may hinder or delay the smooth progress of decommissioning. To this end, lessons learned provide the necessary background information; this paper tries to make extensive use of practical experience gained by the international community

  2. Lesson Exemplars in Electricity and Students’ Epistemological Beliefs

    Directory of Open Access Journals (Sweden)

    Vergel P. Mirana

    2017-10-01

    Full Text Available The study evaluated the effects of a developed lesson exemplars in electricity integrating computer simulations and constructivist approach on students' Epistemological Beliefs. Specifically, it sought to determine how computer simulations, constructivist approach and Formativ e Assessment Classroom Technique (FACT can be integrated in the lesson exemplars in electricity; and evaluate the effects of the developed lesson exemplars in the students’ Epistemological Beliefs. The investigation employed the pre - experimental single - gr oup pretest and posttest study using the Epistemological Beliefs Assessment in Physical Sciences (EBAPS questionnaire. The study was conducted among seventy - two (72 Grade 10 students of a laboratory high school from a state university in the Philippines. They were taught using Physics Educational Technology (PhET and other web - based simulations, constructivist approach, and formative assessment classroom technique. The results revealed that the over - all Epistemological Beliefs of the students did not cha nge significantly; only along Nature of Knowing and Learning and Real - Life Applicability. Generally, utilizing computer simulations and applying constructivist approach did not alter students' epistemological beliefs in its entirety. However, it can be en gaging and effective in promoting students’ understanding of Physics.

  3. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  4. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  5. Time-sensitive remote sensing

    CERN Document Server

    Lippitt, Christopher; Coulter, Lloyd

    2015-01-01

    This book documents the state of the art in the use of remote sensing to address time-sensitive information requirements. Specifically, it brings together a group of authors who are both researchers and practitioners, who work toward or are currently using remote sensing to address time-sensitive information requirements with the goal of advancing the effective use of remote sensing to supply time-sensitive information. The book addresses the theoretical implications of time-sensitivity on the remote sensing process, assessments or descriptions of methods for expediting the delivery and improving the quality of information derived from remote sensing, and describes and analyzes time-sensitive remote sensing applications, with an emphasis on lessons learned. This book is intended for remote sensing scientists, practitioners (e.g., emergency responders or administrators of emergency response agencies), and students, but will also be of use to those seeking to understand the potential of remote sensing to addres...

  6. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  7. OBSERVATIONS (NEW AND OLD ON THE ARMED FORCES IN THE THE ATLANTIC WORLD: CURRENT AND FUTURE THREATS AND CHALLENGES IN HISTORICAL PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    FREDERICK M. NUNN

    2017-12-01

    Full Text Available Confrontations with threats and challenges to the existence of governments and societies have marked the flow of time throughout history. Present and future threats associated, as they are, with historical and traditional challenge are, in many places, of such complexity that they already require new forms of relations between civilian authorities and the leadership of professional institutions dedicated to defense and security. These new relations will have to be based on an understanding of the processes of democratization and globalization as much as on the complex nature of conflicts that affect the security, sovereignty and stability of 21st century nation-states. As formidable as they appear, these threats and challenges may be considered current reiterations of others that mark our histories. In the Atlantic World, nowhere more so than in Latin America, the literature of the military profession has always demonstrated the recognition of lessons of the past applied to problems of the presentation aid in preparation for the future. A principal reason for this is that said literature is in and of itself the product of civil-military collaborations.

  8. Promoting health in virtual worlds: lessons from second life.

    Science.gov (United States)

    Suomi, Reima; Mäntymäki, Matti; Söderlund, Sari

    2014-10-13

    Social media services can help empower people to take greater responsibility for their health. For example, virtual worlds are media-rich environments that have many technically advantageous characteristics that can be used for Health 2.0 purposes. Second Life has been used to build environments where people can obtain information and interact with other users for peer support and advice from health care professionals. The intent of the study was to find out whether Second Life is a working and functional platform supporting the empowerment of people in health-related issues. We conducted a review of the current health-related activity in Second Life, coupled with an extensive series of observations and interactions with the respective resources inside Second Life. A total of 24 operative health resources were found in Second Life, indicating that health-related activity is rather limited in Second Life, though at first glance it appears to contain very rich health-related content. The other main shortcomings of Second Life relate to a lack of activity, a low number of resource users, problems with Second Life's search features, and the difficulty of finding trustworthy information. For the average user, Second Life offers very little unique value compared to other online health resources.

  9. Skin bleaching: A neglected form of injury and threat to global skin ...

    African Journals Online (AJOL)

    Skin bleaching: A neglected form of injury and threat to global skin. JC Street, K Gaska, KM Lewis, ML Wilson. Abstract. Skin bleaching is the use of creams, gels, or soaps to lighten the skin and is known to cause a number of injuries, many of which are potentially life-threatening. Despite the growing body of research ...

  10. [Factors associated with the quality of life of community health agents].

    Science.gov (United States)

    Mascarenhas, Claudio Henrique Meira; Prado, Fabio Ornellas; Fernandes, Marcos Henrique

    2013-05-01

    This study examined the association of socio-demographic, occupational and risk and health behavioral factors with the loss of quality of life for community health agents of the municipality of Jequié in the state of Bahia. It is a cross-sectional study with 316 individuals, in which WHOQOL-Bref was used to evaluate the quality of life. The Poisson regression model was applied adopting the confidence interval of 95%. The variables associated with the largest threat to the Physical domain were gender, age, pain and satisfaction with health. Threats to the Psychological domain were schooling, psycho-social aspects, smoking, pain and satisfaction with health were analyzed. Threats to the Social Relations domain of were sex, marital situation, schooling, psycho-social aspects, and satisfaction with health. Threats to the Environmental domain were sex, family income, workplace, psycho-social aspects and satisfaction with health. It is hoped that this study will foster the development of public policies designed to enhance the conditions of life and work of this group of workers.

  11. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  12. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  13. Randomised controlled trial of Alexander technique lessons, exercise, and massage (ATEAM) for chronic and recurrent back pain.

    Science.gov (United States)

    Little, Paul; Lewith, George; Webley, Fran; Evans, Maggie; Beattie, Angela; Middleton, Karen; Barnett, Jane; Ballard, Kathleen; Oxford, Frances; Smith, Peter; Yardley, Lucy; Hollinghurst, Sandra; Sharp, Debbie

    2008-08-19

    To determine the effectiveness of lessons in the Alexander technique, massage therapy, and advice from a doctor to take exercise (exercise prescription) along with nurse delivered behavioural counselling for patients with chronic or recurrent back pain. Factorial randomised trial. 64 general practices in England. 579 patients with chronic or recurrent low back pain; 144 were randomised to normal care, 147 to massage, 144 to six Alexander technique lessons, and 144 to 24 Alexander technique lessons; half of each of these groups were randomised to exercise prescription. Normal care (control), six sessions of massage, six or 24 lessons on the Alexander technique, and prescription for exercise from a doctor with nurse delivered behavioural counselling. Roland Morris disability score (number of activities impaired by pain) and number of days in pain. Exercise and lessons in the Alexander technique, but not massage, remained effective at one year (compared with control Roland disability score 8.1: massage -0.58, 95% confidence interval -1.94 to 0.77, six lessons -1.40, -2.77 to -0.03, 24 lessons -3.4, -4.76 to -2.03, and exercise -1.29, -2.25 to -0.34). Exercise after six lessons achieved 72% of the effect of 24 lessons alone (Roland disability score -2.98 and -4.14, respectively). Number of days with back pain in the past four weeks was lower after lessons (compared with control median 21 days: 24 lessons -18, six lessons -10, massage -7) and quality of life improved significantly. No significant harms were reported. One to one lessons in the Alexander technique from registered teachers have long term benefits for patients with chronic back pain. Six lessons followed by exercise prescription were nearly as effective as 24 lessons. National Research Register N0028108728.

  14. Nuclear reactor control with fuzzy logic approaches - strengths, weakness, opportunities, and threats

    International Nuclear Information System (INIS)

    Ruan, Da

    2004-01-01

    As part of the special track on 'Lessons learned from computational intelligence in nuclear applications' at the forthcoming FLINS 2004 conference on Applied Computational Intelligence (Blankenberge, Belgium, September 1-3, 2004), research experiences on fuzzy logic techniques in applications of nuclear reactor control operation are critically reviewed in this presentation. Assessment of four real fuzzy control applications at the MIT research reactor in the US, the FUGEN heavy water reactor in Japan, the BR1 research reactor in Belgium, and a TRIGA Mark III reactor in Mexico will be examined thought a SWOT analysis (strengths, weakness, opportunities, and threats). Special attention will be paid to the current cooperation between the Belgian Nuclear Research Centre (SCK-CEN) and the Mexican Nuclear Centre (ININ) on the fuzzy logic control for nuclear reactor control project under the partial support of the National Council for Science and Technology of Mexico (CONACYT). (Author)

  15. Anxiety and Depression Symptom Dimensions Demonstrate Unique Relationships with the Startle Reflex in Anticipation of Unpredictable Threat in 8 to 14 Year-Old Girls

    Science.gov (United States)

    Nelson, Brady D.; Hajcak, Greg

    2016-01-01

    There is growing evidence that heightened sensitivity to unpredictability is a core mechanism of anxiety disorders. In adults, multiple anxiety disorders have been associated with a heightened startle reflex in anticipation of unpredictable threat. Child and adolescent anxiety has been linked to an increased startle reflex across baseline, safety, and threat conditions. However, it is unclear whether anxiety in youth is related to the startle reflex as a function of threat predictability. In a sample of 90 8 to 14 year-old girls, the present study examined the association between anxiety symptom dimensions and startle potentiation during a no, predictable, and unpredictable threat task. Depression symptom dimensions were also examined given their high comorbidity with anxiety and mixed relationship with the startle reflex and sensitivity to unpredictability. To assess current symptoms, participants completed the self-report Screen for Child Anxiety Related Emotional Disorders and Children’s Depression Inventory. Results indicated that social phobia symptoms were associated with heightened startle potentiation in anticipation of unpredictable threat and attenuated startle potentiation in anticipation of predictable threat. Negative mood and negative self-esteem symptoms were associated with attenuated and heightened startle potentiation in anticipation of unpredictable threat, respectively. All results remained significant after controlling for the other symptom dimensions. The present study provides initial evidence that anxiety and depression symptom dimensions demonstrate unique associations with the startle reflex in anticipation of unpredictable threat in children and adolescents. PMID:27224989

  16. Life on a Farm during the Great Depression.

    Science.gov (United States)

    Musbach, Joan W.

    2001-01-01

    Presents a lesson plan for eighth-grade students where they learn about the Great Depression by studying rural life. Explains that the students explore farm records from June and December 1935 after reading an excerpt about rural life in the 1930s. Includes copies of the ledgers, photographs, and student handouts. (CMK)

  17. Threats during sex work and association with mental health among young female sex workers in Hong Kong.

    Science.gov (United States)

    Mo, Phoenix K H; Mak, Winnie W S; Kwok, Yvonne T Y; Xin, Meiqi; Chan, Charlie W L; Yip, Louise W M

    2018-08-01

    Young female sex workers (YFSWs) are confronted with significant threats during sex work. The present cross-sectional study examined different levels of threats (i.e., threats to life and health, threats to humanity, threats to control of work and financial security, and the threats to future) experienced by 87 YFSWs (age 16-25) in Hong Kong, and identified their association with mental health (i.e., psychological well-being) together with other factors, including childhood trauma, self-efficacy, hope, and social support. Results showed that the participants encountered a significant number of threats. More than half reported that they had a condom removed by clients during sex (51.7%); or have been humililated by clients (51.7%). Because of sex work, about a quarter (25.3%) have had sexually transmitted disease, and respectively 10.3% and 12.6% have had abortion and unplanned pregnancy. The majority have had friends found out that they engaged in sex work (72.4%). They also showed a high level of worry about the various threats. Multiple linear regression analysis showed that childhood trauma (β = -.26) and worry about threats during sex work (β = -.22) were significantly negative predictors, while self-efficacy (β = .20) and hope (β = .27) were significantly positive predictors of mental health. Future services should improve YFSWs' skills to minimize potential threats during female sex work, address the structural correlates and relieve their worries, and empower them with more hope and self-efficacy in choosing clients.

  18. Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques

    Directory of Open Access Journals (Sweden)

    J. Bruce Johnson

    2014-01-01

    Full Text Available Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity and sampling time scales (from passive mines to rapid rate of march convoy protection for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system possessing a high level of sensitivity to threat agents and a moderate standoff real-time capability appropriate for portal screening of personnel or vehicles. In this work, we focus on several promising, and potentially synergistic, laser-based methods for sensing threat agents. For each method, we have briefly outlined the technique and report on the current level of capability.

  19. Black Students' Recollections of Pathways to Resilience: Lessons for School Psychologists

    Science.gov (United States)

    Theron, Linda C.

    2013-01-01

    Drawing on narrative data from a multiple case study, I recount the life stories of two resilient Black South African university students to theorize about the processes that encouraged these students, familiar with penury and parental illiteracy, to resile. I aimed to uncover lessons for school psychologists about resilience, and their role in…

  20. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  1. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  2. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  3. The attitudes of classroom teacher candidates towards physical education lesson

    Directory of Open Access Journals (Sweden)

    Gönül Tekkurşun Demir

    2017-12-01

    Full Text Available Aim: It is aimed to determine the attitudes of the 2nd, 3rd, and 4th grade classroom teacher candidates towards the physical education lesson according to various variables. Material and Methods: For the current study, the screening method, one of the quantitative research models, was used. The research consists of 2nd, 3rd, and 4th grade, totally164 university students, 106 (%64,6 females, 58 (%35,4 males, attending Uşak University, Classroom Teaching Program in 2016-2017 academic year. The first-grade students were not included in this research, because the physical education and play teaching lessons are given to classroom student candidates in the second-grade at Uşak University, Classroom Teaching Program. “Personal information form" and “Physical Education Lesson Attitude Scale for Classroom Teacher Candidates" were used as data collection tools. Before analysis, the data were evaluated using the values of Skewness and Skewness (normal distribution of the data and Levene (equality of variance tests. In the analysis of the data; frequency, arithmetic mean, standard deviation; t-test, ANOVA and Pearson Correlation test were used. Results: When examined the total score of the teacher candidates obtained from Physical Education Lesson Attitude Scale for Classroom Teacher Candidates and age variable by the Pearson Moment Correlation analysis, it was found that there was a statistically significant negative relationship between the received scores at low level. It was determined that the attitudes of the classroom teacher candidates towards the physical education lessons did not show any significant difference according to the gender variable, but there was a significant difference when examined their class levels. While no significant difference was found in the attitudes of the classroom teacher candidates, who played and did not play sports in their past life, towards physical education lessons, no significant difference was found

  4. Anxiety and Depression Symptom Dimensions Demonstrate Unique Relationships with the Startle Reflex in Anticipation of Unpredictable Threat in 8 to 14 Year-Old Girls.

    Science.gov (United States)

    Nelson, Brady D; Hajcak, Greg

    2017-02-01

    There is growing evidence that heightened sensitivity to unpredictability is a core mechanism of anxiety disorders. In adults, multiple anxiety disorders have been associated with a heightened startle reflex in anticipation of unpredictable threat. Child and adolescent anxiety has been linked to an increased startle reflex across baseline, safety, and threat conditions. However, it is unclear whether anxiety in youth is related to the startle reflex as a function of threat predictability. In a sample of 90 8 to 14 year-old girls, the present study examined the association between anxiety symptom dimensions and startle potentiation during a no, predictable, and unpredictable threat task. Depression symptom dimensions were also examined given their high comorbidity with anxiety and mixed relationship with the startle reflex and sensitivity to unpredictability. To assess current symptoms, participants completed the self-report Screen for Child Anxiety Related Emotional Disorders and Children's Depression Inventory. Results indicated that social phobia symptoms were associated with heightened startle potentiation in anticipation of unpredictable threat and attenuated startle potentiation in anticipation of predictable threat. Negative mood and negative self-esteem symptoms were associated with attenuated and heightened startle potentiation in anticipation of unpredictable threat, respectively. All results remained significant after controlling for the other symptom dimensions. The present study provides initial evidence that anxiety and depression symptom dimensions demonstrate unique associations with the startle reflex in anticipation of unpredictable threat in children and adolescents.

  5. Kenya’s Life Lessons through the Lived Experience of Rural Caregivers

    Directory of Open Access Journals (Sweden)

    Amy Cappiccie

    2017-11-01

    Full Text Available This qualitative research study used a phenomenological lens to examine the perspectives of familial caregivers in the Laikipia Region of Kenya. Through the narrative of the caregivers’ lived experience, key factors identified included social supports, rewards of caregiving, and lessons to others. Overarching basic themes centered on food insecurity, disease, rejection, lack of support, education challenges, inadequate land ownership, the absence of male support and neglect issues. These unique perspectives can contribute towards our understanding of policy and programming needs for orphaned children and familial caregivers in rural Kenya and within the rural areas of the East African context.

  6. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Lessons Learned from Developing a Patient Engagement Panel: An OCHIN Report.

    Science.gov (United States)

    Arkind, Jill; Likumahuwa-Ackman, Sonja; Warren, Nate; Dickerson, Kay; Robbins, Lynn; Norman, Kathy; DeVoe, Jennifer E

    2015-01-01

    There is renewed interest in patient engagement in clinical and research settings, creating a need for documenting and publishing lessons learned from efforts to meaningfully engage patients. This article describes early lessons learned from the development of OCHIN's Patient Engagement Panel (PEP). OCHIN supports a national network of more than 300 community health centers (CHCs) and other primary care settings that serve over 1.5 million patients annually across nearly 20 states. The PEP was conceived in 2009 to harness the CHC tradition of patient engagement in this new era of patient-centered outcomes research and to ensure that patients were engaged throughout the life cycle of our research projects, from conception to dissemination. Developed by clinicians and researchers within our practice-based research network, recruitment of patients to serve as PEP members began in early 2012. The PEP currently has a membership of 18 patients from 3 states. Over the past 24 months, the PEP has been involved with 12 projects. We describe developing the PEP and challenges and lessons learned (eg, recruitment, funding model, creating value for patient partners, compensation). These lessons learned are relevant not only for research but also for patient engagement in quality improvement efforts and other clinical initiatives. © Copyright 2015 by the American Board of Family Medicine.

  8. Threat perception after the Boston Marathon bombings: The effects of personal relevance and conceptual framing.

    Science.gov (United States)

    Wormwood, Jolie Baumann; Lynn, Spencer K; Feldman Barrett, Lisa; Quigley, Karen S

    2016-01-01

    We examined how the Boston Marathon bombings affected threat perception in the Boston community. In a threat perception task, participants attempted to "shoot" armed targets and avoid shooting unarmed targets. Participants viewing images of the bombings accompanied by affectively negative music and text (e.g., "Terror Strikes Boston") made more false alarms (i.e., more errors "shooting" unarmed targets) compared to participants viewing the same images accompanied by affectively positive music and text (e.g., "Boston Strong") and participants who did not view bombing images. This difference appears to be driven by decreased sensitivity (i.e., decreased ability to distinguish guns from non-guns) as opposed to a more liberal bias (i.e., favouring the "shoot" response). Additionally, the more strongly affected the participant was by the bombings, the more their sensitivity was reduced in the negatively framed condition, suggesting that this framing was particularly detrimental to the most vulnerable individuals in the affected community.

  9. International Space Station Passive Thermal Control System Analysis, Top Ten Lessons-Learned

    Science.gov (United States)

    Iovine, John

    2011-01-01

    The International Space Station (ISS) has been on-orbit for over 10 years, and there have been numerous technical challenges along the way from design to assembly to on-orbit anomalies and repairs. The Passive Thermal Control System (PTCS) management team has been a key player in successfully dealing with these challenges. The PTCS team performs thermal analysis in support of design and verification, launch and assembly constraints, integration, sustaining engineering, failure response, and model validation. This analysis is a significant body of work and provides a unique opportunity to compile a wealth of real world engineering and analysis knowledge and the corresponding lessons-learned. The analysis lessons encompass the full life cycle of flight hardware from design to on-orbit performance and sustaining engineering. These lessons can provide significant insight for new projects and programs. Key areas to be presented include thermal model fidelity, verification methods, analysis uncertainty, and operations support.

  10. Sensitivity of early-life-stage golden trout to low pH and elevated aluminum

    International Nuclear Information System (INIS)

    DeLonay, A.J.; Little, E.E.; Woodward, F.; Brumbaugh, W.G.; Farag, A.M.; Rabeni, C.F.

    1993-01-01

    Early-life-stage golden trout (Oncorhynchus aguabonita) were exposed to acid and Al to examine the response and determine the sensitivity of a western, alpine salmonid to conditions simulating an episodic pH depression. Freshly fertilized eggs, alevins, and swim-up larvae were exposed for 7 d to one of 12 combinations of pH and Al, and surviving fish were held to 40 d post-hatch to determine the effect of exposure on subsequent survival and recovery. Golden trout are sensitive to conditions simulating episodic acidification events typically observed in the field. Significant mortality occurred when the pH of test waters was below 5.0 in the absence of Al or when pH was 5.5 in the presence of 100 μg/L total Al. Behavioral impairments were sensitive indicators of low pH and Al stress. Impaired locomotory and feeding behavior occurred at pH 5.5 without Al and at Al concentrations ≥ μg/L. In contrast, growth, RNA-to-DNA ratio, and whole-body ion concentration were relatively less sensitive indicators of sublethal acid and Al stress

  11. The threat to life from Eta Carinae and gamma ray bursts

    CERN Document Server

    Dar, Arnon; Dar, Arnon

    2001-01-01

    Eta Carinae, the most massive and luminous star known in our galaxy, is rapidly boiling matter off its surface. At any time its core could collapse into a black hole, which may result in a gamma-ray burst (GRB) that can devastate life on Earth. Auspiciously, recent observations indicate that the GRBs are narrowly beamed in cones along the rotational axis of the progenitor star. In the case of Eta Carinae the GRBs will not point to us, but will be ravaging to life on planets in our galaxy that happen to lie within the two beaming cones. The mean rate of massive life extinctions by jets from GRBs, per life-supporting planet in galaxies like ours, is once in 100 million years, comparable to the rate of major extinctions observed in the geological records of our planet. GRB extinctions also provide an answer to Fermi's question about alien visitors: ``Where are they?''

  12. A History of Space Toxicology Mishaps: Lessons Learned and Risk Management

    Science.gov (United States)

    James, John T.

    2009-01-01

    After several decades of human spaceflight, the community of space-faring nations has accumulated a diverse and sometimes harrowing history of toxicological events that have plagued human space endeavors almost from the very beginning. Lessons have been learned in ground-based test beds and others were discovered the hard way - when human lives were at stake in space. From such lessons one can build a risk-management framework for toxicological events to minimize the probability of a harmful exposure, while recognizing that we cannot foresee all events. Space toxicologists have learned that relatively harmless compounds can be converted by air revitalization systems into compounds that cause serious harm to the crew. Our toxic risk management strategy now includes an assessment of the fate of any compound that might be released into the atmosphere. Propellants are highly toxic compounds, yet we have not always been able to thoroughly isolate the crew from exposure to these toxicants. Leakage of fluids from systems has resulted in hazardous conditions at times, and the behavior of such compounds inside a spacecraft has taught us how to manage potentially harmful escapes should they occur. Potential combustion events are an ever-present threat to the wellbeing of the crew. Such events have been sufficiently common that we have learned that one cannot judge the health threat of a given fire by the magnitude of the event. Management of such risks demands monitoring of combustion products. In the category of unpredictable toxic events, if one assumes that fires are predictable, we can place experience with toxic microbial metabolites, upsets during repair operations, and discharges from filters that have accumulated a substantial load of pollutants in their absorption beds. Management of such events requires a broad-spectrum, real-time analytical capability to discern the identity and concentrations of pollutants if they enter the atmosphere. Adverse events are an

  13. Some life lessons in the work place: personal narrative/case study.

    Science.gov (United States)

    Schwartz, Michael A

    2014-01-01

    Michael Schwartz, a lawyer deaf since birth, describes his journey as a professional for the last 32 years since his graduation from NYU School of Law in 1981. He offers a case study of his experiences with accommodations on the job as required by federal and state law. The study includes specific examples of what worked and what did not work for a deaf lawyer like him working at his craft. Schwartz wraps up with the lessons he learned over the last three decades as we moved from the model of non-compliance to that of compliance, even beyond compliance, with the mandates of law in the employment context.

  14. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  15. The cyber security threat stops in the boardroom.

    Science.gov (United States)

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  16. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  17. Uncertainty and sensitivity analyses of ballast life-cycle cost and payback period

    Energy Technology Data Exchange (ETDEWEB)

    McMahon, James E.; Liu, Xiaomin; Turiel, Ike; Hakim, Sajid; Fisher, Diane

    2000-06-01

    The paper introduces an innovative methodology for evaluating the relative significance of energy-efficient technologies applied to fluorescent lamp ballasts. The method involves replacing the point estimates of life cycle cost of the ballasts with uncertainty distributions reflecting the whole spectrum of possible costs, and the assessed probability associated with each value. The results of uncertainty and sensitivity analyses will help analysts reduce effort in data collection and carry on analysis more efficiently. These methods also enable policy makers to gain an insightful understanding of which efficient technology alternatives benefit or cost what fraction of consumers, given the explicit assumptions of the analysis.

  18. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  19. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability

    NARCIS (Netherlands)

    Lu, Y.; Yuan, J.; Lu, X.; Su, Chao; Zhang, Y.; Wang, C.; Cao, X.; Li, Q.; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, S.R.; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-01-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients,

  20. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  1. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  2. Sensitive maintenance: a cognitive process underlying individual differences in memory for threatening information.

    Science.gov (United States)

    Peters, Jan H; Hock, Michael; Krohne, Heinz Walter

    2012-01-01

    Dispositional styles of coping with threat influence memory for threatening information. In particular, sensitizers excel over repressors in their memory for threatening information after long retention intervals, but not after short ones. We therefore suggested that sensitizers, but not repressors, employ active maintenance processes during the retention interval to selectively retain threatening material. Sensitive maintenance was studied in 2 experiments in which participants were briefly exposed to threatening and nonthreatening pictures (Experiment 1, N = 128) or words (Experiment 2, N = 145). Following, we administered unannounced recognition tests before and after an intervening task that generated either high or low cognitive load, assuming that high cognitive load would impede sensitizers' memory maintenance of threatening material. Supporting our hypotheses, the same pattern of results was obtained in both experiments: Under low cognitive load, sensitizers forgot less threat material than repressors did; no such differences were observed under high cognitive load.

  3. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  4. The Great Society: An Introduction to Stereotype Threat and Social Perceptions

    Science.gov (United States)

    Shackelford, R.; Ali, N. A.; Mendez, B.; Meinke, B. K.

    2015-11-01

    This workshop introduced the concept of stereotype threat, in which an individual's academic performance is affected by awareness of stereotypes. We explored how stereotype threat builds into perceptions and creates contradictions in our society that can impact work with particular groups, with an emphasis on working with Afro-American and urban audiences. Through the “The Great Society” activity, participants worked in groups to develop aesthetics and taboos for fictional societies. We discussed the ways in which each group's values are compatible and conflicting, how they influence our perceptions of self and others, and how similar interactions may be experienced while working with diverse audiences in earth and space science education and outreach efforts. This workshop sought to give participants a conceptual framework for cultivating awareness of their own and their audience's perceptions, which can then be used to work with cultural sensitivity with diverse audiences.

  5. INFORMATION THREATS IN A GLOBALIZED WORLD: ECONOMICS, POLITICS, SOCIETY (EXPERIENCE OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Anatoliy Holovka

    2016-11-01

    Full Text Available The scientific article deals with both integral vision of the contemporary informative risks in the globalized world and their classification. The essence of the informative security is exposed, which is one of main factors of steady development of the modern informative society. In consideration of the foreign practice, the experience of Ukraine is also analyzed in counteraction to the contemporary informative threats. The effective policy of safety and counteraction to the informative threats is one of the basic constituents of the state national safety system and at the same time testifies to the correct character of connections between the public organs and the society. Under the conditions of unrestrained progress of information technologies and general informatization in all sectors of people’s life (politics, economy, defense, energy etc., providing of control and defense of informative space of the country becomes much more difficult task. Modern Ukrainian realities certify convincingly, that Ukraine is in an extremely difficult political situation that influences all spheres of Ukrainians’ life. The key reason of such situation is a military-informative aggression against Ukraine from Russia, which is the fact of waging a «hybrid war». As it is known, this type of war combines the application of both classic soldiery instruments (military technique, firearms, regular troops and methods of informative influence (cyber-attack, informative diversions, aggressive propaganda, impact on public opinion. This factor encourages such research. The object of the study is the phenomenon of information risks in the modern world. Subject of research – is the impact of modern information threats to the state and society, namely the economic, political and social spheres. For a holistic analysis of the subject of research was used appropriate methodology – systematic approach, method of comparative analysis, general scientific methods

  6. Development of aquatic life criteria for triclosan and comparison of the sensitivity between native and non-native species.

    Science.gov (United States)

    Wang, Xiao-Nan; Liu, Zheng-Tao; Yan, Zhen-Guang; Zhang, Cong; Wang, Wei-Li; Zhou, Jun-Li; Pei, Shu-Wei

    2013-09-15

    Triclosan (TCS) is an antimicrobial agent which is used as a broad-spectrum bacteriostatic and found in personal care products, and due to this it is widely spread in the aquatic environment. However, there is no paper dealing with the aquatic life criteria of TCS, mainly result from the shortage of toxicity data of different taxonomic levels. In the present study, toxicity data were obtained from 9 acute toxicity tests and 3 chronic toxicity tests using 9 Chinese native aquatic species from different taxonomic levels, and the aquatic life criteria was derived using 3 methods. Furthermore, differences of species sensitivity distributions (SSD) between native and non-native species were compared. Among the tested species, demersal fish Misgurnus anguillicaudatus was the most sensitive species, and the fishes were more sensitive than the aquatic invertebrates of Annelid and insect, and the insect was the least sensitive species. The comparison showed that there was no significant difference between SSDs constructed from native and non-native taxa. Finally, a criterion maximum concentration of 0.009 mg/L and a criterion continuous concentration of 0.002 mg/L were developed based on different taxa, according to the U.S. Environmental Protection Agency guidelines. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. The impact of stress at different life stages on physical health and the buffering effects of maternal sensitivity.

    Science.gov (United States)

    Farrell, Allison K; Simpson, Jeffry A; Carlson, Elizabeth A; Englund, Michelle M; Sung, Sooyeon

    2017-01-01

    Many studies indicate that early life stress leads to negative health outcomes in adulthood, and some suggest that high-quality parenting might buffer these effects. Most prior research, however, has relied on cross-sectional retrospective reports of stress and parenting. Our study tests how coder-rated stress and parenting quality assessed at different life stages predict adult health outcomes in a prospective, longitudinal study. Participants were 163 individuals in the Minnesota Longitudinal Study of Risk and Adaptation studied since birth. Physical health was assessed at age 32 with body mass index, self-reports of symptoms and illnesses experienced, and self-ratings of overall physical health. Stress was assessed by coder-rated interviews involving participants or their mothers at 16 time points partitioned into 5 life stages: early childhood, middle childhood, adolescence, young adulthood, and at age 32 (when health was assessed). Parenting quality was measured by coder ratings of each mother's provision of sensitive, responsive support at 7 time points between birth and age 13. Early childhood, adolescent, and concurrent stress predicted adult health outcomes at age 32. Early childhood and adolescent stress, and adolescent and concurrent stress, both showed a "dual-risk" pattern, such that experiencing higher stress at both of these life stages predicted the worst health outcomes. Higher maternal sensitivity, however, buffered these deleterious effects. Our prospective data reveal that early childhood and adolescence are important developmental periods during which stress is influential for adult physical health. However, parenting interventions that promote greater sensitivity may help children in high-stress environments avoid negative adult health outcomes. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. The impact of stress at different life stages on physical health and the buffering effects of maternal sensitivity

    Science.gov (United States)

    Farrell, Allison K.; Simpson, Jeffry A.; Carlson, Elizabeth A.; Englund, Michelle M.; Sung, Sooyeon

    2016-01-01

    Objective Many studies indicate that early life stress leads to negative health outcomes in adulthood, and some suggest that high-quality parenting might buffer these effects. Most prior research, however, has relied on cross-sectional retrospective reports of stress and parenting. Our study tests how coder-rated stress and parenting quality assessed at different life stages predict adult health outcomes in a prospective, longitudinal study. Methods Participants were 163 individuals in the Minnesota Longitudinal Study of Risk and Adaptation (MLSRA) studied since birth. Physical health was assessed at age 32 with BMI, self-reports of symptoms and illnesses experienced, and self-ratings overall physical health. Stress was assessed by coder-rated interviews involving participants or their mothers at 16 time-points partitioned into five life stages: early childhood, middle childhood, adolescence, young adulthood, and at age 32 (when health was assessed). Parenting quality was measured by coder-ratings of each mother's provision of sensitive, responsive support at 7 time-points between birth and age 13. Results Early childhood, adolescent, and concurrent stress predicted adult health outcomes at age 32. Early childhood and adolescent stress, and adolescent and concurrent stress, both showed a “dual-risk” pattern, such that experiencing higher stress at both of these life stages predicted the worst health outcomes. Higher maternal sensitivity, however, buffered these deleterious effects. Conclusions Our prospective data reveals that early childhood and adolescence are important developmental periods during which stress is influential for adult physical health. However, parenting interventions that promote greater sensitivity may help children in high-stress environments avoid negative adult health outcomes. PMID:27669179

  9. Evaluation of the Teaching Methods Used in Secondary School Biology Lessons

    Directory of Open Access Journals (Sweden)

    Porozovs Juris

    2015-06-01

    Full Text Available The teacher’s skills in conducting the lesson and choice of teaching methods play an essential role in creating students’ interest in biology. The aim of the research was to study the opinion of secondary school students and biology teachers regarding the most successful teaching methods used in biology lessons and viable options to make biology lessons more interesting. The research comprised polling students and biology teachers from several schools, namely: 2 secondary schools in Jelgava, 2 in Riga and 1 in Vecumnieki. The responses revealed that 58% of students find biology lessons interesting. 56% of students indicated that their ability to focus attention during biology lessons depends on the task presented to them. Most of all they prefer watching the teacher’s presentations, listening to their teacher telling about the actual topic as well as performing laboratory work and group-work. Many students like participating in discussions, whereas a far smaller number would do various exercises, individual tasks, fill out worksheets or complete projects. Least of all students wish to work with the textbook. The methods most frequently applied by teachers are as follows: lecture, explanation, demonstration, and discussion. Teachers believe that their students prefer laboratory work and discussions as well as listening to their teacher and watching presentations or films. They also indicate at the necessity to link theory with practice and to involve information technologies. While teaching their subject biology teachers try to establish relationship between theory and real life in order to develop their students’ interest in natural processes.

  10. A Lesson about the Circular Flow. Active Learning Lessons. Economics International.

    Science.gov (United States)

    Landfried, Janet

    This lesson plan was developed through "Economics International," an international program to help build economic education infrastructures in the emerging market economies. It provides a lesson description; appropriate grade level; economic concepts; content standards and benchmarks; related subjects; instructional objectives; time…

  11. Comparative analysis of climate change vulnerability assessments. Lessons from Tunisia and Indonesia

    Energy Technology Data Exchange (ETDEWEB)

    Hammill, Anne; Bizikova, Livia; Dekens, Julie; McCandless, Matthew

    2013-03-15

    Vulnerability assessments (VAs) are central to shaping climate change adaptation decisions. They help to define the nature and extent of the threat that may harm a given human or ecological system, providing a basis for devising measures that will minimize or avoid this harm. Yet the wide variety of VA approaches can be confusing for practitioners, creating uncertainty about the ''right'' way to assess vulnerability. In an effort to provide some guidance on designing and conducting VAs, this paper reviews and compares VAs undertaken in Indonesia and Tunisia to distill key approaches, components and lessons. It begins with a general overview of definitions, approaches and challenges with conducting VAs, and then proposes a framework for analyzing and comparing them. The framework looks at four components of VAs: (1) Framing: where do we come from? (2) Process of conducting the VAs: how does it work? (3) Inputs: what is needed? (4) Outputs: what does it tell us? The framework is then applied to analyze the assessments carried out in Tunisia and Indonesia, from their respective framings of vulnerability to the outputs of the process. The report then concludes with observations on differences and similarities between the VAs, as well as lessons learned that can inform the design and execution of future assessments.

  12. Comparative analysis of climate change vulnerability assessments. Lessons from Tunisia and Indonesia

    International Nuclear Information System (INIS)

    Hammill, Anne; Bizikova, Livia; Dekens, Julie; McCandless, Matthew

    2013-03-01

    Vulnerability assessments (VAs) are central to shaping climate change adaptation decisions. They help to define the nature and extent of the threat that may harm a given human or ecological system, providing a basis for devising measures that will minimize or avoid this harm. Yet the wide variety of VA approaches can be confusing for practitioners, creating uncertainty about the ''right'' way to assess vulnerability. In an effort to provide some guidance on designing and conducting VAs, this paper reviews and compares VAs undertaken in Indonesia and Tunisia to distill key approaches, components and lessons. It begins with a general overview of definitions, approaches and challenges with conducting VAs, and then proposes a framework for analyzing and comparing them. The framework looks at four components of VAs: (1) Framing: where do we come from? (2) Process of conducting the VAs: how does it work? (3) Inputs: what is needed? (4) Outputs: what does it tell us? The framework is then applied to analyze the assessments carried out in Tunisia and Indonesia, from their respective framings of vulnerability to the outputs of the process. The report then concludes with observations on differences and similarities between the VAs, as well as lessons learned that can inform the design and execution of future assessments.

  13. Lessons on climate sensitivity from past climate changes

    NARCIS (Netherlands)

    von der Heydt, A.S.; Dijkstra, H.A.; van de Wal, R.S.W.; Caballero, R.; Crucifix, M.; Foster, G.L.; Huber, M.; Kohler, P.; Rohling, E.; Valdes, P.J.; Ashwin, P.; Bathiany, S.; Berends, T.; van Bree, L.G.J.; Ditlevsen, P.; Ghil, M.; Haywood, A.; Katzav, J.K.; Lohmann, G.; Lohmann, J.; Lucarini, V.; Marzocchi, A.; Palike, H.; Ruvalcaba Baroni, I.; Simon, D.; Sluijs, A.; Stap, L.B.; Tantet, A.; Viebahn, J.; Ziegler, M.

    2016-01-01

    Over the last decade, our understanding of climate sensitivity has improved considerably. The climate system shows variability on many timescales, is subject to non-stationary forcing and it is most likely out of equilibrium with the changes in the radiative forcing. Slow and fast feedbacks

  14. Assessment of naked mole-rat distribution and threats in Eastern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mengistu Wale

    2016-08-01

    Full Text Available Objective: To identify the distribution, threats and community attitudes towards naked molerat in Eastern Ethiopia. Methods: Data were collected through direct observation and interview and Chi-square at 95% confidence interval was used for significance test. Results: Naked mole-rat was identified in Fafan, City/Shinele, Eastern Hararghe Zone and Dire Dawa Administrative. The main threats of naked mole-rat identified were agricultural expansion, human killing and lack of awareness. From a total of 100 respondents, 92% of them considered naked mole-rat as pest as a result that 46% of them participated in direct killing. Literacy rate significantly affects the willingness to participate in the conservation of naked mole-rat (χ2 = 7.478, df = 1, P < 0.05. From a total of 26% respondents who did not show the willingness to participate in the conservation, 80.8% of them were illiterate. Conclusions: Naked mole-rat is fairly common in many of the study sites. However, rapid shift from nomadic life style to cultivation of crops and lacks of awareness were the main threats of naked mole-rat. Therefore, since there is no conservation action currently, further comprehensive study is required to design conservation plan for this species.

  15. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  16. Forecasting Lightning Threat using Cloud-resolving Model Simulations

    Science.gov (United States)

    McCaul, E. W., Jr.; Goodman, S. J.; LaCasse, K. M.; Cecil, D. J.

    2009-01-01

    As numerical forecasts capable of resolving individual convective clouds become more common, it is of interest to see if quantitative forecasts of lightning flash rate density are possible, based on fields computed by the numerical model. Previous observational research has shown robust relationships between observed lightning flash rates and inferred updraft and large precipitation ice fields in the mixed phase regions of storms, and that these relationships might allow simulated fields to serve as proxies for lightning flash rate density. It is shown in this paper that two simple proxy fields do indeed provide reasonable and cost-effective bases for creating time-evolving maps of predicted lightning flash rate density, judging from a series of diverse simulation case study events in North Alabama for which Lightning Mapping Array data provide ground truth. One method is based on the product of upward velocity and the mixing ratio of precipitating ice hydrometeors, modeled as graupel only, in the mixed phase region of storms at the -15\\dgc\\ level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domainwide statistics of the peak values of simulated flash rate proxy fields against domainwide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. A blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Weather Research and Forecast Model simulations of selected North Alabama cases show that this model can distinguish the general character and intensity of most convective events, and that the proposed methods show promise as a means of generating

  17. Meaning of life in adulthood and later life / Sentido de vida na fase adulta e velhice

    Directory of Open Access Journals (Sweden)

    Cinara Sommerhalder

    2010-01-01

    Full Text Available The unceasing search for meaning to life is part of the existential questioning. Viktor Frankl is a pioneer in this field. Later, researchers have used his lessons to expand the definition of the construct 'meaning of life'. Transcultural studies lead to a better understanding of this theme, but further research still needs to be done. The available instruments are being tested and improved; however, we already have relevant information on the theme, and it contributes largely to the study of the development of adulthood and later life. This article aims at showing the evolution of the concept 'meaning of life' and how researches have been dealing with the theme in the field of adulthood and later life development.

  18. Classroom Management and Lesson Planning(4)

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Lesson PlanningTask 1As teachers,we all need to plan our lessons before we teach.Make a list of things that you think need tobe included in a lesson plan.Then compare and discuss your list with another teacher.Also think about reasonswhy we need to plan our lessons.

  19. Some Lessons From a Symposium on Cultural Psychological Science.

    Science.gov (United States)

    Sternberg, Robert J

    2017-09-01

    In this concluding essay, I summarize some of the main points of each of the contributors and attempt to highlight their importance for psychological science and for everyday life. I bring in some examples of research from my own research group over the years that reinforce many of the conclusions reached by the contributors. The purpose of this symposium on cultural psychological science is, we hope, to teach some lessons that could not easily be learned except through cultural research. My goal in this final essay is to consider what I believe to be a primary lesson of each contribution. I attempt to illustrate the considerable relevance of each of these contributions to contemporary society. The views expressed here are solely my own, and of course readers may find much to disagree with; hopefully, they will find some things to agree with as well!

  20. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  1. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  2. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  3. Constellation Program Lessons Learned. Volume 2; Detailed Lessons Learned

    Science.gov (United States)

    Rhatigan, Jennifer; Neubek, Deborah J.; Thomas, L. Dale

    2011-01-01

    These lessons learned are part of a suite of hardware, software, test results, designs, knowledge base, and documentation that comprises the legacy of the Constellation Program. The context, summary information, and lessons learned are presented in a factual format, as known and described at the time. While our opinions might be discernable in the context, we have avoided all but factually sustainable statements. Statements should not be viewed as being either positive or negative; their value lies in what we did and what we learned that is worthy of passing on. The lessons include both "dos" and "don ts." In many cases, one person s "do" can be viewed as another person s "don t"; therefore, we have attempted to capture both perspectives when applicable and useful. While Volume I summarizes the views of those who managed the program, this Volume II encompasses the views at the working level, describing how the program challenges manifested in day-to-day activities. Here we see themes that were perhaps hinted at, but not completely addressed, in Volume I: unintended consequences of policies that worked well at higher levels but lacked proper implementation at the working level; long-term effects of the "generation gap" in human space flight development, the need to demonstrate early successes at the expense of thorough planning, and the consequences of problems and challenges not yet addressed because other problems and challenges were more immediate or manifest. Not all lessons learned have the benefit of being operationally vetted, since the program was cancelled shortly after Preliminary Design Review. We avoid making statements about operational consequences (with the exception of testing and test flights that did occur), but we do attempt to provide insight into how operational thinking influenced design and testing. The lessons have been formatted with a description, along with supporting information, a succinct statement of the lesson learned, and

  4. Classroom Management and Lesson Planning(4)

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Lesson Planning Task 1 As teachers,we all need to plan our lessons before we teach.Make a list of things that you think need to be included in a lesson plan.Then compare and discuss your list with another teacher.Also think about reasons why we need to plan our lessons.

  5. Ultrasensitive microchip based on smart microgel for real-time online detection of trace threat analytes.

    Science.gov (United States)

    Lin, Shuo; Wang, Wei; Ju, Xiao-Jie; Xie, Rui; Liu, Zhuang; Yu, Hai-Rong; Zhang, Chuan; Chu, Liang-Yin

    2016-02-23

    Real-time online detection of trace threat analytes is critical for global sustainability, whereas the key challenge is how to efficiently convert and amplify analyte signals into simple readouts. Here we report an ultrasensitive microfluidic platform incorporated with smart microgel for real-time online detection of trace threat analytes. The microgel can swell responding to specific stimulus in flowing solution, resulting in efficient conversion of the stimulus signal into significantly amplified signal of flow-rate change; thus highly sensitive, fast, and selective detection can be achieved. We demonstrate this by incorporating ion-recognizable microgel for detecting trace Pb(2+), and connecting our platform with pipelines of tap water and wastewater for real-time online Pb(2+) detection to achieve timely pollution warning and terminating. This work provides a generalizable platform for incorporating myriad stimuli-responsive microgels to achieve ever-better performance for real-time online detection of various trace threat molecules, and may expand the scope of applications of detection techniques.

  6. Lesson Planning the Kodaly Way.

    Science.gov (United States)

    Boshkoff, Ruth

    1991-01-01

    Discusses the contribution of Zoltan Kodaly to music lesson planning. Emphasizes preparation, presentation, and practice as the three important strategies in teaching concepts and skills to be included in a lesson plan. Includes a sample lesson plan covering a semester and advice on choosing song material. (DK)

  7. Graduate students teaching elementary earth science through interactive classroom lessons

    Science.gov (United States)

    Caswell, T. E.; Goudge, T. A.; Jawin, E. R.; Robinson, F.

    2014-12-01

    , bring basic science to life in second grade classrooms. We will be happy to share their story and to make our lesson plans available to a broader audience.

  8. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  9. Analysing the integration of engineering in science lessons with the Engineering-Infused Lesson Rubric

    Science.gov (United States)

    Peterman, Karen; Daugherty, Jenny L.; Custer, Rodney L.; Ross, Julia M.

    2017-09-01

    Science teachers are being called on to incorporate engineering practices into their classrooms. This study explores whether the Engineering-Infused Lesson Rubric, a new rubric designed to target best practices in engineering education, could be used to evaluate the extent to which engineering is infused into online science lessons. Eighty lessons were selected at random from three online repositories, and coded with the rubric. Overall results documented the strengths of existing lessons, as well as many components that teachers might strengthen. In addition, a subset of characteristics was found to distinguish lessons with the highest level of engineering infusion. Findings are discussed in relation to the potential of the rubric to help teachers use research evidence-informed practice generally, and in relation to the new content demands of the U.S. Next Generation Science Standards, in particular.

  10. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  11. Ose evaluation of delay systems in a high threat environment

    International Nuclear Information System (INIS)

    Rich, B.L.; Cook, B.G.

    1988-01-01

    The Office of Security Evaluations (OSE) has in place an Evaluation Program to assist the Department of Energy (DOE) Headquarters and operations office managers by assessing specific elements of protection programs and informing the managers of common strengths and weaknesses of these elements. This information is provided so that sufficient and cost effective protection programs are maintained or enhanced. The subject of this paper is the evaluation of delay systems in the high-threat environment defined for sensitive DOE security interests such as special nuclear materials, nuclear weapons, and related classified devices and information

  12. [End of life and vulnerability, a public health issue].

    Science.gov (United States)

    Boucomont, Aude

    2016-02-01

    End of life and precarity, two words which were linked by the French national observatory for end of life care in its work carried out in 2014. The study provided an overview of current support practices in different areas, highlighting certain lessons to be learned and making recommendations to the different partners involved. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  13. Designing Effective Interactions for Concordance around End-of-Life Care Decisions: Lessons from Hospice Admission Nurses

    Directory of Open Access Journals (Sweden)

    Carey Candrian

    2017-04-01

    choice patients make to forego aggressive treatment measures when they enroll in hospice. In a literal sense, to enroll in hospice means to bring in support for end-of-life care. It means to identify the need for expertise around symptom management at end-of-life, and agree to having a care team come and manage someone’s physical, psychosocial, and/or spiritual needs. As with all care, hospice can be stopped if it is no longer considered appropriate. To uncover the communication tensions undergirding a hospice admission interaction, we use Street’s ecological theory of patient-centered communication to analyze a case exemplar of a hospice admission interaction. This analysis reveals diverse points of struggle within hospice decision-making processes around hospice care and the need for communication techniques that promote trust and acceptance of end-of-life care. Lessons learned from talking about hospice care can inform other quality initiatives around communication and informed decision-making in the context of advance care planning, palliative care, and end-of-life care.

  14. With Interest It Comes To...Unconscionable Clauses in Sales Contracts. A Student's Lesson Plan [and] A Teacher's Lesson Plan [and] A Lawyer's Lesson Plan.

    Science.gov (United States)

    Howard, Estelle; And Others

    One of a series of secondary level teaching units presenting case studies with pro and con analysis of particular legal problems, the document presents a student's lesson plan, a teacher's lesson plan, and a lawyer's lesson plan on unconscionable clauses in sales contracts. The unit acquaints students with the operation of sales contracts and…

  15. Small Change Makes a Big Splash: The Role of Working Self-Concept in the Effects of Stereotype Threat on Memory.

    Science.gov (United States)

    Liu, Pei; Zhao, Fengqing; Zhang, Baoshan; Dang, Qingxiu

    2017-10-03

    Assuming that the principle of an active-self account holds true in real life, priming certain constructs could selectively activate a working self-concept, which in turn guides behavior. The current study involved two experiments that examined the relationships between stereotypic identity, working self-concept, and memory performance in older adults. Specifically, Study 1 tested whether a stereotype threat can affect older adults' working self-concept and memory performance. A modified Stroop color naming task and a separate recognition task showed that a stereotype threat prime altered the activation of the working self-concept and deteriorated the older adults' memory performance. Additionally, the working self-concept mediated the effect of stereotype threat on memory performance. Accordingly, we designed Study 2 to assess whether priming different identities can alter the working self-concept of the elderly and buffer the stereotype threat effect on memory performance. The results not only were the same as Study 1 but also revealed that activating multiple identities could mitigate the stereotype threat. These results support an active-self account and the efficacy of stereotype threat intervention. This intervention strategy may be able to be used in real situations to help the elderly alleviate stereotype threats and memory impairment.

  16. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  17. Social comparisons and quality of life following a prostate cancer diagnosis.

    Science.gov (United States)

    Umstead, Kendall L; Kalia, Sarah S; Madeo, Anne C; Erby, Lori H; Blank, Thomas O; Visvanathan, Kala; Roter, Debra L

    2018-02-09

    The objective was to explore the relationships among cognitive appraisals of prostate cancer (challenge, threat, and harm/loss), social comparisons, and quality of life in men previously diagnosed. Design, Sample, & Methods: Men who had participated in prostate cancer support groups completed a cross-sectional questionnaire (N = 189). Multivariable linear regression was used to evaluate social comparisons as mediators of quality of life while controlling for uncertainty and optimism. Positive and negative social comparisons were parallel mediators of the relationships between challenge or threat appraisals and quality of life, while only negative social comparisons mediated the relationship between harm/loss appraisals and quality of life. These findings demonstrate the importance of social comparisons in accounting for the effect of cognitive appraisals of prostate cancer on quality of life among men in support groups. Implications for Psychosocial Providers: Interventions to improve quality of life could address reduction of maladaptive comparisons, a strategy that could be tailored based on the patient's appraisal of prostate cancer.

  18. Antinuclear and third world

    International Nuclear Information System (INIS)

    Pak, Haegu

    1986-02-01

    The first part of this book is about antinuclear, which describes nuclear and nuclear war, the lesson out of history, an idea of neutron bomb and antinuclear through life and thoughts. The second part of this book includes the relationship between human and antinuclear, threat of nuclear, third world and popular literature, for conversion of Japan, an atomic experience and literature and experience and testimony in Nagasaki.

  19. Lessons learned related to packaging and transportation

    International Nuclear Information System (INIS)

    Wallen, C.

    1995-01-01

    The use of lessons learned as a tool for learning from past experiences is well established, especially by many organizations within the nuclear industry. Every person has, at some time, used the principles of lessons learned to adopt good work practices based on their own experiences or the experiences of others. Lessons learned can also help to avoid the recurrence of adverse practices, which is often an area that most lessons-learned programs tend to focus on. This paper will discuss how lessons learned relate to packaging and transportation issues and events experienced at Department of Energy (DOE) facilities. It will also discuss the role performed by the Office of Nuclear and Facility Safety's Office of Operating Experience Analysis and Feedback in disseminating lessons learned and operating experience feedback to the DOE complex. The central concept of lessons learned is that any organization should be able to learn from its own experiences and events. In addition, organizations should implement methodologies to scan external environments for lessons learned, to analyze and determine the relevance of lessons learned, and to bring about the necessary changes learned from these experiences. With increased concerns toward facility safety, the importance of utilizing the lessons-learned principles and the establishment of lessons-learned programs can not be overstated

  20. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  1. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  2. Early Life Histories of Fishes: New Developmental, Ecological and ...

    African Journals Online (AJOL)

    ontogeny and life history models revisited' which is an unabridged .... Hamburg, Germany, in August 1984. The papers are ..... Cambridge University Press, Cambridge, New York and ... lessons to be learnt from the well-illustrated keys and for.

  3. Project Interface Requirements Process Including Shuttle Lessons Learned

    Science.gov (United States)

    Bauch, Garland T.

    2010-01-01

    Most failures occur at interfaces between organizations and hardware. Processing interface requirements at the start of a project life cycle will reduce the likelihood of costly interface changes/failures later. This can be done by adding Interface Control Documents (ICDs) to the Project top level drawing tree, providing technical direction to the Projects for interface requirements, and by funding the interface requirements function directly from the Project Manager's office. The interface requirements function within the Project Systems Engineering and Integration (SE&I) Office would work in-line with the project element design engineers early in the life cycle to enhance communications and negotiate technical issues between the elements. This function would work as the technical arm of the Project Manager to help ensure that the Project cost, schedule, and risk objectives can be met during the Life Cycle. Some ICD Lessons Learned during the Space Shuttle Program (SSP) Life Cycle will include the use of hardware interface photos in the ICD, progressive life cycle design certification by analysis, test, & operations experience, assigning interface design engineers to Element Interface (EI) and Project technical panels, and linking interface design drawings with project build drawings

  4. Movement for life and health: African lessons | Roux | African ...

    African Journals Online (AJOL)

    Ancient patterns of African communal life involve healthy, breath-coordinated movements and gestures in a mutual reciprocity of person-world relations. Traditional Zulu cultural forms of human movement, which promote life and health, such as play, martial arts and dance, remain widely practised, especially in rural areas of ...

  5. Rebuilding self-confidence after cancer: a feasibility study of life-coaching.

    Science.gov (United States)

    Wagland, Richard; Fenlon, Deborah; Tarrant, Ruth; Howard-Jones, Gilly; Richardson, Alison

    2015-03-01

    Cancer survivors often experience decreased self-confidence which impacts negatively on their ability to self-manage the practical, social and emotional problems frequently faced as they emerge from end of treatment. This was a feasibility study of a life-coaching intervention, designed to rebuild confidence of survivors and support transition to life after cancer treatment. A one group pre-test, post-test design was used, recruiting participants from community organisations. Eligibility criteria are as follows: 18, no metastases, and no mental health problems. Participants received one individualised face-to-face and five telephone coaching sessions over 3 months. Outcome measures are as follows: New General Self-Efficacy Scale, Hope Scale, Personal Well-being Index, Assessment of Survivorship Concerns, Quality of Life in Adult Cancer Survivors, Hospital Anxiety and Depression Scale, Social Difficulties Index, and a goal attainment score. Interviews explored feasibility, acceptability and impact of life-coaching and research design. Nine women and two men were recruited, representing varying cancer diagnoses. All outcome measures were sensitive to change and indicated positive trends post-intervention. Participant interviews indicated the intervention was well received and had a positive impact. Lessons were learnt about study design, recruitment and intervention delivery. Life-coaching has a potential to enable cancer survivors to manage the transition to life beyond cancer and effect change on a range of outcomes. The intervention was feasible to deliver and acceptable to survivors at a time when many struggle to make sense of life. It merits further evaluation through a randomised controlled trial.

  6. Sharing Lessons Learned Between Industries in EU

    International Nuclear Information System (INIS)

    Muehleisen, A.; Strucic, M.

    2012-01-01

    Recent events in nuclear industry remind us on importance of continuous sharing of the knowledge and experience gained through evaluations of incidents and accidents. We frequently use experience from our daily life activities to improve our performance and avoid some mistakes or unwanted events. In the similar way we can use other industries experience. These experiences can be applied to improve nuclear safety. For example, Safety Culture, which has a great influence on the level of nuclear power plants safety, is similarly presented in other industries. Mechanisms which led to accidents from weak safety culture in one branch of other industry could be comparable to those in nuclear industry. Some other industries have many more cumulative years of experience than nuclear industry. Aviation and Oil industries are typical representatives. Part of their experience can be used in nuclear industry too. Number of reports from nuclear power plants showed us that not only specific equipment related causes lay behind accidents; there are also other causes and contributors which are more common for all industries. Hence lessons learned in other industry should be assessed and used in nuclear industry too. In the European Union, a regional initiative has been set up in 2008 in support of EU Member State nuclear safety authorities, but also EU technical support organizations, international organizations and the broader nuclear community, to enhance nuclear safety through improvement of the use of lessons learned from operational experience of nuclear power plants (NPPs). The initiative, called ''the EU Clearinghouse on Operational Experience Feedback for NPP'', is organized as a network operated by a centralized office located at the Joint Research Centre of the European Commission. The reduction of occurrence and significance of events in NPPs and their safe operation is its ultimate goal. Among others EU Clearinghouse provides services such as technical and scientific

  7. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  8. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  9. Lessons for Teaching Art Criticism.

    Science.gov (United States)

    Barrett, Terry, Ed.; Clark, Gilbert, Ed.

    This collection of lessons is meant to be a practical guide to help teachers engage children in art criticism. The lessons generally follow a similar format. Most suggest an age group but may be modified for use with younger or older students. Several authors suggest variations and extensions for lessons that include studio activities. A broad…

  10. "Frankenstein." [Lesson Plan].

    Science.gov (United States)

    Simon, Melanie

    Based on Mary Shelley's novel "Frankenstein," this lesson plan presents activities designed to help students understand that active readers interpret a novel (its characters, plot, setting, and theme) in different ways; and the great literature can be and has been adapted in many ways over time. The main activity of the lesson involves students…

  11. Penicillin’s Discovery and Antibiotic Resistance: Lessons for the Future?

    Science.gov (United States)

    
Lobanovska, Mariya; Pilla, Giulia

    2017-01-01

    Undoubtedly, the discovery of penicillin is one of the greatest milestones in modern medicine. 2016 marks the 75th anniversary of the first systemic administration of penicillin in humans, and is therefore an occasion to reflect upon the extraordinary impact that penicillin has had on the lives of millions of people since. This perspective presents a historical account of the discovery of the wonder drug, describes the biological nature of penicillin, and considers lessons that can be learned from the golden era of antibiotic research, which took place between the 1940s and 1960s. Looking back at the history of penicillin might help us to relive this journey to find new treatments and antimicrobial agents. This is particularly relevant today as the emergence of multiple drug resistant bacteria poses a global threat, and joint efforts are needed to combat the rise and spread of resistance. PMID:28356901

  12. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  13. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  14. Lessons Learned from the Node 1 Atmosphere Control and Storage and Water Recovery and Management Subsystem Design

    Science.gov (United States)

    Williams, David E.

    2011-01-01

    Node 1 flew to the International Space Station (ISS) on Flight 2A during December 1998. To date the National Aeronautics and Space Administration (NASA) has learned a lot of lessons from this module based on its history of approximately two years of acceptance testing on the ground and currently its twelve years on-orbit. This paper will provide an overview of the ISS Environmental Control and Life Support (ECLS) design of the Node 1 Atmosphere Control and Storage (ACS) and Water Recovery and Management (WRM) subsystems and it will document some of the lessons that have been learned to date for these subsystems based on problems prelaunch, problems encountered on-orbit, and operational problems/concerns. It is hoped that documenting these lessons learned from ISS will help in preventing them in future Programs.

  15. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  16. Anguishes caused by the nuclear threat. Results of international psychological research. Bedrohungsaengste. Ergebnisse internationaler psychologischer Forschung

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, F.; Boehnke, K. (Freie Univ. Berlin (Germany). Inst. fuer Allgemeine und Vergleichende Erziehungswissenschaft); Macpherson, M.J. (Freie Univ. Berlin (Germany))

    1990-04-01

    The conference of December 10th and 11th, 1987 dealt with life under the nuclear threat and the perspectives of pedagogic-psychological research. The individual contributions are in condensed form; they are discussed from the angle of how the psyche of individuals copes with military and non-military nuclear hazards. (DG).

  17. Perceived primal threat of mental illness and recovery: The mediating role of self-stigma and self-empowerment.

    Science.gov (United States)

    Zhang, Ruirui; Mak, Winnie W S; Chan, Randolph C H

    2017-01-01

    Although people in recovery from mental illness can continue to live a personally meaningful life despite their mental illness, their perception of mental illness as being a threat to their basic needs may influence the way they view themselves as a person with mental illness and their sense of mastery over their condition. The present study explored the effects of perceived primal threat on the recovery of people with mental illness, considering the mediating roles of self-stigma and self-empowerment. Latent variable structural equation modeling was conducted among 376 individuals with mental illness in Hong Kong. The model had excellent fit to the data (χ2 = 123.96, df = 60, χ2/df = 2.07, comparative fit index [CFI] = .98, Tucker-Lewis index [TLI] = .97, root mean square error of approximation [RMSEA] = .05, standardized root mean squared residual [SRMR] = .04). The influence of perceived primal threat on recovery was mediated by self-stigma and self-empowerment. Specifically, perceived primal threat was associated positively with self-stigma, which was negatively related to recovery; in contrast, it was negatively related to self-empowerment, which was positively related to recovery. This study adds to the understanding of the mechanism underlying the influence of perceived primal threat on recovery and suggests that perceived primal threat should be considered in the recovery process among people with mental illness. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. The dark side of the sublime: Distinguishing a threat-based variant of awe.

    Science.gov (United States)

    Gordon, Amie M; Stellar, Jennifer E; Anderson, Craig L; McNeil, Galen D; Loew, Daniel; Keltner, Dacher

    2017-08-01

    Theoretical conceptualizations of awe suggest this emotion can be more positive or negative depending on specific appraisal processes. However, the emergent scientific study of awe rarely emphasizes its negative side, classifying it instead as a positive emotion. In the present research we tested whether there is a more negative variant of awe that arises in response to vast, complex stimuli that are threatening (e.g., tornadoes, terrorist attack, wrathful god). We discovered people do experience this type of awe with regularity (Studies 1 & 4) and that it differs from other variants of awe in terms of its underlying appraisals, subjective experience, physiological correlates, and consequences for well-being. Specifically, threat-based awe experiences were appraised as lower in self-control and certainty and higher in situational control than other awe experiences, and were characterized by greater feelings of fear (Studies 2a & 2b). Threat-based awe was associated with physiological indicators of increased sympathetic autonomic arousal, whereas positive awe was associated with indicators of increased parasympathetic arousal (Study 3). Positive awe experiences in daily life (Study 4) and in the lab (Study 5) led to greater momentary well-being (compared with no awe experience), whereas threat-based awe experiences did not. This effect was partially mediated by increased feelings of powerlessness during threat-based awe experiences. Together, these findings highlight a darker side of awe. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Early life vaccination

    DEFF Research Database (Denmark)

    Nazerai, Loulieta; Bassi, Maria Rosaria; Uddbäck, Ida Elin Maria

    2016-01-01

    Intracellular pathogens represent a serious threat during early life. Importantly, even though the immune system of newborns may be characterized as developmentally immature, with a propensity to develop Th2 immunity, significant CD8+ T-cell responses may still be elicited in the context of optimal...... the first period of life and provide a pertinent alternative in infant vaccinology. To address this, infant mice were vaccinated with three different adenoviral vectors and the CD8+ T-cell response after early life vaccination was explored. We assessed the frequency, polyfunctionality and in vivo...... cytotoxicity of the elicited memory CD8+ T cells, as well as the potential of these cells to respond to secondary infections and confer protection. We further tested the impact of maternal immunity against our replication-deficient adenoviral vector during early life vaccination. Overall, our results indicate...

  20. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  1. Nuclear deterrence in the 21. century. Lessons from the cold war for a new era of strategic piracy

    International Nuclear Information System (INIS)

    Delpech, Therese

    2013-01-01

    Deterrence remains a primary doctrine for dealing with the threat of nuclear weapons in the 21. century. In this book, the author calls for a renewed intellectual effort to address the relevance of the traditional concepts of first strike, escalation, extended deterrence, and other Cold War-era strategies in today's complex world of additional superpowers (e.g., China), smaller nuclear powers (e.g., Pakistan and North Korea), and non-state actors (e.g., terrorists), as well as the extension of defense and security analysis to new domains, such as outer space and cyber-space. The author draws upon the lessons of the bipolar Cold War era to illustrate new concepts of deterrence that properly account for the variety of nuclear actors, the proliferation of missiles and thermonuclear weapons, and the radical ideologies that all are part of the nuclear scene today. Contents: 1- Introduction, 2 - Why Is This Subject Important?, 3 - Concepts, 4 - Lessons from Crises, 5 - The Age of Small Powers, 6 - Ahead of Us: The Big Piracy Game?, 7 - Space and Cyber-deterrence

  2. Preventing radiological threat in the Republic of Azerbaijan

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2005-01-01

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  3. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  4. Quantum Man: Richard Feynman's Life in Science

    CERN Document Server

    CERN. Geneva

    2011-01-01

    It took a man who was willing to break all the rules to tame a theory that breaks all the rules. This talk will be based on my new book Quantum Man: Richard Feynman's life in science. I will try and present a scientific overview of the contributions of Richard Feynman, as seen through the arc of his fascinating life. From Quantum Mechanics to Antiparticles, from Rio de Janeiro to Los Alamos, a whirlwind tour will provide insights into the character, life and accomplishments of one of the 20th centuries most important scientists, and provide an object lesson in scientific integrity.

  5. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  6. Experience in Use of Project Method during Technology Lessons in Secondary Schools of the USA

    Science.gov (United States)

    Sheludko, Inna

    2015-01-01

    The article examines the opportunities and prospects for the use of experience of project method during "technology lessons" in US secondary schools, since the value of project technology implementation experience into the educational process in the USA for ensuring holistic development of children, preparing them for adult life, in…

  7. Moving from ethnography to epidemiology: lessons learned in Appalachia

    Science.gov (United States)

    Kuzara, Jennifer; Copeland, William E.; Costello, E. Jane; Angold, Adrian; Worthman, Carol M.

    2009-01-01

    Background Anthropologists are beginning to translate insights from ethnography into tools for population studies that assess the role of culture in human behavior, biology, and health. Aim We describe several lessons learned in the creation and administration of an ethnographically-based instrument to assess the life course perspectives of Appalachian youth, the Life Trajectory Interview for Youth (LTI-Y). Then, we explore the utility of the LTI-Y in predicting depressive affect, controlling for prior depressed mood and severe negative life events throughout the life course. Subjects and methods In a sample of 319 youth (190 White, 129 Cherokee), we tested the association between depressive affect and two domains of the LTI-Y - life course barriers and milestones. Longitudinal data on previous depressed mood and negative life events were included in the model. Results The ethnographically-based scales of life course barriers and milestones were associated with unique variance in depressed mood, together accounting for 11% of the variance in this outcome. Conclusion When creating ethnographically-based instruments, it is important to strike a balance between detailed, participant-driven procedures and the analytic needs of hypothesis testing. Ethnographically-based instruments have utility for predicting health outcomes in longitudinal studies. PMID:19353406

  8. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  9. Life Satisfaction and Hemodynamic Reactivity to Mental Stress.

    Science.gov (United States)

    Schwerdtfeger, Andreas; Gaisbachgrabner, Kerstin; Traunmüller, Claudia

    2017-06-01

    Satisfaction with life has been considered a health-protective variable, which could impact cardiovascular morbidity and mortality. However, few studies have examined the physiological pathways involved in the potentially salutary effect of life satisfaction. It was hypothesized that life satisfaction should be associated with a cardiovascular response profile that signals challenge (i.e., higher cardiac output, lower peripheral resistance), rather than threat during a mental stress task. A sample of 75 healthy, medication-free men without clinical signs of psychological disorders who worked full-time and occupied highly demanding positions participated in this study. They performed two mental stress tasks (n-back) with varying degrees of difficulty. The tasks were embedded between a baseline and a recovery period. Cardiovascular and hemodynamic variables (heart rate, blood pressure, cardiac output, total peripheral resistance) were recorded by means of impedance cardiography. Individuals who were more satisfied with their life displayed higher cardiac output and lower peripheral resistance levels during the stress tasks, indicating a challenge rather than a threat profile. Findings were robust when controlled for physical activity, smoking, age, and depressive symptoms. Life satisfaction could be positively correlated with beneficial hemodynamic stress reactivity, indicating that individuals with higher levels of life satisfaction can more adaptively cope with stress. Increased cardiac output and decreased peripheral resistance during stress may constitute one route through which life satisfaction can benefit health.

  10. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  11. Lesson study in prospective mathematics teacher education: didactic and paradidactic technology in the post-lesson reflection

    DEFF Research Database (Denmark)

    Rasmussen, Klaus

    2016-01-01

    This paper presents a detailed analysis of the post-lesson reflection, carried out in the context of eight cases of lesson study conducted by teams of Danish, lower secondaryprospective teachers and their supervisors. The participants, representing different institutions, were all new to the less...... and concern to the whole profession of mathematics teachers and the analysis adds to our insight into the potential of lesson study in prospective education as a meeting place where pertinent actors contribute to the expansion and dissemination of shared professional knowledge......This paper presents a detailed analysis of the post-lesson reflection, carried out in the context of eight cases of lesson study conducted by teams of Danish, lower secondaryprospective teachers and their supervisors. The participants, representing different institutions, were all new to the lesson...... study format. Nevertheless, it is demonstrated how their interaction shape the development of discourse about mathematical learning. The anthropological theory of the didactic is employed as the theoretical approach to analyse the mathematical and primarily didactical praxeologies developed...

  12. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  13. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  14. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  15. Stimulus threat and exposure context modulate the effect of mere exposure on approach behaviors

    Directory of Open Access Journals (Sweden)

    Steven Young

    2016-11-01

    Full Text Available Mere-exposure research has found that initially neutral objects made familiar are preferred relative to novel objects. Recent work extends these preference judgments into the behavioral domain by illustrating that mere exposure prompts approach-oriented behavior toward familiar stimuli. However, no investigations have examined the effect of mere exposure on approach-oriented behavior toward threatening stimuli. The current work examines this issue and also explores how exposure context interacts with stimulus threat to influence behavioral tendencies. In two experiments participants were presented with both mere-exposed and novel stimuli and approach speed was assessed. In the first experiment, when stimulus threat was presented in a homogeneous format (i.e., participants viewed exclusively neutral or threatening stimuli, mere-exposure potentiated approach behaviors for both neutral and threatening stimuli. However, in the second experiment, in which stimulus threat was presented in a heterogeneous fashion (i.e., participants viewed both neutral and threatening stimuli, mere exposure facilitated approach only for initially neutral stimuli. These results suggest that mere-exposure effects on approach behaviors are highly context sensitive and depend on both stimulus valence and exposure context. Further implications of these findings for the mere-exposure literature are discussed.

  16. Stimulus Threat and Exposure Context Modulate the Effect of Mere Exposure on Approach Behaviors.

    Science.gov (United States)

    Young, Steven G; Jones, Isaiah F; Claypool, Heather M

    2016-01-01

    Mere-exposure (ME) research has found that initially neutral objects made familiar are preferred relative to novel objects. Recent work extends these preference judgments into the behavioral domain by illustrating that mere exposure prompts approach-oriented behavior toward familiar stimuli. However, no investigations have examined the effect of mere exposure on approach-oriented behavior toward threatening stimuli. The current work examines this issue and also explores how exposure context interacts with stimulus threat to influence behavioral tendencies. In two experiments participants were presented with both mere-exposed and novel stimuli and approach speed was assessed. In the first experiment, when stimulus threat was presented in a homogeneous format (i.e., participants viewed exclusively neutral or threatening stimuli), ME potentiated approach behaviors for both neutral and threatening stimuli. However, in the second experiment, in which stimulus threat was presented in a heterogeneous fashion (i.e., participants viewed both neutral and threatening stimuli), mere exposure facilitated approach only for initially neutral stimuli. These results suggest that ME effects on approach behaviors are highly context sensitive and depend on both stimulus valence and exposure context. Further implications of these findings for the ME literature are discussed.

  17. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  18. Altered Fetal Skeletal Muscle Nutrient Metabolism Following an Adverse In Utero Environment and the Modulation of Later Life Insulin Sensitivity

    Directory of Open Access Journals (Sweden)

    Kristyn Dunlop

    2015-02-01

    Full Text Available The importance of the in utero environment as a contributor to later life metabolic disease has been demonstrated in both human and animal studies. In this review, we consider how disruption of normal fetal growth may impact skeletal muscle metabolic development, ultimately leading to insulin resistance and decreased insulin sensitivity, a key precursor to later life metabolic disease. In cases of intrauterine growth restriction (IUGR associated with hypoxia, where the fetus fails to reach its full growth potential, low birth weight (LBW is often the outcome, and early in postnatal life, LBW individuals display modifications in the insulin-signaling pathway, a critical precursor to insulin resistance. In this review, we will present literature detailing the classical development of insulin resistance in IUGR, but also discuss how this impaired development, when challenged with a postnatal Western diet, may potentially contribute to the development of later life insulin resistance. Considering the important role of the skeletal muscle in insulin resistance pathogenesis, understanding the in utero programmed origins of skeletal muscle deficiencies in insulin sensitivity and how they may interact with an adverse postnatal environment, is an important step in highlighting potential therapeutic options for LBW offspring born of pregnancies characterized by placental insufficiency.

  19. Altered fetal skeletal muscle nutrient metabolism following an adverse in utero environment and the modulation of later life insulin sensitivity.

    Science.gov (United States)

    Dunlop, Kristyn; Cedrone, Megan; Staples, James F; Regnault, Timothy R H

    2015-02-12

    The importance of the in utero environment as a contributor to later life metabolic disease has been demonstrated in both human and animal studies. In this review, we consider how disruption of normal fetal growth may impact skeletal muscle metabolic development, ultimately leading to insulin resistance and decreased insulin sensitivity, a key precursor to later life metabolic disease. In cases of intrauterine growth restriction (IUGR) associated with hypoxia, where the fetus fails to reach its full growth potential, low birth weight (LBW) is often the outcome, and early in postnatal life, LBW individuals display modifications in the insulin-signaling pathway, a critical precursor to insulin resistance. In this review, we will present literature detailing the classical development of insulin resistance in IUGR, but also discuss how this impaired development, when challenged with a postnatal Western diet, may potentially contribute to the development of later life insulin resistance. Considering the important role of the skeletal muscle in insulin resistance pathogenesis, understanding the in utero programmed origins of skeletal muscle deficiencies in insulin sensitivity and how they may interact with an adverse postnatal environment, is an important step in highlighting potential therapeutic options for LBW offspring born of pregnancies characterized by placental insufficiency.

  20. Unique neurobiology during the sensitive period for attachment produces distinctive infant trauma processing

    Science.gov (United States)

    Opendak, Maya; Sullivan, Regina M.

    2016-01-01

    Background Trauma has neurobehavioral effects when experienced at any stage of development, but trauma experienced in early life has unique neurobehavioral outcomes related to later life psychiatric sequelae. Recent evidence has further highlighted the context of infant trauma as a critical variable in determining its immediate and enduring consequences. Trauma experienced from an attachment figure, such as occurs in cases of caregiver child maltreatment, is particularly detrimental. Methods Using data primarily from rodent models, we review the literature on the interaction between trauma and attachment in early life, which highlights the role of the caregiver’s presence in engagement of attachment brain circuitry and suppressing threat processing by the amygdala. We then consider how trauma with and without the caregiver produces long-term changes in emotionality and behavior, and suggest that these experiences initiate distinct pathways to pathology. Results Together these data suggest that infant trauma processing and its enduring effects are impacted by both the immaturity of brain areas for processing trauma and the unique functioning of the early-life brain, which is biased toward processing information within the attachment circuitry. Conclusion An understanding of developmental differences in trauma processing as well as the critical role of the caregiver in further altering early life brain processing of trauma is important for developing age-relevant treatment and interventions. Highlights of this article Trauma experienced in early life has been linked with life-long outcomes for mental health through a mechanism that remains unclear. Trauma experienced in the presence of a caregiver has unique consequences. The infant brain is predisposed toward processing information using attachment circuitry rather than threat circuitry. Data from rodent models suggest that repeated trauma in the presence of a caregiver prematurely engages brain areas important

  1. Failure to differentiate between threat-related and positive emotion cues in healthy adults with childhood interpersonal or adult trauma.

    Science.gov (United States)

    Chu, Denise A; Bryant, Richard A; Gatt, Justine M; Harris, Anthony W F

    2016-07-01

    Enhanced threat-related processing is associated with both elevated anxiety and childhood exposure to trauma. Given the paucity of evidence regarding the effects of childhood and adult trauma exposure on subsequent psychophysiological processes in the absence of psychopathology, we investigated the relative impacts of childhood interpersonal and non-interpersonal trauma, as well as adult trauma exposure on neural processing of threat in healthy adults. We measured peak amplitudes of the N170 face-sensitive visual ERP component response to non-conscious and conscious Angry (threat) versus Happy (non-threat, positive) and Neutral (non-threat baseline) faces at temporo-occipital sites (right-T6; left-T5) in 489 psychiatrically asymptomatic adults (aged 18-70 years, 54% women, 94% right-handed). N170 peak amplitude differences between Angry vs Happy or Neutral faces were calculated and subjected to hierarchical multiple regression analysis, with trauma types (childhood interpersonal, childhood non-interpersonal and adult trauma) entered as predictors of interest. After controlling for sociodemographic and health factors, N170 peak amplitudes for non-conscious Angry vs Happy faces were inversely associated with childhood interpersonal trauma at T6 and adult trauma exposure at T5. Post-hoc repeated measures ANOVA indicated that unlike adults without trauma exposure, trauma-exposed adults failed to show significantly reduced N170 responses to Happy relative to Angry faces during non-conscious processing. This suggests that childhood interpersonal and adult trauma exposure are associated with a failure to differentiate between non-threat or positive and threat-related emotion cues. This is consistent with generalised hypervigilance seen in PTSD, and suggests trauma exposure is associated with a generalized heightened responsivity to non-conscious non-threat or positive as well as threat-related emotion cues in psychiatrically healthy adults. Copyright © 2016 Elsevier Ltd

  2. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  3. Sensitivity of lake sturgeon (Acipenser fulvescens) early life stages to 2,3,7,8-tetrachlorodibenzo-P-dioxin and 3,3′,4,4′,5-pentachlorobiphenyl

    Science.gov (United States)

    Tillitt, Donald E.; Buckler, Justin A.; Nicks, Diane; Candrl, James; Claunch, Rachel; Gale, Robert W.; Puglis, Holly J.; Little, Edward E.; Linbo, Tiffany L.; Baker, Mary

    2017-01-01

    The aquatic food web of the Great Lakes has been contaminated with polychlorinated biphenyls (PCBs) since the mid-20th century. Threats of PCB exposures to long-lived species of fish, such as lake sturgeon (Acipenser fulvescens), have been uncertain because of a lack of information on the relative sensitivity of the species. The objective of the present study was to evaluate the sensitivity of early–life stage lake sturgeon to 3,3′,4,4′,5-pentachlorobiphenyl (PCB-126) or 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) exposure. Mortality, growth, morphological and tissue pathologies, swimming performance, and activity levels were used as assessment endpoints. Pericardial and yolk sac edema, tubular heart, yolk sac hemorrhaging, and small size were the most commonly observed pathologies in both TCDD and PCB-126 exposures, beginning as early as 4 d postfertilization, with many of these pathologies occurring in a dose-dependent manner. Median lethal doses for PCB-126 and TCDD in lake sturgeon were 5.4 ng/g egg (95% confidence interval, 3.9–7.4 ng/g egg) and 0.61 ng/g egg (0.47–0.82 ng/g egg), respectively. The resulting relative potency factor for PCB-126 (0.11) was greater than the World Health Organization estimate for fish (toxic equivalency factor = 0.005), suggesting that current risk assessments may underestimate PCB toxicity toward lake sturgeon. Swimming activity and endurance were reduced in lake sturgeon survivors from the median lethal doses at 60 d postfertilization. Threshold and median toxicity values indicate that lake sturgeon, like other Acipenser species, are more sensitive to PCB and TCDD than the other genus of sturgeon, Scaphirhynchus, found in North America. Indeed, lake sturgeon populations in the Great Lakes and elsewhere are susceptible to PCB/TCDD-induced developmental toxicity in embryos and reductions in swimming performance.

  4. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  5. Learning from history, predicting the future: the UK Dutch elm disease outbreak in relation to contemporary tree disease threats

    Science.gov (United States)

    Potter, Clive; Harwood, Tom; Knight, Jon; Tomlinson, Isobel

    2011-01-01

    Expanding international trade and increased transportation are heavily implicated in the growing threat posed by invasive pathogens to biodiversity and landscapes. With trees and woodland in the UK now facing threats from a number of disease systems, this paper looks to historical experience with the Dutch elm disease (DED) epidemic of the 1970s to see what can be learned about an outbreak and attempts to prevent, manage and control it. The paper draws on an interdisciplinary investigation into the history, biology and policy of the epidemic. It presents a reconstruction based on a spatial modelling exercise underpinned by archival research and interviews with individuals involved in the attempted management of the epidemic at the time. The paper explores what, if anything, might have been done to contain the outbreak and discusses the wider lessons for plant protection. Reading across to present-day biosecurity concerns, the paper looks at the current outbreak of ramorum blight in the UK and presents an analysis of the unfolding epidemiology and policy of this more recent, and potentially very serious, disease outbreak. The paper concludes by reflecting on the continuing contemporary relevance of the DED experience at an important juncture in the evolution of plant protection policy. PMID:21624917

  6. Ignoring correlation in uncertainty and sensitivity analysis in life cycle assessment: what is the risk?

    Energy Technology Data Exchange (ETDEWEB)

    Groen, E.A., E-mail: Evelyne.Groen@gmail.com [Wageningen University, P.O. Box 338, Wageningen 6700 AH (Netherlands); Heijungs, R. [Vrije Universiteit Amsterdam, De Boelelaan 1105, Amsterdam 1081 HV (Netherlands); Leiden University, Einsteinweg 2, Leiden 2333 CC (Netherlands)

    2017-01-15

    Life cycle assessment (LCA) is an established tool to quantify the environmental impact of a product. A good assessment of uncertainty is important for making well-informed decisions in comparative LCA, as well as for correctly prioritising data collection efforts. Under- or overestimation of output uncertainty (e.g. output variance) will lead to incorrect decisions in such matters. The presence of correlations between input parameters during uncertainty propagation, can increase or decrease the the output variance. However, most LCA studies that include uncertainty analysis, ignore correlations between input parameters during uncertainty propagation, which may lead to incorrect conclusions. Two approaches to include correlations between input parameters during uncertainty propagation and global sensitivity analysis were studied: an analytical approach and a sampling approach. The use of both approaches is illustrated for an artificial case study of electricity production. Results demonstrate that both approaches yield approximately the same output variance and sensitivity indices for this specific case study. Furthermore, we demonstrate that the analytical approach can be used to quantify the risk of ignoring correlations between input parameters during uncertainty propagation in LCA. We demonstrate that: (1) we can predict if including correlations among input parameters in uncertainty propagation will increase or decrease output variance; (2) we can quantify the risk of ignoring correlations on the output variance and the global sensitivity indices. Moreover, this procedure requires only little data. - Highlights: • Ignoring correlation leads to under- or overestimation of the output variance. • We demonstrated that the risk of ignoring correlation can be quantified. • The procedure proposed is generally applicable in life cycle assessment. • In some cases, ignoring correlation has a minimal effect on decision-making tools.

  7. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  8. Specificity and sensitivity of Spence Children’s Anxiety Scale and Child Anxiety Life Interference Scale

    DEFF Research Database (Denmark)

    Arendt, Kristian Bech; Thastum, Mikael

    of such questionnaires at identifying anxiety diagnoses compared to structured diagnostic interviews. Aim: The present study examines the specificity and sensitivity of two widely used child and parent report questionnaires of child anxiety symptoms and interference (Spence Children’s Anxiety Scale [SCAS C/P] and Child...... Anxiety Life Interference Scale [CALIS C/P]) based on a “golden standard” diagnostic interview (Anxiety Disorder Interview Schedule [ADIS C/P]). Methods Participants The sample consisted of 453 youths between the age of seven and sixteen years and their parents. The sample was combined from five prior....... Results and conclusions: Child and parent versions of SCAS and CALIS demonstrate acceptable AUC on most analyses, but only mother reports on recovery from all diagnoses demonstrate acceptable sensitivity and specificity as well. Mother report generally seem to be better at identifying recovery from...

  9. Designing a mobile game to thwarts malicious IT threats: A phishing threat avoidance perspective

    OpenAIRE

    Arachchilage, Nalin Asanka Gamagedara; Tarhini, Ali; Love, Steve

    2015-01-01

    Phishing is an online identity theft, which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Game based education is becoming more and more popular. This paper introduces a mobile game prototype for the android platform based on a story, which simplifies and exaggerates real life. The elements of a game design framework for avoiding phishing attacks were used to address the game ...

  10. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  11. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  12. The individual teacher in lesson study collaboration

    DEFF Research Database (Denmark)

    Skott, Charlotte Krog; Møller, Hanne

    2017-01-01

    used in lesson study research. Design/methodology/approach The authors use collective case studies. By being participant observers the authors provide detailed descriptions of two selected teachers’ lived experiences of lesson study collaboration. In addition to gain first-hand insights, the authors...... in the participation of each of the two teachers during a two-year lesson study project. By comparing these shifts the authors identify significant conditions for their individual learning. Research limitations/implications Although the study is small scale, both the insights into the different ways in which teachers...... participated and the theoretical insights might be valuable for other lesson study research approaches. Practical implications This paper provides valuable insights into conditions that might influence teachers’ participation in lesson study activities, especially in cultures with little experience of lesson...

  13. Neural responses to threat and reward interact to predict stress-related problem drinking: A novel protective role of the amygdala

    Science.gov (United States)

    2012-01-01

    Background Research into neural mechanisms of drug abuse risk has focused on the role of dysfunction in neural circuits for reward. In contrast, few studies have examined the role of dysfunction in neural circuits of threat in mediating drug abuse risk. Although typically regarded as a risk factor for mood and anxiety disorders, threat-related amygdala reactivity may serve as a protective factor against substance use disorders, particularly in individuals with exaggerated responsiveness to reward. Findings We used well-established neuroimaging paradigms to probe threat-related amygdala and reward-related ventral striatum reactivity in a sample of 200 young adult students from the ongoing Duke Neurogenetics Study. Recent life stress and problem drinking were assessed using self-report. We found a significant three-way interaction between threat-related amygdala reactivity, reward-related ventral striatum reactivity, and recent stress, wherein individuals with higher reward-related ventral striatum reactivity exhibit higher levels of problem drinking in the context of stress, but only if they also have lower threat-related amygdala reactivity. This three-way interaction predicted both contemporaneous problem drinking and problem drinking reported three-months later in a subset of participants. Conclusions These findings suggest complex interactions between stress and neural responsiveness to both threat and reward mediate problem drinking. Furthermore, they highlight a novel protective role for threat-related amygdala reactivity against drug use in individuals with high neural reactivity to reward. PMID:23151390

  14. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  15. Grief: Lessons from the Past, Visions for the Future

    Directory of Open Access Journals (Sweden)

    Colin Murray Parkes

    2010-09-01

    Full Text Available Over the last millennium patterns of mortality have changed and have determined who grieves and how. At all times grief has been recognised as a threat to physical and mental health. More recently the scientific study of bereavement has enabled us to quantify such effects and to develop theoretical explanations for them. This paper reviews our evolving understanding of grief, focusing especially on the developments in research, theory and practice that have taken place during the twentieth century. Wars and similar conflicts are associated with repression of grief but methods of helping by facilitating its expression, which were introduced during the two World Wars are less needed and effective at other times. In recent years more attention has been paid to the social context in which grief arises and, particularly, to the nature of the attachments which precede and influence the reaction to bereavement and to other traumatic life events. At the same time a range of caring resources have become available and acceptable to bereaved people and the results of scientific evaluation of these give promise that we are moving towards an era in which more sensitive and appropriate care will be provided to the bereaved by both voluntary and professional caregivers.

  16. What Happens at the Lesson Start?

    Science.gov (United States)

    Saloviita, Timo

    2016-01-01

    Transitional periods, such as lesson starts, are necessary steps from one activity to another, but they also compete with time for actual learning. The aim of the present study was to replicate a previous pilot study on lesson starts and explore possible disturbances. In total, 130 lesson starts in Finnish basic education in grades 1-9 were…

  17. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  18. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  19. Longitudinal Changes in Behavioral Approach System Sensitivity and Brain Structures Involved in Reward Processing during Adolescence

    Science.gov (United States)

    Urosevic, Snezana; Collins, Paul; Muetzel, Ryan; Lim, Kelvin; Luciana, Monica

    2012-01-01

    Adolescence is a period of radical normative changes and increased risk for substance use, mood disorders, and physical injury. Researchers have proposed that increases in reward sensitivity (i.e., sensitivity of the behavioral approach system [BAS]) and/or increases in reactivity to all emotional stimuli (i.e., reward and threat sensitivities)…

  20. Lesson study i Danmark?

    DEFF Research Database (Denmark)

    Mogensen, Arne

    2009-01-01

    Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning.......Der beskrives et japansk lesson study forløb, og det diskuteres i hvilket omfang, de gode japanske erfaringer kan overføres til dansk matematikundervisning....

  1. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  2. Flower opening and vase life of gladiolus cultivars: the sensitivity to ethylene and the carbohydrate content

    Directory of Open Access Journals (Sweden)

    Lucas Cavalcante da Costa

    2016-08-01

    Full Text Available Vase life is one of the most important characteristics in the quality of cut flowers. The carbohydrate content of petals from each cultivar can be a decisive factor to vase life of gladiolus flowers. Despite exposure to ethylene does not affect the life of open florets of gladiolus flowers, it may reduce the flower’s commercial life due the occurrence of flower buds abortion. This study thus aimed to evaluate the flower opening and the vase life of gladiolus flowers according to ethylene sensitivity and carbohydrate content of each cultivar. The gladiolus cultivars used in Experiment I were  ‘Amsterdam’, ‘Blue Frost’, ‘Gold Field’, ‘Green Star’, ‘Jester’, ‘Lavender’, ‘Red Beauty’, ‘Rose Supreme’, ‘Traderhorn’, and ‘Verônica’. Stems were stored in airtight chambers and exposed to the ethylene concentrations of 0, 0.1, 1.0, 10, 100, and 1000 μL L−1 for 24 h. Subsequently, flower stem were placed in a test tube with distilled water when were evaluated for percentage of flower opening and vase life. In Experiment II, three cultivars (‘Amsterdam’, ‘Red Beauty’, and ‘Verônica’ were chosen based on the lowest, medium, and highest vase life in Experiment I, respectively. Total soluble sugars, reducing sugars, and starch contents were evaluated in five flower developmental stages. No effect of ethylene on the flower opening or alterations in flower opening between cultivars. The vase life of gladiolus flowers differed between cultivars regardless of ethylene action. ‘Verônica’ and ‘Amsterdam’, which had the highest and lowest vase life, respectively, differed as to the total soluble sugar content. Ethylene does not influence the flower opening or vase life of the gladiolus cultivars studied. In these cultivars, the maintenance of flower opening is attributed to total soluble sugars content, which, in turn, is a major determinant of the vase life.

  3. A major QTL affects temperature sensitive adult lethality and inbreeding depression in life span in Drosophila melanogaster.

    DEFF Research Database (Denmark)

    Vermeulen, Corneel J.; Bijlsma, R.; Loeschcke, Volker

    2008-01-01

    of inbreeding effects in specific traits, such as age-specific mortality and life span, provide a good starting point, as a limited set of genes is expected to be involved. Results Here we report on a QTL mapping study on inbreeding related and temperature sensitive lethality in male Drosophila melanogaster...... and the molecular properties of genes that give rise to or modulate its deleterious effects is lacking. These questions warrant the detailed study of genetic loci giving rise to inbreeding depression. However, the complex and polygenic nature of general inbreeding depression makes this a daunting task. Study...... simple, being due mainly to a single recessive QTL on the left arm of chromosome 2. This locus colocalised with a QTL that conditioned variation in female life span, acting as an overdominant locus for this trait. Male life span was additionally affected by variation at the X-chromosome. Conclusion...

  4. Does nitrate deposition following astrophysical ionizing radiation events pose an additional threat to amphibians?

    OpenAIRE

    Thomas, Brian C.; Honeyman, Michelle D.

    2008-01-01

    It is known that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an add...

  5. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  6. St. Louis FUSRAP Lessons Learned

    International Nuclear Information System (INIS)

    Eberlin, J.; Williams, D.; Mueller, D.

    2003-01-01

    The purpose of this paper is to present lessons learned from fours years' experience conducting Remedial Investigation and Remedial Action activities at the St. Louis Downtown Site (SLDS) under the Formerly Utilized Sites Remedial Action Program (FUSRAP). Many FUSRAP sites are experiencing challenges conducting Remedial Actions within forecasted volume and budget estimates. The St. Louis FUSRAP lessons learned provide insight to options for cost effective remediation at FUSRAP sites. The lessons learned are focused on project planning (budget and schedule), investigation, design, and construction

  7. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  8. Sensitivity analysis in a life cycle assessment of an aged red wine production from Catalonia, Spain.

    Science.gov (United States)

    Meneses, M; Torres, C M; Castells, F

    2016-08-15

    Sustainability in agriculture and food processing is an issue with a clear growing interest; especially in products were consumers have particular awareness regarding its environmental profile. This is the case of wine industry depending on grape production, winemaking and bottling. Also viticulture and generally agricultural production is significantly affected by climate variations. The aim of this article is to determine the environmental load of an aged red wine from a winery in Catalonia, Spain, over its entire life cycle, including sensitivity analysis of the main parameters related to the cultivation, vinification and bottling. The life cycle assessment (LCA) methodology is used for the environmental analysis. In a first step, life cycle inventory (LCI) data were collected by questionnaires and interviews with the winemaker, all data are actual operating data and all the stages involved in the production have been taken into account (viticulture, vinification, bottling and the disposal subsystem). Data were then used to determine the environmental profile by a life cycle impact assessment using the ReCiPe method. Annual variability in environmental performance, stresses the importance of including timeline analysis in the wine sector. Because of that this study is accompanied with a sensitivity analysis carried out by a Monte Carlo simulation that takes into account the uncertainty and variability of the parameters used. In this manner, the results are presented with confidence intervals to provide a wider view of the environmental issues derived from the activities of the studied wine estate regardless of the eventualities of a specific harvesting year. Since the beverage packaging has an important influence in this case, a dataset for the production of green glass was adapted to reflect the actual recycling situation in Spain. Furthermore, a hypothetical variation of the glass-recycling rate in the glass production completes this article, as a key variable

  9. A Relevant Lesson: Hitler Goes to the Mall

    Science.gov (United States)

    Gerwin, David

    2003-01-01

    A "Motivation" eliciting the "Aim" of each lesson initiates each lesson in the orthodox "developmental lesson-plan" that has dominated classroom instruction in NYC public schools for at least the past half-century. An action-research study of 38 lesson-plans (over 5 each from 5 teachers) drawn from student-teaching…

  10. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  11. Eyeborn – restored quality of life for the visually impaired

    CSIR Research Space (South Africa)

    Du Preez, WB

    2006-07-01

    Full Text Available of life. The product was developed with funding from the South African Innovation Fund. This paper shares some of the lessons learnt during the commercialisation of the product and the technology transfer to a South African small enterprise, Cerdak (Pty...

  12. Lessons learned on stakeholder issues in decommissioning

    International Nuclear Information System (INIS)

    O'Sullivan, P.; Pescatore, C.

    2008-01-01

    Issues of public concern during decommissioning and dismantling (D and D) are partly the same and partly different from those of the preceding phases (planning, construction and operation). While in the course of construction and operation the main challenges include meeting expectations of a higher quality of life, accommodating a growing population, mitigating construction nuisances, and assuring the safe operation of the facility, the main concerns in the D and D phase are decreasing employment rate, the eventual reduction of revenues for the municipality, the future use of the affected land and negative social impacts (e.g., out-migration). The decommissioning phase is characterised by heterogeneity of stakeholder interests and values, difficulties of reaching consensus or compromise, and difficulties in connection with the harmonization of energy production, environmental protection and sustainable socio-economic development considerations. Typically, there might also be tensions between local and regional decisions. As in other phases, the building of trust between stakeholder is crucial from the point of view of conflict management, and social lessons learnt from the siting and developments of nuclear facilities are widely applicable in the field of D and D as well. A review is presented of major lessons to be learnt from NEA activities in the field of decommissioning and stakeholder involvement. (author)

  13. Lessons learned on stakeholder issues in decommissioning

    Energy Technology Data Exchange (ETDEWEB)

    O' Sullivan, P.; Pescatore, C. [OECD Nuclear Energy Agency, 92 - Issy les Moulineaux (France)

    2008-07-01

    Issues of public concern during decommissioning and dismantling (D and D) are partly the same and partly different from those of the preceding phases (planning, construction and operation). While in the course of construction and operation the main challenges include meeting expectations of a higher quality of life, accommodating a growing population, mitigating construction nuisances, and assuring the safe operation of the facility, the main concerns in the D and D phase are decreasing employment rate, the eventual reduction of revenues for the municipality, the future use of the affected land and negative social impacts (e.g., out-migration). The decommissioning phase is characterised by heterogeneity of stakeholder interests and values, difficulties of reaching consensus or compromise, and difficulties in connection with the harmonization of energy production, environmental protection and sustainable socio-economic development considerations. Typically, there might also be tensions between local and regional decisions. As in other phases, the building of trust between stakeholder is crucial from the point of view of conflict management, and social lessons learnt from the siting and developments of nuclear facilities are widely applicable in the field of D and D as well. A review is presented of major lessons to be learnt from NEA activities in the field of decommissioning and stakeholder involvement. (author)

  14. Sensitivity analysis in a life cycle assessment of an aged red wine production from Catalonia, Spain

    Energy Technology Data Exchange (ETDEWEB)

    Meneses, M., E-mail: montse.meneses@uab.cat [Universitat Autònoma de Barcelona, Systems Engineering and Telecomunication Department, ESE, 08193 Bellaterra (Spain); Torres, C.M.; Castells, F. [Universitat Rovira i Virgili, Departament d' Enginyeria Química, Environmental Analysis and Management Group, AGA, Av. Paisos Catalans 26, 43007 Tarragona (Spain)

    2016-08-15

    Sustainability in agriculture and food processing is an issue with a clear growing interest; especially in products were consumers have particular awareness regarding its environmental profile. This is the case of wine industry depending on grape production, winemaking and bottling. Also viticulture and generally agricultural production is significantly affected by climate variations. The aim of this article is to determine the environmental load of an aged red wine from a winery in Catalonia, Spain, over its entire life cycle, including sensitivity analysis of the main parameters related to the cultivation, vinification and bottling. The life cycle assessment (LCA) methodology is used for the environmental analysis. In a first step, life cycle inventory (LCI) data were collected by questionnaires and interviews with the winemaker, all data are actual operating data and all the stages involved in the production have been taken into account (viticulture, vinification, bottling and the disposal subsystem). Data were then used to determine the environmental profile by a life cycle impact assessment using the ReCiPe method. Annual variability in environmental performance, stresses the importance of including timeline analysis in the wine sector. Because of that this study is accompanied with a sensitivity analysis carried out by a Monte Carlo simulation that takes into account the uncertainty and variability of the parameters used. In this manner, the results are presented with confidence intervals to provide a wider view of the environmental issues derived from the activities of the studied wine estate regardless of the eventualities of a specific harvesting year. Since the beverage packaging has an important influence in this case, a dataset for the production of green glass was adapted to reflect the actual recycling situation in Spain. Furthermore, a hypothetical variation of the glass-recycling rate in the glass production completes this article, as a key variable

  15. Sensitivity analysis in a life cycle assessment of an aged red wine production from Catalonia, Spain

    International Nuclear Information System (INIS)

    Meneses, M.; Torres, C.M.; Castells, F.

    2016-01-01

    Sustainability in agriculture and food processing is an issue with a clear growing interest; especially in products were consumers have particular awareness regarding its environmental profile. This is the case of wine industry depending on grape production, winemaking and bottling. Also viticulture and generally agricultural production is significantly affected by climate variations. The aim of this article is to determine the environmental load of an aged red wine from a winery in Catalonia, Spain, over its entire life cycle, including sensitivity analysis of the main parameters related to the cultivation, vinification and bottling. The life cycle assessment (LCA) methodology is used for the environmental analysis. In a first step, life cycle inventory (LCI) data were collected by questionnaires and interviews with the winemaker, all data are actual operating data and all the stages involved in the production have been taken into account (viticulture, vinification, bottling and the disposal subsystem). Data were then used to determine the environmental profile by a life cycle impact assessment using the ReCiPe method. Annual variability in environmental performance, stresses the importance of including timeline analysis in the wine sector. Because of that this study is accompanied with a sensitivity analysis carried out by a Monte Carlo simulation that takes into account the uncertainty and variability of the parameters used. In this manner, the results are presented with confidence intervals to provide a wider view of the environmental issues derived from the activities of the studied wine estate regardless of the eventualities of a specific harvesting year. Since the beverage packaging has an important influence in this case, a dataset for the production of green glass was adapted to reflect the actual recycling situation in Spain. Furthermore, a hypothetical variation of the glass-recycling rate in the glass production completes this article, as a key variable

  16. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  17. Are insecure jobs as bad for mental health and occupational commitment as unemployment? Equal threat or downward spiral

    Directory of Open Access Journals (Sweden)

    Kathleen Otto

    2014-01-01

    Full Text Available We investigated the significance of unemployment and job insecurity for mental health (self-esteem; life satisfaction and occupational commitment (occupational self-efficacy; affective occupational commitment comparing the "equal threat" assumption with the "downward spiral" assumption. Whereas the equal threat model suggests that unemployment and (perceived insecure employment are similarly threatening phenomena, the downward spiral model assumes that there might be a spectrum of employment insecurity, ranging from secure employment to long-term unemployment, that is associated with decreasing mental health and occupational commitment. Controlling for socio-demographic background variables and personality traits, results of ANCOVAs, in which we distinguished between workers who were (more or less securely employed and those who were either insecurely employed or short- or long-term unemployed revealed that the insecurely employed workers were no better off than those who were (short-term unemployed - in line with the equal threat hypothesis. Only for occupational self-efficacy did we find some support for the downward spiral model.

  18. Beautiful Beads: A Lesson in Making Beads with Friendly Clay. AMACO[R] Lesson.

    Science.gov (United States)

    Gamble, Harriet; Gamble, David

    This lesson resource includes a brief summary of the history of bead making and historic fascination with beads as adornment. A focus on design elements, color theory, craftsmanship, and technical skill in bead making is encouraged. The plan includes lesson goals and objectives; background preparation; a glossary of terms; a list of supplies; and…

  19. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  20. Thomas Edison's Inventions in the 1900s and Today: From "New" to You! [Lesson Plan].

    Science.gov (United States)

    2002

    The purpose of this lesson is to familiarize students with life and technology around 1900 so that they can better understand how Thomas Edison and his many inventions influenced both. Without some understanding of Edison's time, it is unclear just how significant an impact Edison had on the world, both then and now. While the incandescent light…

  1. Disaster Preparation and Recovery: Lessons from Research on Resilience in Human Development

    Directory of Open Access Journals (Sweden)

    Ann S. Masten

    2008-06-01

    Full Text Available Four decades of theory and research on resilience in human development have yielded informative lessons for planning disaster response and recovery. In developmental theory, resilience following disaster could take multiple forms, including stress resistance, recovery, and positive transformation. Empirical findings suggest that fundamental adaptive systems play a key role in the resilience of young people facing diverse threats, including attachment, agency, intelligence, behavior regulation systems, and social interactions with family, peers, school, and community systems. Although human resilience research emphasizes the adaptive well-being of particular individuals, there are striking parallels in resilience theory across the developmental and ecological sciences. Preparing societies for major disasters calls for the integration of human research on resilience with the theory and knowledge gained from other disciplines concerned with resilience in complex, dynamic systems, and particularly those systems that interact with human individuals as disaster unfolds.

  2. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  3. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  4. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  5. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  6. Impacts of ocean acidification on marine organisms: quantifying sensitivities and interaction with warming

    Science.gov (United States)

    Kroeker, Kristy J; Kordas, Rebecca L; Crim, Ryan; Hendriks, Iris E; Ramajo, Laura; Singh, Gerald S; Duarte, Carlos M; Gattuso, Jean-Pierre

    2013-01-01

    Ocean acidification represents a threat to marine species worldwide, and forecasting the ecological impacts of acidification is a high priority for science, management, and policy. As research on the topic expands at an exponential rate, a comprehensive understanding of the variability in organisms' responses and corresponding levels of certainty is necessary to forecast the ecological effects. Here, we perform the most comprehensive meta-analysis to date by synthesizing the results of 228 studies examining biological responses to ocean acidification. The results reveal decreased survival, calcification, growth, development and abundance in response to acidification when the broad range of marine organisms is pooled together. However, the magnitude of these responses varies among taxonomic groups, suggesting there is some predictable trait-based variation in sensitivity, despite the investigation of approximately 100 new species in recent research. The results also reveal an enhanced sensitivity of mollusk larvae, but suggest that an enhanced sensitivity of early life history stages is not universal across all taxonomic groups. In addition, the variability in species' responses is enhanced when they are exposed to acidification in multi-species assemblages, suggesting that it is important to consider indirect effects and exercise caution when forecasting abundance patterns from single-species laboratory experiments. Furthermore, the results suggest that other factors, such as nutritional status or source population, could cause substantial variation in organisms' responses. Last, the results highlight a trend towards enhanced sensitivity to acidification when taxa are concurrently exposed to elevated seawater temperature. PMID:23505245

  7. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  8. Responsible conduct by life scientists in an age of terrorism.

    Science.gov (United States)

    Atlas, Ronald M

    2009-09-01

    The potential for dual use of research in the life sciences to be misused for harm raises a range of problems for the scientific community and policy makers. Various legal and ethical strategies are being implemented to reduce the threat of the misuse of research and knowledge in the life sciences by establishing a culture of responsible conduct.

  9. Funds from non-renewable energy resources: Policy lessons from Alaska and Alberta

    International Nuclear Information System (INIS)

    Baena, César; Sévi, Benoît; Warrack, Allan

    2012-01-01

    We document the use of energy natural resource funds in Alaska and Alberta and analyze theirs characteristics for further implementation in resource-rich countries. Such funds allow dealing theoretically with intergenerational equity issues, corruption, and more general institutional problems. The performance of both funds is very different, depending on the management and composition choices but some policy lessons can be drawn from these two examples. Importantly, the role of a public dividend policy is highlighted as a way to bypass corrupted institutions and to enhance quality of life for poorest people. We also emphasize the need to deal with inflation to make the fund sustainable. - Highlights: ► We document the optimal intergenerational energy resource management using funds. ► We use Alaskan and Albertan experiences to provide policy lessons for future implementation of such funds. ► We emphasize the role of a public dividend policy

  10. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  11. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  12. Developing graduate student competency in providing culturally sensitive end of life care in critical care environments - a pilot study of a teaching innovation.

    Science.gov (United States)

    Northam, Holly L; Hercelinskyj, Gylo; Grealish, Laurie; Mak, Anita S

    2015-11-01

    Australia's immigration policy has generated a rich diverse cultural community of staff and patients in critical care environments. Many different cultural perspectives inform individual actions in the context of critical care, including the highly sensitive area of end of life care, with nurses feeling poorly prepared to provide culturally sensitive end of life care. This article describes and evaluates the effectiveness of an educational innovation designed to develop graduate-level critical care nurses' capacity for effective interpersonal communication, as members of a multi-disciplinary team in providing culturally sensitive end-of-life care. A mixed method pilot study was conducted using a curriculum innovation intervention informed by The Excellence in Cultural Experiential Learning and Leadership Program (EXCELL),(1) which is a higher education intervention which was applied to develop the nurses' intercultural communication skills. 12 graduate nursing students studying critical care nursing participated in the study. 42% (n=5) of the participants were from an international background. Information about students' cultural learning was recorded before and after the intervention, using a cultural learning development scale. Student discussions of end of life care were recorded at Week 2 and 14 of the curriculum. The quantitative data was analysed using descriptive statistical analysis and qualitative data was thematically analysed. Students demonstrated an increase in cultural learning in a range of areas in the pre-post surveys including understandings of cultural diversity, interpersonal skills, cross cultural interactions and participating in multicultural groups. Thematic analysis of the end of life discussions revealed an increase in the levels of nurse confidence in approaching end of life care in critical care environments. The EXCELL program provides an effective and supportive educational framework to increase graduate nurses' cultural learning

  13. Childhood quality influences genetic sensitivity to environmental influences across adulthood: A life-course Gene × Environment interaction study.

    Science.gov (United States)

    Keers, Robert; Pluess, Michael

    2017-12-01

    While environmental adversity has been shown to increase risk for psychopathology, individuals differ in their sensitivity to these effects. Both genes and childhood experiences are thought to influence sensitivity to the environment, and these factors may operate synergistically such that the effects of childhood experiences on later sensitivity are greater in individuals who are more genetically sensitive. In line with this hypothesis, several recent studies have reported a significant three-way interaction (Gene × Environment × Environment) between two candidate genes and childhood and adult environment on adult psychopathology. We aimed to replicate and extend these findings in a large, prospective multiwave longitudinal study using a polygenic score of environmental sensitivity and objectively measured childhood and adult material environmental quality. We found evidence for both Environment × Environment and Gene × Environment × Environment effects on psychological distress. Children with a poor-quality material environment were more sensitive to the negative effects of a poor environment as adults, reporting significantly higher psychological distress scores. These effects were further moderated by a polygenic score of environmental sensitivity. Genetically sensitive children were more vulnerable to adversity as adults, if they had experienced a poor childhood environment but were significantly less vulnerable if their childhood environment was positive. These findings are in line with the differential susceptibility hypothesis and suggest that a life course approach is necessary to elucidate the role of Gene × Environment in the development of mental illnesses.

  14. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  15. The Effects of the Japan Bridge Project on Third Graders' Cultural Sensitivity

    Science.gov (United States)

    Meyer, Lindsay; Sherman, Lilian; MaKinster, James

    2006-01-01

    This study examines the effects of the Japan BRIDGE Project, a global education program, on its third grade participants. Characterization of lessons and analysis of student interviews were used to investigate the nature of the curriculum and whether or not student participants were more culturally sensitive due to participation. Results indicate…

  16. Analysing the Integration of Engineering in Science Lessons with the Engineering-Infused Lesson Rubric

    Science.gov (United States)

    Peterman, Karen; Daugherty, Jenny L.; Custer, Rodney L.; Ross, Julia M.

    2017-01-01

    Science teachers are being called on to incorporate engineering practices into their classrooms. This study explores whether the Engineering-Infused Lesson Rubric, a new rubric designed to target best practices in engineering education, could be used to evaluate the extent to which engineering is infused into online science lessons. Eighty lessons…

  17. Hot Under the Collar: Lessons from the 2003 Heatwave in France and the Security Implications for Coping with Environmental Threats in the EU

    Directory of Open Access Journals (Sweden)

    Paul J. Stephenson

    2009-08-01

    Full Text Available In the sweltering temperatures of August 2003 there were over 15,000 fatalities in France, the majority among the elderly. The heatwave (canicule was the greatest natural catastrophe in Europe for 50 years. Political mismanagement contributed to the death toll and government initially to blame medical services. However, other politico-cultural, societal and psychological factors may have contributed to the failure to protect the most vulnerable citizens. This article identifies 20 obstacles (“pathogens” to ensuring effective response in the face of environmental or weather-related threats, distinguishing between state-institutional and individual-community barriers, most of which have a cultural dimension. These factors require greater consideration by policy-makers to improve preparedness for environmental threats in the EU. The case raises questions about crisis management and how best to reduce risk for elderly populations, illustrating the limits of the state in offering social protection through institutionalised solidarity mechanisms, and recognises calls to strengthen community-capacity.

  18. The Years of Uncertainty: Eighth Grade Family Life Education.

    Science.gov (United States)

    Carson, Mary, Ed.; And Others

    The family life sex education unit for eighth graders, "The Years of Uncertainty," consists of a series of daily lesson plans that span a 29-day period of one-hour class sessions. Topics covered are: problem solving, knowledge and attitudes, male and female reproductive systems, conception, pregnancy, birth, birth defects, venereal…

  19. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  20. Alexander Technique Lessons or Acupuncture Sessions for Persons With Chronic Neck Pain: A Randomized Trial.

    Science.gov (United States)

    MacPherson, Hugh; Tilbrook, Helen; Richmond, Stewart; Woodman, Julia; Ballard, Kathleen; Atkin, Karl; Bland, Martin; Eldred, Janet; Essex, Holly; Hewitt, Catherine; Hopton, Ann; Keding, Ada; Lansdown, Harriet; Parrott, Steve; Torgerson, David; Wenham, Aniela; Watt, Ian

    2015-11-03

    Management of chronic neck pain may benefit from additional active self-care-oriented approaches. To evaluate clinical effectiveness of Alexander Technique lessons or acupuncture versus usual care for persons with chronic, nonspecific neck pain. Three-group randomized, controlled trial. (Current Controlled Trials: ISRCTN15186354). U.K. primary care. Persons with neck pain lasting at least 3 months, a score of at least 28% on the Northwick Park Questionnaire (NPQ) for neck pain and associated disability, and no serious underlying pathology. 12 acupuncture sessions or 20 one-to-one Alexander lessons (both 600 minutes total) plus usual care versus usual care alone. NPQ score (primary outcome) at 0, 3, 6, and 12 months (primary end point) and Chronic Pain Self-Efficacy Scale score, quality of life, and adverse events (secondary outcomes). 517 patients were recruited, and the median duration of neck pain was 6 years. Mean attendance was 10 acupuncture sessions and 14 Alexander lessons. Between-group reductions in NPQ score at 12 months versus usual care were 3.92 percentage points for acupuncture (95% CI, 0.97 to 6.87 percentage points) (P = 0.009) and 3.79 percentage points for Alexander lessons (CI, 0.91 to 6.66 percentage points) (P = 0.010). The 12-month reductions in NPQ score from baseline were 32% for acupuncture and 31% for Alexander lessons. Participant self-efficacy improved for both interventions versus usual care at 6 months (P neck pain and associated disability compared with usual care at 12 months. Enhanced self-efficacy may partially explain why longer-term benefits were sustained. Arthritis Research UK.

  1. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  2. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  3. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  4. Matching species traits to projected threats and opportunities from climate change

    Science.gov (United States)

    Garcia, Raquel A; Araújo, Miguel B; Burgess, Neil D; Foden, Wendy B; Gutsche, Alexander; Rahbek, Carsten; Cabeza, Mar

    2014-01-01

    Aim Climate change can lead to decreased climatic suitability within species' distributions, increased fragmentation of climatically suitable space, and/or emergence of newly suitable areas outside present distributions. Each of these extrinsic threats and opportunities potentially interacts with specific intrinsic traits of species, yet this specificity is seldom considered in risk assessments. We present an analytical framework for examining projections of climate change-induced threats and opportunities with reference to traits that are likely to mediate species' responses, and illustrate the applicability of the framework. Location Sub-Saharan Africa. Methods We applied the framework to 195 sub-Saharan African amphibians with both available bioclimatic envelope model projections for the mid-21st century and trait data. Excluded were 500 narrow-ranging species mainly from montane areas. For each of projected losses, increased fragmentation and gains of climate space, we selected potential response-mediating traits and examined the spatial overlap with vulnerability due to these traits. We examined the overlap for all species, and individually for groups of species with different combinations of threats and opportunities. Results In the Congo Basin and arid Southern Africa, projected losses for wide-ranging amphibians were compounded by sensitivity to climatic variation, and expected gains were precluded by poor dispersal ability. The spatial overlap between exposure and vulnerability was more pronounced for species projected to have their climate space contracting in situ or shifting to distant geographical areas. Our results exclude the potential exposure of narrow-ranging species to shrinking climates in the African tropical mountains. Main conclusions We illustrate the application of a framework combining spatial projections of climate change exposure with traits that are likely to mediate species' responses. Although the proposed framework carries several

  5. Attentional bias to threat in children at-risk for emotional disorders: role of gender and type of maternal emotional disorder.

    Science.gov (United States)

    Montagner, Rachel; Mogg, Karin; Bradley, Brendan P; Pine, Daniel S; Czykiel, Marcelo S; Miguel, Euripedes Constantino; Rohde, Luis A; Manfro, Gisele G; Salum, Giovanni A

    2016-07-01

    Previous studies suggested that threat biases underlie familial risk for emotional disorders in children. However, major questions remain concerning the moderating role of the offspring gender and the type of parental emotional disorder on this association. This study addresses these questions in a large sample of boys and girls. Participants were 6-12 years old (at screening) typically developing children participating in the High Risk Cohort Study for Psychiatric Disorders (n = 1280; 606 girls, 674 boys). Children were stratified according to maternal emotional disorder (none; mood disorder; anxiety disorder; comorbid anxiety/mood disorder) and gender. Attention biases were assessed using a dot-probe paradigm with threat, happy and neutral faces. A significant gender-by-parental emotional disorder interaction predicted threat bias, independent of anxiety and depression symptoms in children. Daughters of mothers with an emotional disorder showed increased attention to threat compared with daughters of disorder-free mothers, irrespective of the type of maternal emotion disorder. In contrast, attention bias to threat in boys only occurred in mothers with a non-comorbid mood disorder. No group differences were found for biases for happy-face cues. Gender and type of maternal emotional disorder predict attention bias in disorder-free children. This highlights the need for longitudinal research to clarify whether this pattern of threat-attention bias in children relates to the risk of developing anxiety and mood disorders later in life.

  6. Islamic Moral Life and Threats To It

    Directory of Open Access Journals (Sweden)

    Mohsen Javadi

    2014-06-01

    Full Text Available Abstrak : Islam memahami konsep kehidupan bermoral dalam rangka olah jiwa demi memenuhi syarat menjadi dekat dengan  Tuhan, yang transenden. Untuk itu, alih-alih memahami  realisasi-diri seseorang sebagai alasan untuk mewujudkan atau selaras dengan hasrat dirinya, sebagaimana telah umum diterima di dunia modern, Islam memandang realisasi diri sebagai hasil dari upaya kontrol diri, dengan mengatasi hasrat aktual dan meningkatkan kehendaknya dalam mewujudkan keselarasan antara aspek psikis (jiwa --mencakup aktivitas emosional (hati dan teoritis (nalar dan aspek fisik (raga-- berupa tindakan praktis (aksi. Kondisi yang diperlukan bagi kedua aspek tersebut terumuskan dalam istilah “iman” dan “amal saleh.”Kata kunci: ibadah, moralitas (akhlaq Islam, iman, amal salih, olah jiwa, subjektifisme, relativisme cultural, keraguan, sektarianisme, ketidakadilan.Abstract : Islam comprehends the concept of moral life in the term of cultivate of soul to be eligible for drawing near to the transcendent reality, Allah. For that aim, instead of understanding self-realization as permission to submit to one’s appetites, as commonly accepted in modern world, Islam considers self-realization as fruit of self-control by transcending his actual desires and improving his will to make a harmony between psychial aspect (soul --that covers emotional (heart and theoretical (reason activity - and physical aspect (body – i.e. practical activity (action. The required state of both aspect are formulated in the term “faith” (iman  and “righteous deeds”  (amal Salih. Keywords : worship of God (ibadah, Islamic morality (akhlaq,  faith (iman, righteous deeds (amal salih, cultivation of soul, subjectivism, cultural relativism, doubt, sectarianism, injustice.

  7. Lakes sensitivity to climatic stress – a sociological assessment

    Directory of Open Access Journals (Sweden)

    Lackowska Marta

    2016-12-01

    Full Text Available One of the conditions for effective water resources management in protected areas is local decision makers’ knowledge about potential threats caused by climate changes. Our study, conducted in the UNESCO Biosphere Reserve of Tuchola Forest in Poland, analyses the perception of threats by local stakeholders. Their assessments of the sensitivity of four lakes to the extreme weather events are compared with hydrological studies. The survey shows that the lakes’ varying responses to extreme weather conditions is rarely noticed by ordinary observers. Their perception is usually far from the hydrological facts, which indicates a lack of relevant information or a failure in making it widely accessible and understandable. Moreover, it is rather the human impact, not climate change, which is seen as the biggest threat to the lakes. Insufficient environmental knowledge may hinder the effective protection and management of natural resources, due to bad decisions and lack of the local communities’ support for adaptation and mitigation policies.

  8. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    Directory of Open Access Journals (Sweden)

    Joshua Steven Reece

    Full Text Available Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri, Key tree cactus (Pilosocereus robinii, Florida duskywing butterfly (Ephyriades brunnea floridensis, and Key deer (Odocoileus virginianus clavium. We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  9. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  10. Randomised controlled trial of Alexander technique lessons, exercise, and massage (ATEAM) for chronic and recurrent back pain: economic evaluation.

    Science.gov (United States)

    Hollinghurst, Sandra; Sharp, Debbie; Ballard, Kathleen; Barnett, Jane; Beattie, Angela; Evans, Maggie; Lewith, George; Middleton, Karen; Oxford, Frances; Webley, Fran; Little, Paul

    2008-12-11

    An economic evaluation of therapeutic massage, exercise, and lessons in the Alexander technique for treating persistent back pain. Cost consequences study and cost effectiveness analysis at 12 month follow-up of a factorial randomised controlled trial. 579 patients with chronic or recurrent low back pain recruited from primary care. Normal care (control), massage, and six or 24 lessons in the Alexander technique. Half of each group were randomised to a prescription for exercise from a doctor plus behavioural counselling from a nurse. Costs to the NHS and to participants. Comparison of costs with Roland-Morris disability score (number of activities impaired by pain), days in pain, and quality adjusted life years (QALYs). Comparison of NHS costs with QALY gain, using incremental cost effectiveness ratios and cost effectiveness acceptability curves. Intervention costs ranged from pound30 for exercise prescription to pound596 for 24 lessons in Alexander technique plus exercise. Cost of health services ranged from pound50 for 24 lessons in Alexander technique to pound124 for exercise. Incremental cost effectiveness analysis of single therapies showed that exercise offered best value ( pound61 per point on disability score, pound9 per additional pain-free day, pound2847 per QALY gain). For two-stage therapy, six lessons in Alexander technique combined with exercise was the best value (additional pound64 per point on disability score, pound43 per additional pain-free day, pound5332 per QALY gain). An exercise prescription and six lessons in Alexander technique alone were both more than 85% likely to be cost effective at values above pound20 000 per QALY, but the Alexander technique performed better than exercise on the full range of outcomes. A combination of six lessons in Alexander technique lessons followed by exercise was the most effective and cost effective option.

  11. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  12. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  13. The Opinion of Latvian Teachers About the Most Suitable Teaching Methods and Possibilities to Make Lessons Interesting

    Directory of Open Access Journals (Sweden)

    Porozovs Juris

    2017-12-01

    Full Text Available Student’s learning motivation and learning outcomes depend on the ability of the teacher to interest students, the chosen teaching methods and proficiency to manage the learning process. Teacher who can successfully choose teaching content, material resources and different teaching methods is able to cause interest about his subject. Teacher who is interested in teaching process himself can help students to learn a subject. The aim of the study was to find out the Latvian teachers' opinion about the disturbing factors affecting the achievement of high learning outcomes for students, the most suitable teaching methods and the possibilities to make lessons interesting. The survey of teachers of different schools in Latvia regarding their students’ learning motivation was carried out. The data from 482 teachers’ answers were analysed. The results of the research showed that the majority of surveyed teachers consider that learning motivation of Latvia students has decreased during the last few years. Teachers point out several factors, which do not allow students to reach high learning outcomes, the most important of them are: the inability of students to link career and success with learning and lack of life goals; inability of students to concentrate attention during lessons; indisposition of students to do homework. The teachers consider laboratory works, discussions, project works, group works and teacher’s presentations and narrative of new material as the most suitable teaching methods. Teachers consider that the most important personality trait of teachers and learning motivation for students to improve their skills is the teacher’s ability to teach the subject in an interesting way. Teachers believe that lessons can be made interesting if modern technologies and teaching methods are used during lessons and when the teacher is able to connect the subject with real life.

  14. Perceived Advantages of 3D Lessons in Constructive Learning for South African Student Teachers Encountering Learning Barriers

    Science.gov (United States)

    de Jager, Thelma

    2017-01-01

    Research shows that three-dimensional (3D)-animated lessons can contribute to student teachers' effective learning and comprehension, regardless of the learning barriers they experience. Student teachers majoring in the subject Life Sciences in General Subject Didactics viewed 3D images of the heart during lectures. The 3D images employed in the…

  15. Space Mechanisms Lessons Learned and Accelerated Testing Studies

    Science.gov (United States)

    Fusaro, Robert L.

    1997-01-01

    A number of mechanism (mechanical moving component) failures and anomalies have recently occurred on satellites. In addition, more demanding operating and life requirements have caused mechanism failures or anomalies to occur even before some satellites were launched (e.g., during the qualification testing of GOES-NEXT, CERES, and the Space Station Freedom Beta Joint Gimbal). For these reasons, it is imperative to determine which mechanisms worked in the past and which have failed so that the best selection of mechanically moving components can be made for future satellites. It is also important to know where the problem areas are so that timely decisions can be made on the initiation of research to develop future needed technology. To chronicle the life and performance characteristics of mechanisms operating in a space environment, a Space Mechanisms Lessons Learned Study was conducted. The work was conducted by the NASA Lewis Research Center and by Mechanical Technologies Inc. (MTI) under contract NAS3-27086. The expectation of the study was to capture and retrieve information relating to the life and performance of mechanisms operating in the space environment to determine what components had operated successfully and what components had produced anomalies.

  16. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  17. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  18. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  19. Implementation of science process skills using ICT-based approach to facilitate student life skills

    Science.gov (United States)

    Rahayu, Y. S.; Yuliani; Wijaya, B. R.

    2018-01-01

    The purpose of this study is to describe the results of the implementation of a teaching-learning package in Plant Physiology courses to improve the student’s life skills using the science process skills-based approach ICT. This research used 15 students of Biology Education of Undergraduate International Class who are in the Plant Physiology course. This study consists of two phases items, namely the development phase and implementation phase by using a one-shot case study design. Research parameters were the feasibility of lesson plans, student achievement, Including academic skills, thinking skills, and social skills. Data were descriptively Analyzed According to the characteristics of the existing data. The result shows that the feasibility of a lesson plan is very satisfied and can be improvements in student’s life skills, especially with regards to student’s thinking skills and scientific thinking skills. The results indicate that the science process skills using ICT-based approach can be effective methods to improve student’s life skills.

  20. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  1. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  2. Cognitive processes of cancer patients: a major threat to patients' quality of life

    International Nuclear Information System (INIS)

    Javaid, D.; Rehna, T.; Hanif, R.

    2018-01-01

    To explore the effects of intrusive and deliberate rumination on the quality of life of cancer patients. Study Design:Descriptive cross-sectional design. Place and Duration of Study:PIMS and NORI Hospital between July to September 2016. Methodology:A sample of 100 cancer patients participated in the study. The patients fulfilling the inclusion criteria were given a written consent form. Event related Rumination Inventory and WHO Quality of Life-Bref scale was used for data collection. Results:There were 57 male and 43 female patients within the age range of 18 to 66 years (mean = 36.62 +13.77 years). A significant negative correlation was found between intrusive rumination and all domains of quality of life as physical (r = -0.28, p<0.01), psychological (r = -0.19, p<0.01), social (r = -0.20, p<0.01), environmental (r = -0.17, p<0.05), and global (r = -0.26, p<0.01) functioning. Furthermore, results on regression analysis showed the significant prediction of the intrusive rumination on all domains of quality of life. The effect of deliberate rumination was found to be non-significant. Conclusion:Intrusive rumination significantly negatively predicted all domains of quality of life, whereas, quality of life of cancer patients was not significantly predicated by deliberate rumination. (author)

  3. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  4. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  5. Deus or Darwin: randomness and belief in theories about the origin of life

    NARCIS (Netherlands)

    Rutjens, B.T.; van der Pligt, J.; van Harreveld, F.

    2010-01-01

    A simple reminder of the fact that we do not always control life's outcomes reduced people's belief in Darwin's Theory of Evolution. This control-threat resulted in a relative preference for theories of life that thwart randomness, either by stressing the role of a controlling God (Intelligent

  6. Simple and Practical Efficiency Lessons

    Science.gov (United States)

    Kolpin, Van

    2018-01-01

    The derivation of conditions necessary for Pareto efficient production and exchange is a lesson frequently showcased in microeconomic theory textbooks. Traditional delivery of this lesson is, however, limited in its scope of application and can be unnecessarily convoluted. The author shows that the universe of application is greatly expanded and a…

  7. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  8. What About the Children? The Threat of Nuclear War and Our Responsibility to Preserve this Planet for Future Generations.

    Science.gov (United States)

    Hawkes, Glenn W.

    Part of a global effort, this brochure was written to increase understanding of the threat nuclear war poses to children. Several issues are raised and briefly discussed, including (1) the present capacity for annihilating the next generation or ending human life on this planet, (2) the inadequacy of deterrence, (3) the suffering of children after…

  9. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  10. Influenza risk management: lessons learned from an A(H1N1) pdm09 outbreak investigation in an operational military setting.

    Science.gov (United States)

    Farrell, Margaret; Sebeny, Peter; Klena, John D; Demattos, Cecilia; Pimentel, Guillermo; Turner, Mark; Joseph, Antony; Espiritu, Jennifer; Zumwalt, John; Dueger, Erica

    2013-01-01

    At the onset of an influenza pandemic, when the severity of a novel strain is still undetermined and there is a threat of introduction into a new environment, e.g., via the deployment of military troops, sensitive screening criteria and conservative isolation practices are generally recommended. In response to elevated rates of influenza-like illness among U.S. military base camps in Kuwait, U.S. Naval Medical Research Unit No. 3 partnered with local U.S. Army medical units to conduct an A(H1N1) pdm09 outbreak investigation. Initial clinical data and nasal specimens were collected via the existent passive surveillance system and active surveillance was conducted using a modified version of the World Health Organization/U.S. Centers for Disease Control and Prevention influenza-like illness case definition [fever (T > 100.5˚F/38˚C) in addition to cough and/or sore throat in the previous 72 hours] as the screening criteria. Samples were tested via real-time reverse-transcription PCR and sequenced for comparison to global A(H1N1) pdm09 viruses from the same time period. The screening criteria used in Kuwait proved insensitive, capturing only 16% of A(H1N1) pdm09-positive individuals. While still not ideal, using cough as the sole screening criteria would have increased sensitivity to 73%. The results of and lessons learned from this outbreak investigation suggest that pandemic influenza risk management should be a dynamic process (as information becomes available regarding true attack rates and associated mortality, screening and isolation criteria should be re-evaluated and revised as appropriate), and that military operational environments present unique challenges to influenza surveillance.

  11. Planning geometry lessons with learning platforms

    DEFF Research Database (Denmark)

    Tamborg, Andreas Lindenskov

    mathematics teachers’ joint planning of a lesson in geometry with a learning platform called Meebook is analyzed using the instrumental approach. It is concluded that the interface in Meebook orients the teachers work toward what the students should do rather than what they should learn, although the latter......This paper investigates how mathematics teachers plan lessons with a recently implemented Danish learning platform designed to support teachers in planning lessons in line with a recent objective-oriented curriculum. Drawing on data from observations of and interviews with teachers, three...... is a key intention behind the implementation of the platform. It is also concluded that when the teachers succeed in using learning objectives actively in their planning, the objectives support the teachers in designing lessons that correspond with their intentions. The paper concludes with a discussion...

  12. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  13. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  14. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  15. Food quantity affects the sensitivity of Daphnia to road salt.

    Science.gov (United States)

    Brown, Arran H; Yan, Norman D

    2015-04-07

    Road deicing operations have raised chloride (Cl) levels in many temperate lakes in Europe and North America. These lakes vary widely in trophic status, but to date, no one has quantified the interaction between food quantity and road salt toxicity. We examined the effects of food quantity (particulate algal C concentration (C)) on the chronic toxicity of Cl to Daphnia in soft-water bioassays. There was a strong positive linear relationship (r(2) = 0.92 for NaCl and r(2) = 0.96 for CaCl2) between food quantity and Cl LC50. As food quantity increased from 0.2 to 1.0 mg C/L (levels characteristic of oligotrophic to eutrophic lakes, respectively), the chronic Cl LC50 increased from 55.7 to 284.8 mg Cl/L. Salt type (NaCl or CaCl2) did not affect the Cl LC50, Daphnia life history parameters, or the intrinsic rate of population increase (r). The life history parameter most sensitive to Cl was neonate production. Cl did not inhibit egg production, nor was the maternal lipid investment in eggs changed, but egg viability and the subsequent release of live neonates decreased as Cl levels increased and food decreased. Our results suggest the trophic status of lakes should be considered when assessing ecological threat from Cl.

  16. The threat of a dirty bomb and possible verification measures

    International Nuclear Information System (INIS)

    Meer, Klaas van der; Hardeman, Frank; Meier, Oliver

    2003-01-01

    The paper discusses technical aspects of the dirty (radiological dispersion) bomb and the threat that this type of bomb poses to societies and international security. Based on the technology and materials needed to construct a dirty bomb, the relevance of the safeguards system for nuclear material accountancy and chemical and biological control systems is discussed. A dirty bomb consists of a conventional explosive charge combined with radioactive material. Its purpose is to contaminate a large area with radioactive material. The main consequences would be loss of life through direct impact and contamination. In comparison with use of nuclear fission devices, the number of direct casualties due to the impact of the explosion are likely to be small. In the long run, there may be casualties due to radioactive contamination, however, probably fewer than is mentioned in public discussions. Other consequences of the use of a radiological device include widespread panic, fear and uncertainty among the public, high decontamination costs, loss of real estate value and disruption of economic activity in the area concerned. If a terrorist is intent on causing maximum havoc and disruption, the radioactive material of choice should have a reasonably long half life. Access should be easy and such material should be available in sufficient quantities. The most obvious candidates from this perspective are 60 Co and 137 Cs and to a lesser extent 90 Sr. Also some more 'exotic' radionuclides or mixtures cannot absolutely be excluded. 60 Co and 137 Cs are frequently used in medical and industrial equipment. There is currently no international material accountancy system for these materials and thousands of sources have been produced in many countries. One or several of these sources contain sufficient material for the construction of an effective 'dirty bomb'. Approximative dispersion calculations will be performed to determine the spread of radioactive material. Dependent on the

  17. Judging the Quality of Teaching in Lessons: Some Thoughts Prompted by Ofsted's Subsidiary Guidance on Teaching Style

    Science.gov (United States)

    Richards, Colin

    2014-01-01

    Lesson observations involving judgements of teaching quality are a regular feature of classroom life. Such observations and judgements are made by senior and middle managers in schools and also, very significantly, by Ofsted inspectors as a major component of their judgement on the quality of teaching in a school. Using the example of Ofsted…

  18. Masterwork Art Lesson: Kandinsky Watercolors.

    Science.gov (United States)

    LiPira, Michael

    2003-01-01

    Presents an art lesson used with sixth-grade students which also can be used with other grade levels. Explains that the artwork of Wassily Kandinsky served as inspiration for this lesson. Explains that the students learned about abstract art and used watercolors to create their own paintings in the style of Kandinsky. (CMK)

  19. Bead Game Simulation. Lesson Plan.

    Science.gov (United States)

    Ripp, Ken

    This lesson plan offers students the opportunity to participate in the three basic economic systems (market, command, and tradition). By working in each of the systems, students will internalize the fundamental values present in each system and will gain insights into the basic advantages and disadvantages of each system. The lesson plan provides…

  20. Implementing US Department of Energy lessons learned programs. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-08-01

    The DOE Lessons Learned Handbook is a two-volume publication developed to supplement the DOE Lessons Learned Standard (DOE-STD-7501-95) with information that will organizations in developing or improving their lessons learned programs. Volume 1 includes greater detail than the Standard in areas such as identification and documentation of lessons learned; it also contains sections on specific processes such as training and performance measurement. Volume 2 (this document) contains examples of program documents developed by existing lessons learned programs as well as communications material, functional categories, transmittal documents, sources of professional and industry lessons learned, and frequently asked questions about the Lessons Learned List Service.

  1. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  2. Sensitivity to Uncertainty in Asteroid Impact Risk Assessment

    Science.gov (United States)

    Mathias, D.; Wheeler, L.; Prabhu, D. K.; Aftosmis, M.; Dotson, J.; Robertson, D. K.

    2015-12-01

    The Engineering Risk Assessment (ERA) team at NASA Ames Research Center is developing a physics-based impact risk model for probabilistically assessing threats from potential asteroid impacts on Earth. The model integrates probabilistic sampling of asteroid parameter ranges with physics-based analyses of entry, breakup, and impact to estimate damage areas and casualties from various impact scenarios. Assessing these threats is a highly coupled, dynamic problem involving significant uncertainties in the range of expected asteroid characteristics, how those characteristics may affect the level of damage, and the fidelity of various modeling approaches and assumptions. The presented model is used to explore the sensitivity of impact risk estimates to these uncertainties in order to gain insight into what additional data or modeling refinements are most important for producing effective, meaningful risk assessments. In the extreme cases of very small or very large impacts, the results are generally insensitive to many of the characterization and modeling assumptions. However, the nature of the sensitivity can change across moderate-sized impacts. Results will focus on the value of additional information in this critical, mid-size range, and how this additional data can support more robust mitigation decisions.

  3. Physically active academic lessons in elementary children.

    Science.gov (United States)

    Bartholomew, John B; Jowers, Esbelle M

    2011-06-01

    Although schools are an ideal location to conduct interventions that target children, the emphasis on standardized testing makes it difficult to implement interventions that do not directly support academic instruction. In response, physically active academic lessons have been developed as a strategy to increase physical activity while also addressing core educational goals. Texas I-CAN! is one incarnation of this approach. We will review the on-going research on the impact of these active lessons on: teacher implementation, child step count, child attention control, and academic performance. The collected studies support the impact of physically active academic lessons on each area of interest. If these data can be replicated, it suggests that teachers might find these lessons of benefit to their primary role as educators, which should ease dissemination of these and other physically active lessons in elementary schools. Copyright © 2011 Elsevier Inc. All rights reserved.

  4. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  5. Addressing Ebola-related stigma: lessons learned from HIV/AIDS.

    Science.gov (United States)

    Davtyan, Mariam; Brown, Brandon; Folayan, Morenike Oluwatoyin

    2014-01-01

    HIV/AIDS and Ebola Virus Disease (EVD) are contemporary epidemics associated with significant social stigma in which communities affected suffer from social rejection, violence, and diminished quality of life. To compare and contrast stigma related to HIV/AIDS and EVD, and strategically think how lessons learned from HIV stigma can be applied to the current EVD epidemic. To identify relevant articles about HIV/AIDS and EVD-related stigma, we conducted an extensive literature review using multiple search engines. PubMed was used to search for relevant peer-reviewed journal articles and Google for online sources. We also consulted the websites of the World Health Organization (WHO), Centers for Disease Control and Prevention (CDC), and the National Institutes of Health to retrieve up-to-date information about EVD and HIV/AIDS. Many stigmatizing attitudes and behaviors directed towards those with EVD are strikingly similar to those with HIV/AIDS but there are significant differences worthy of discussion. Both diseases are life-threatening and there is no medical cure. Additionally misinformation about affected groups and modes of transmission runs rampant. Unlike in persons with EVD, historically criminalized and marginalized populations carry a disproportionately higher risk for HIV infection. Moreover, mortality due to EVD occurs within a shorter time span as compared to HIV/AIDS. Stigma disrupts quality of life, whether it is associated with HIV infection or EVD. When addressing EVD, we must think beyond the immediate clinical therapeutic response, to possible HIV implications of serum treatment. There are emerging social concerns of stigma associated with EVD infection and double stigma associated with EVD and HIV infection. Drawing upon lessons learned from HIV, we must work to empower and mobilize prominent members of the community, those who recovered from the disease, and organizations working at the grassroots level to disseminate clear and accurate

  6. Life lessons after classes: investigating the influence of an afterschool sport program on adolescents’ life skills development

    Science.gov (United States)

    Lee, Okseon; Park, Mirim; Jang, Kyunghwan; Park, Yongnam

    2017-01-01

    ABSTRACT The purpose of this study was to investigate the influence of an afterschool sport program on adolescents’ life skills development and to identify which characteristics of the program would have an influence on their life skills acquisition. The participants were six children (4 boys, 2 girls) who participated in a 12-week afterschool program implemented in two elementary schools, as well as the two program instructors who implemented the afterschool sport program. Data were collected from individual interviews with program participants and instructors. The inductive analysis of data revealed four categories of life skills developed through program participation: (1) playing well and being more active, (2) connecting well and having better social skills, (3) coping well and becoming a better problem solver, and (4) dreaming well and having a better sense of purpose. Regarding the characteristics of the program that influenced life skills development, three themes emerged: (1) having a clear goal and building consensus with stakeholders, (2) establishing a firm yet flexible structure, and (3) instructors’ use of effective strategies for teaching life skills. PMID:28367697

  7. Life lessons after classes: investigating the influence of an afterschool sport program on adolescents' life skills development.

    Science.gov (United States)

    Lee, Okseon; Park, Mirim; Jang, Kyunghwan; Park, Yongnam

    2017-12-01

    The purpose of this study was to investigate the influence of an afterschool sport program on adolescents' life skills development and to identify which characteristics of the program would have an influence on their life skills acquisition. The participants were six children (4 boys, 2 girls) who participated in a 12-week afterschool program implemented in two elementary schools, as well as the two program instructors who implemented the afterschool sport program. Data were collected from individual interviews with program participants and instructors. The inductive analysis of data revealed four categories of life skills developed through program participation: (1) playing well and being more active, (2) connecting well and having better social skills, (3) coping well and becoming a better problem solver, and (4) dreaming well and having a better sense of purpose. Regarding the characteristics of the program that influenced life skills development, three themes emerged: (1) having a clear goal and building consensus with stakeholders, (2) establishing a firm yet flexible structure, and (3) instructors' use of effective strategies for teaching life skills.

  8. Lesson Study and History Education

    Science.gov (United States)

    Halvorsen, Anne-Lise; Kesler Lund, Alisa

    2013-01-01

    This article examines the experiences of a group of fifth-grade teachers who used lesson study, a teacher-driven form of professional development, to teach history in a project supported by a Teaching American History Grant. The project addressed the following questions: What does a lesson study cycle for history education look like? What…

  9. Value pricing pilot program : lessons learned

    Science.gov (United States)

    2008-08-01

    This "Lessons Learned Report" provides a summary of projects sponsored by the Federal Highway Administration's (FHWA's) Congestion and Value Pricing Pilot Programs from 1991 through 2006 and draws lessons from a sample of projects with the richest an...

  10. Students’ motivation in a disc golf-lesson and a soccer-lesson: An experimental study in the Physical Education setting

    Directory of Open Access Journals (Sweden)

    Kristian Vernegaard

    2017-09-01

    Full Text Available One of the purposes of physical education (PE in both Norway and Denmark is that PE should inspire to a lifelong active lifestyle. Based on the self-determination theory, the aim of the present study was to compare students’ intrinsic motivation, extrinsic motivation, and perceived competence in a lifestyle sport inspired PE-lesson (disc golf to a traditional PE-lesson (soccer and general PE. In addition, we aimed to investigate whether differences in motivation and perceived competence were conditional of the students’ relative attitude toward PE. The result of the study revealed that perceived competence was higher in the disc golf-lesson compared to the soccer-lesson and general PE. No overall differences in intrinsic motivation were found. However, when investigating differences in intrinsic motivation according to the students’ relative attitude toward PE, the results indicated that the students with a negative attitude toward PE was significantly more intrinsically motivated in disc golf-lesson compared to soccer-lesson and general PE. The findings may be seen as further recommendations to physical educators to vary the activity choices in physical education classes.

  11. Karl Marx in One Lesson (1818-1883). Series on Public Issues No. 6.

    Science.gov (United States)

    Pejovich, Steve

    This booklet, one of a series intended to apply economic principles to major social and political issues of the day, starts from the premise that Marxism is a threat to our way of life and offers a critique of fundamental components of the social movement Marx created. The first of six subsections focuses on sources of influence on Karl Marx…

  12. Search for life on Mars in surface samples: Lessons from the 1999 Marsokhod rover field experiment

    Science.gov (United States)

    Newsom, Horton E.; Bishop, J.L.; Cockell, C.; Roush, T.L.; Johnson, J. R.

    2001-01-01

    The Marsokhod 1999 field experiment in the Mojave Desert included a simulation of a rover-based sample selection mission. As part of this mission, a test was made of strategies and analytical techniques for identifying past or present life in environments expected to be present on Mars. A combination of visual clues from high-resolution images and the detection of an important biomolecule (chlorophyll) with visible/near-infrared (NIR) spectroscopy led to the successful identification of a rock with evidence of cryptoendolithic organisms. The sample was identified in high-resolution images (3 times the resolution of the Imager for Mars Pathfinder camera) on the basis of a green tinge and textural information suggesting the presence of a thin, partially missing exfoliating layer revealing the organisms. The presence of chlorophyll bands in similar samples was observed in visible/NIR spectra of samples in the field and later confirmed in the laboratory using the same spectrometer. Raman spectroscopy in the laboratory, simulating a remote measurement technique, also detected evidence of carotenoids in samples from the same area. Laboratory analysis confirmed that the subsurface layer of the rock is inhabited by a community of coccoid Chroococcidioposis cyanobacteria. The identification of minerals in the field, including carbonates and serpentine, that are associated with aqueous processes was also demonstrated using the visible/NIR spectrometer. Other lessons learned that are applicable to future rover missions include the benefits of web-based programs for target selection and for daily mission planning and the need for involvement of the science team in optimizing image compression schemes based on the retention of visual signature characteristics. Copyright 2000 by the American Geophysical Union.

  13. Searching for Life on Early Mars: Lessons from the Pilbara

    Science.gov (United States)

    Clarke, J. D. A.; Stoker, C. R.

    2016-01-01

    Stromatolites in the Pilbara region of Western Australia constitute the earliest outcrop-scale evidence of life on Earth (Figure 1). The stromatolites in the 3.4 Ga Strelley Pool Formation (SPF) provide an important analog for searching for fossil evidence of early life on Mars, as Noachian aged sediments on Mars were formed under similar environmental conditions. Stromatolites represent possibly the best evidence that could be collected by a rover because they form recognizable macroscopic structures and are often associated with chemical and microscopic evidence.

  14. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  15. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  16. Social stereotyping as a threat to the integration of the older people. Narrative review.

    Directory of Open Access Journals (Sweden)

    Catalina Aguayo

    2013-12-01

    Full Text Available Introduction: One of the most outstanding characteristics of our time is the increase of older adults (OA. Its emergence claiming a place in society has revealed that there is no adequate preparation to face this reality. One of the major threats for the insertion of OA in the society are the social stereotypes. Aim of the study: To gather the factors that causes a negative perception in relation with OA. Results: The specific literature describes an immediate society, where technological and economic transformations give way to the small (nuclear family, relegating the grandfather. The process of ageing raises new challenges for OA, their families and the Health System. The geriatric service has become a growing and dynamic demand. However, the knowledge of the professionals is rooted in stereotypes and prejudices that lead to an inadequate, negative and mechanistic approach of the OA. The improvement in the care of the OA decreases their psychological burden. The safe and welcoming environment created by the health care team and family will provide emotional, social and better health outcomes. Conclusion: It should sensitize professionals, families and support networks, re-educating their expectations and perceptions. The modification of these factors improves the attitude towards the OA, replaces discriminatory practices by positive behaviors, promotes the integral attention and affects the quality of life of geriatric patients.

  17. Threat Perception and Attitudes of Adolescents Towards Re-Introduced Wild Animals: A qualitative study of young learners from affected regions in Germany

    Science.gov (United States)

    Hermann, Nadin; Menzel, Susanne

    2013-12-01

    Conservation efforts such as the restoration of European bison or the support of wolf immigration into Germany are often socio-scientifically controversial. In many cases, disputes are based on individuals' threat perception and attitudes towards the animal involved. The herewith reported study provides qualitative insights into German adolescents' (n = 31, Mage = 16.6 years) attitudes towards animal reintroduction, their threat and coping appraisal about wildlife and their knowledge of local endangered species. We found that students had rather limited knowledge of local endangered species. After Kellert's categories of animal attitudes, the adolescents showed a strong moralistic view on wildlife return. Naturalistic, ecologistic and utilitarian views were also strongly apparent. According to the Protection Motivation Theory, perceived threats could be identified as threats to animals on the one hand and threats to human interests on the other. Such threat perceptions often lead to a dilemma, which made it difficult to decide upon the priorities of wildlife protection versus protection of human interests. Coping mechanism to reduce threats to human interests as mentioned by the participants included restrictions of the animal as well as strategies that focused on responsibility by humans. Regarding coping mechanism to prevent the species' extinction, participants showed a relatively superficial understanding. Furthermore, we found that participants from regions where wolves are currently immigrating or European bison are being reintroduced showed a more positive understanding of the respective animal. Our findings are discussed in the light of this topic's potential as an example of a real-life socio-scientific issue in classroom discussions.

  18. It is never too early to start planning for plant life extension

    International Nuclear Information System (INIS)

    Neils, G.H.

    1987-01-01

    This paper outlines some of the reasons why the subject of plant life extension (PLEX) deserves the attention it is receiving and describes some of the work that is currently being conducted in order to make PLEX a reality for U.S. nuclear power plants. One such major effort is a pilot program at the Monticello Nuclear Generating plant. This program, as well as other programs, have already produced some valuable lessons from which other plant owners can benefit. The Monticelle pilot program and the lessons learned thereof are described in some detail in this paper. (Liu)

  19. Longitudinal Changes in Behavioral Approach System Sensitivity and Brain Structures Involved in Reward Processing during Adolescence

    OpenAIRE

    Urošević, Snežana; Collins, Paul; Muetzel, Ryan; Lim, Kelvin; Luciana, Monica

    2012-01-01

    Adolescence is a period of radical normative changes and increased risk for substance use, mood disorders, and physical injury. Researchers have proposed that increases in reward sensitivity, i.e., sensitivity of the behavioral approach system (BAS), and/or increases in reactivity to all emotional stimuli (i.e., reward and threat sensitivities) lead to these phenomena. The present study is the first longitudinal investigation of changes in reward (i.e., BAS) sensitivity in 9 to 23-year-olds a...

  20. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  1. Learning to observe mathematical learning in lesson studies

    DEFF Research Database (Denmark)

    Rasmussen, Klaus; Østergaard, Camilla Hellsten; Foss, Kristian Kildemoes

    2016-01-01

    This poster deals with lesson study (LS) in pre-service teacher education. In particular how to prepare for, carry out, and reflect upon, observations of pupil learning. Observation is of crucial importance to the lesson study process, and here we present a study of observation features which ena...... enable or hinder fruitful lesson study. While substantial research has been carried out in the general field of bserving pupils’ learning processes and teachers’ pedagogical practice, little is known about this in the particular setting of lesson study....

  2. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  3. Impacts of ocean acidification on marine organisms: quantifying sensitivities and interaction with warming.

    Science.gov (United States)

    Kroeker, Kristy J; Kordas, Rebecca L; Crim, Ryan; Hendriks, Iris E; Ramajo, Laura; Singh, Gerald S; Duarte, Carlos M; Gattuso, Jean-Pierre

    2013-06-01

    Ocean acidification represents a threat to marine species worldwide, and forecasting the ecological impacts of acidification is a high priority for science, management, and policy. As research on the topic expands at an exponential rate, a comprehensive understanding of the variability in organisms' responses and corresponding levels of certainty is necessary to forecast the ecological effects. Here, we perform the most comprehensive meta-analysis to date by synthesizing the results of 228 studies examining biological responses to ocean acidification. The results reveal decreased survival, calcification, growth, development and abundance in response to acidification when the broad range of marine organisms is pooled together. However, the magnitude of these responses varies among taxonomic groups, suggesting there is some predictable trait-based variation in sensitivity, despite the investigation of approximately 100 new species in recent research. The results also reveal an enhanced sensitivity of mollusk larvae, but suggest that an enhanced sensitivity of early life history stages is not universal across all taxonomic groups. In addition, the variability in species' responses is enhanced when they are exposed to acidification in multi-species assemblages, suggesting that it is important to consider indirect effects and exercise caution when forecasting abundance patterns from single-species laboratory experiments. Furthermore, the results suggest that other factors, such as nutritional status or source population, could cause substantial variation in organisms' responses. Last, the results highlight a trend towards enhanced sensitivity to acidification when taxa are concurrently exposed to elevated seawater temperature. © 2013 Blackwell Publishing Ltd.

  4. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  5. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  6. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  7. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  8. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  9. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  10. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  11. Vacuum performances and lessons for 2012

    International Nuclear Information System (INIS)

    Baglin, V.; Bregliozzi, G.; Jimenez, J.M.; Lanza, G.

    2012-01-01

    During the LHC run 2011, a tremendous progress has been made towards the machine operation with design parameters. In the same time, the run confirmed the sensitivity of the beam vacuum system to the machine parameters. As expected, a successful scrubbing period allowed mitigating the effects of the electron cloud giving room to an entire filling of the ring with 50 ns beams. In parallel issues such as the impact of the beam screen regulation, pressures spikes and local outgassing were observed during the year. On-line mitigations and immediate compensatory measures implemented during the winter technical stop are reviewed together with their efficiencies. All unexpected pressure behaviours observed during 2011 are understood. The expected limitations while waiting for LS1 consolidation or when running with 25 ns beams are addressed. Lessons for 2012 are discussed. (authors)

  12. Getting to the Heart of Masculinity Stressors: Masculinity Threats Induce Pronounced Vagal Withdrawal During a Speaking Task.

    Science.gov (United States)

    Kramer, Brandon L; Himmelstein, Mary S; Springer, Kristen W

    2017-12-01

    Previous work has found that traditional masculinity ideals and behaviors play a crucial role in higher rates of morbidity and mortality for men. Some studies also suggest that threatening men's masculinity can be stressful. Over time, this stress can weigh on men's cardiovascular and metabolic systems, which may contribute to men's higher rates of cardiometabolic health issues. The purpose of this study is to explore how masculinity threats affect men's heart rate and heart rate variability reactivity (i.e., vagal withdrawal) to masculinity feedback on a social speaking task. Two hundred and eighty-five undergraduate males were randomly assigned to one of six conditions during a laboratory-based speech task. They received one of two feedback types (masculinity or control) and one of three feedback levels (low, high, or dropping) in order to assess whether masculinity threats influence heart rate reactivity and vagal withdrawal patterns during the speech task. Men who receive low masculinity feedback during the speech task experienced more pronounced vagal withdrawal relative to those who received the control. Masculinity threats can induce vagal withdrawal that may accumulate over the life course to contribute to men's relatively worse cardiometabolic health.

  13. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  14. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  15. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  16. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  17. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  18. Beyond Technology Transfer: Quality of Life Impacts from R&D Outcomes

    Science.gov (United States)

    Stone, Vathsala I.; Lockett, Michelle; Usiak, Douglas J.; Arthanat, Sajay

    2010-01-01

    This paper presents methodology and findings from three product efficacy studies that verify the quality of life benefits resulting from prior research, development, and transfer activities. The paper then discusses key lessons learned with implications for product evaluation practice. The studies assessed the quality of three assistive technology…

  19. Nuclear attitudes and reactions: associations with depression, drug use, and quality of life

    Energy Technology Data Exchange (ETDEWEB)

    Newcomb, M.D.

    1986-05-01

    For 40 years the world has lived with the threat of nuclear war and, recently, with the possibility of nuclear power plant accidents. Although virtually every generation must confront various national or international crises, the threat of nuclear war is unprecedented in its destructive potential. This study is an attempt to assess attitudes and amount of distress associated with the ever-present threat of nuclear war and the possibility of accidents at nuclear power plants. The Nuclear Attitudes Questionnaire (NAQ) consists of 15 items and was administered to 722 young adults who have grown up in the nuclear age. The items were found to reflect four latent factors of nuclear concern, nuclear support, fear of the future, and nuclear denial, all of which in turn represent a second-order construct of nuclear anxiety. Women reported significantly more nuclear concern, less nuclear support, more fear of the future, and less nuclear denial than did men. In latent-variable models, nuclear anxiety was found to be significantly associated with less purpose in life, less life satisfaction, more powerlessness, more depression, and more drug use. It is concluded that the threat of nuclear war and accidents is significantly related to psychological distress and may disturb normal maturational development.

  20. Nuclear attitudes and reactions: associations with depression, drug use, and quality of life

    International Nuclear Information System (INIS)

    Newcomb, M.D.

    1986-01-01

    For 40 years the world has lived with the threat of nuclear war and, recently, with the possibility of nuclear power plant accidents. Although virtually every generation must confront various national or international crises, the threat of nuclear war is unprecedented in its destructive potential. This study is an attempt to assess attitudes and amount of distress associated with the ever-present threat of nuclear war and the possibility of accidents at nuclear power plants. The Nuclear Attitudes Questionnaire (NAQ) consists of 15 items and was administered to 722 young adults who have grown up in the nuclear age. The items were found to reflect four latent factors of nuclear concern, nuclear support, fear of the future, and nuclear denial, all of which in turn represent a second-order construct of nuclear anxiety. Women reported significantly more nuclear concern, less nuclear support, more fear of the future, and less nuclear denial than did men. In latent-variable models, nuclear anxiety was found to be significantly associated with less purpose in life, less life satisfaction, more powerlessness, more depression, and more drug use. It is concluded that the threat of nuclear war and accidents is significantly related to psychological distress and may disturb normal maturational development

  1. Adolescent Depression and Negative Life Events, the Mediating Role of Cognitive Emotion Regulation

    Science.gov (United States)

    Stikkelbroek, Yvonne; Bodden, Denise H. M.; Kleinjan, Marloes; Reijnders, Mirjam; van Baar, Anneloes L.

    2016-01-01

    Background Depression during adolescence is a serious mental health problem. Difficulties in regulating evoked emotions after stressful life events are considered to lead to depression. This study examined if depressive symptoms were mediated by various cognitive emotion regulation strategies after stressful life events, more specifically, the loss of a loved one, health threats or relational challenges. Methods We used a sample of 398 adolescents (Mage = 16.94, SD = 2.90), including 52 depressed outpatients, who all reported stressful life event(s). Path analyses in Mplus were used to test mediation, for the whole sample as well as separately for participants scoring high versus low on depression, using multigroup analyses. Results Health threats and relational challenging stressful life events were associated with depressive symptoms, while loss was not. More frequent use of maladaptive strategies was related to more depressive symptoms. More frequent use of adaptive strategies was related to less depressive symptoms. Specific life events were associated with specific emotion regulation strategies. The relationship between challenging, stressful life events and depressive symptoms in the whole group was mediated by maladaptive strategies (self-blame, catastrophizing and rumination). No mediation effect was found for adaptive strategies. Conclusion The association between relational challenging, stressful life events and depressive symptoms was mediated by maladaptive, cognitive emotion regulation strategies. PMID:27571274

  2. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  3. Keiko, Killer Whale. [Lesson Plan].

    Science.gov (United States)

    Discovery Communications, Inc., Bethesda, MD.

    This lesson plan presents activities designed to help students understand that Keiko, the killer whale, lived for a long time in an aquarium and had to be taught to live independently; and that computer users can get updates on how Keiko is doing. The main activity of the lesson involves middle school students working in small groups to produce a…

  4. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  5. The development of an avian wind sensitivity map for South Africa

    Energy Technology Data Exchange (ETDEWEB)

    Retief, Ernst; Anderson, M. D.; Harebottle, D.; Jenkins, A.; Simmons, R.; Smit, H.A.; Rooyen, C. Van; Smallie, J.

    2011-07-01

    Full text: Wind energy is a relative new industry in South Africa. This provides South Africans with the opportunity to ensure that wind farms are placed in areas that are of low sensitivity to birds. With this in mind two environmental NGOs, BirdLife South Africa and the Endangered Wildlife Trust, designed an Avian Wind Sensitivity Map to provide guidance to the wind farm industry about the location of wind turbines. The map is the first of its kind in Africa. The purpose of the map is to provide an indication of the geographic areas in South Africa where the possible establishment of wind farms might have a negative impact on birds. Such a map will identify areas of bird sensitivity, i.e. sites where threatened, endemic and vulnerable bird species occur. The map was designed using a variety of data sources, specifically data acquired through citizen science projects - such as the Southern African Bird Atlas Project 2 and the Coordinated Waterbird Counts Project. The data were analysed using data priority scores based on the conservation concern of each species as well as the risk associated with a species to fly into wind turbines and associated infrastructures. The formal protection status of a geographic area was also taken into account. Extensive use was made of GIS tools to collate, analyse and present the data. A number of African countries are considering establishing wind farms. The lessons learnt during the design process can be used by other African countries as the basis for similar maps which can serve as a mitigation measure against the loss of vulnerable species. (Author)

  6. Steam generator life cycle management: Ontario Power Generation (OPG) experience

    International Nuclear Information System (INIS)

    Maruska, C.C.

    2002-01-01

    A systematic managed process for steam generators has been implemented at Ontario Power Generation (OPG) nuclear stations for the past several years. One of the key requirements of this managed process is to have in place long range Steam Generator Life Cycle Management (SG LCM) plans for each unit. The primary goal of these plans is to maximize the value of the nuclear facility through safe and reliable steam generator operation over the expected life of the units. The SG LCM plans integrate and schedule all steam generator actions such as inspection, operation, maintenance, modifications, repairs, assessments, R and D, performance monitoring and feedback. This paper discusses OPG steam generator life cycle management experience to date, including successes, failures and how lessons learned have been re-applied. The discussion includes relevant examples from each of the operating stations: Pickering B and Darlington. It also includes some of the experience and lessons learned from the activities carried out to refurbish the steam generators at Pickering A after several years in long term lay-up. The paper is structured along the various degradation modes that have been observed to date at these sites, including monitoring and mitigating actions taken and future plans. (author)

  7. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  8. Intrauterine and genetic factors in early childhood sensitization

    DEFF Research Database (Denmark)

    Bønnelykke, Klaus

    2010-01-01

    The allergy-associated (atopic) diseases; asthma, eczema and rhinoconjunctivitis, are the most common chronic diseases in childhood. A large number of environmental and genetic risk factors have been suggested, but still our understanding of the underlying disease mechanisms and etiologies...... with production of specific IgE-antibodies against allergens. Sensitization may cause allergic symptoms, and sensitization early in life is a strong risk factor for later disease. Fetal and early postnatal life seems to be a critical period for development of atopic disease and may be an important “window...... of opportunity” for prevention. The aim of this thesis was to increase the understanding of sensitization in early life. We studied indicators of sensitization in the newborn, and early development of sensitization and disease associated with a newly discovered genetic risk factor. Such insight may increase our...

  9. Mini-Lessons on Language (The Round Table).

    Science.gov (United States)

    English Journal, 1993

    1993-01-01

    Describes several successful lessons that provide students with new awareness of the English language. Includes lessons focusing on language change, onomatopoeia, slang, word origin, dialect, and language functions. (MM)

  10. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  11. Organic and Isotopic Signatures of Life: Lessons from the Early Earth

    Science.gov (United States)

    Freeman, K. H.; Eigenbrode, J. L.; House, C. H.

    2002-12-01

    In the study of life on earth, isotopic analyses of organic biomarkers provide essential insight to their biological and environmental provenance. Isotopic analyses of organic materials on other planets present a number of challenges, both analytical and interpretive. Prebiotic planetary organic materials can derive from condensation reactions and by delivery through meteorites or interplanetary dust, with the relative importance of each influenced by the oxidation state of the atmosphere. Material delivered to planets can have an interstellar origin, although it is dominated by compounds influenced by the formation of the solar system. Each of these processes impact molecular isotopic signatures and must be considered in life-detection strategies. Pronounced effects are observed for hydrogen isotopes, with smaller fractionations observed for other elements. Theoretical, laboratory and observational studies of non-terrean materials are essential to further understand molecular isotopic heterogeneity associated with these exclusively abiotic processes. Studies of Archean-aged samples provide an important resource for interpreting molecular isotopic patterns as signatures of life processes. Carbon assimilation and biomass synthesis from simple precursor compounds typically discriminate against 13C. This generality, however, is complicated by the observations of a wide range of fractionation factors associated with important microbial carbon-uptake processes. Metabolic processes further distribute isotopic signatures, such that wide isotopic heterogeneity is observed among cellular biochemical constituents. In addition, preservation/contamination concerns dominate studies of very ancient organic matter, as they likely will in life-detection studies. However, both biochemical heterogeneity and sample integrity can be addressed by considering patterns from different paleoenvironments. Molecular results demonstrate that Late Archean microbial life on this planet was

  12. Lessons Learned: Conducting Research With Victims Portrayed in Sexual Abuse Images and Their Parents.

    Science.gov (United States)

    Walsh, Wendy A; Wolak, Janis; Lounsbury, Kaitlin; Howley, Susan; Lippert, Tonya; Thompson, Lawrence

    2016-03-27

    Victims portrayed in sexual abuse images may be resistant to participate in research because of embarrassment or shame due to the sensitive nature and potential permanency of images. No studies we are aware of explore reactions to participating in research after this type of crime. Telephone interviews were conducted with convenience samples of parents (n= 46) and adolescents who were victims of child sexual abuse (n= 11; some of whom were portrayed in sexual abuse images), and online surveys were completed by adult survivors depicted in abuse images (N= 133). The first lesson was that few agencies tracked this type of crime. This lack of tracking raises the question as to what types of data should be collected and tracked as part of an investigation. The second lesson was that few victims at the two participating agencies had been portrayed in sexual abuse images (4%-5%). The third lesson was that once possible cases were identified, we found relatively high percentages of consent to contact and interview completions. This implies that researchers and service providers should not be hesitant about conducting research after an investigation of child sexual abuse. The fourth lesson was that the vast majority of participants reported not being upset by the questions. We hope that the data presented here will encourage agencies to reconsider the types of data being tracked and will encourage researchers to conduct in-depth research with populations that are often difficult to reach to continue improving the professional response to child victimization. © The Author(s) 2016.

  13. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  14. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  15. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  16. Psychosocial Rehabilitation: Some Lessons Learned From Natural Disaster in Iran

    Directory of Open Access Journals (Sweden)

    Fardin Alipour

    2016-01-01

    Full Text Available Background: Disasters have adverse impacts on different aspects of human life. Psychosocial Rehabilitation is one of the fields which is usually overshadowed and ignored by physical rehabilitation or its importance does not receive proper attention. This research attempts to study some lessons learned from Psychosocial Rehabilitation based on disaster experiences in Iran. Materials and Methods: This study has a conventional qualitative content analysis design. The participants of study were 15 people with direct experience of earthquake and 12 experts in this field. The study sample was selected by purposeful sampling method and the data were collected by semi-structured interviews. Results: Lack of a suitable system to deliver Psychosocial Rehabilitation, challenge in establishing balance between short-term and long-term social and mental needs, lack of mental and social experts, inefficiency in using social capital and capacities are the most important lessons learned in this field. Conclusion: Lack of awareness of mental and social problems of affected people after disaster is one of the most important barriers in successful and stable rehabilitation. Psychosocial Rehabilitation requires a suitable structure and planning for all stages of disaster management.

  17. Improving Mathematics Teaching as Deliberate Practice through Chinese Lesson Study

    Science.gov (United States)

    Huang, Rongjin; Prince, Kyle M.; Barlow, Angela T.

    2017-01-01

    This study examined how a ninth grade teacher improved an Algebra I lesson through a lesson study approach. We used multiple data sources to investigate the improvement of the lesson towards student-centered mathematics instruction, perceived benefits of the teacher, and factors associated with the improvement of teaching. The lesson group…

  18. Craft Lessons: Teaching Writing K-8. Second Edition

    Science.gov (United States)

    Fletcher, Ralph; Portalupi, JoAnn

    2007-01-01

    Since its publication in 1998 Craft Lessons has become a mainstay of writing teachers, both new and experienced. Practical lessons--each printed on one page--and the instructional language geared to three grade-level groupings: K-2, 3-4, and 5-8 are contained in this book. In the decade since Craft Lessons' publication the world has changed in…

  19. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  20. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  1. Anticipating students' reasoning and planning prompts in structured problem-solving lessons

    Science.gov (United States)

    Vale, Colleen; Widjaja, Wanty; Doig, Brian; Groves, Susie

    2018-02-01

    Structured problem-solving lessons are used to explore mathematical concepts such as pattern and relationships in early algebra, and regularly used in Japanese Lesson Study research lessons. However, enactment of structured problem-solving lessons which involves detailed planning, anticipation of student solutions and orchestration of whole-class discussion of solutions is an ongoing challenge for many teachers. Moreover, primary teachers have limited experience in teaching early algebra or mathematical reasoning actions such as generalising. In this study, the critical factors of enacting the structured problem-solving lessons used in Japanese Lesson Study to elicit and develop primary students' capacity to generalise are explored. Teachers from three primary schools participated in two Japanese Lesson Study teams for this study. The lesson plans and video recordings of teaching and post-lesson discussion of the two research lessons along with students' responses and learning are compared to identify critical factors. The anticipation of students' reasoning together with preparation of supporting and challenging prompts was critical for scaffolding students' capacity to grasp and communicate generality.

  2. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  3. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  4. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  5. Adolescent internalizing symptoms and negative life events: the sensitizing effects of earlier life stress and cortisol.

    Science.gov (United States)

    Ruttle, Paula L; Armstrong, Jeffrey M; Klein, Marjorie H; Essex, Marilyn J

    2014-11-01

    Although adolescence is marked by increased negative life events and internalizing problems, few studies investigate this association as an ongoing longitudinal process. Moreover, while there are considerable individual differences in the degree to which these phenomena are linked, little is known about the origins of these differences. The present study examines early life stress (ELS) exposure and early-adolescent longitudinal afternoon cortisol level as predictors of the covariation between internalizing symptoms and negative life events across high school. ELS was assessed by maternal report during infancy, and the measure of cortisol was derived from assessments at ages 11, 13, and 15 years. Life events and internalizing symptoms were assessed at ages 15, 17, and 18 years. A two-level hierarchical linear model revealed that ELS and cortisol were independent predictors of the covariation of internalizing symptoms and negative life events. Compared to those with lower levels of ELS, ELS-exposed adolescents displayed tighter covariation between internalizing symptoms and negative life events. Adolescents with lower longitudinal afternoon cortisol displayed tighter covariation between negative life events and internalizing symptoms, while those with higher cortisol demonstrated weaker covariation, partially due to increased levels of internalizing symptoms when faced with fewer negative life events.

  6. Professor's Page: Do Demonstration Lessons Work?

    Science.gov (United States)

    Clarke, Doug

    2011-01-01

    As part of a large research and professional development project funded by the Catholic Education Office Melbourne (CEOM), called "Contemporary Teaching and Learning of Mathematics," the ACU team has been leading demonstration lessons. There is certainly not universal agreement on the worth of demonstration lessons in the mathematics…

  7. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  8. The probability distribution of intergranular stress corrosion cracking life for sensitized 304 stainless steels in high temperature, high purity water

    International Nuclear Information System (INIS)

    Akashi, Masatsune; Kenjyo, Takao; Matsukura, Shinji; Kawamoto, Teruaki

    1984-01-01

    In order to discuss the probability distribution of intergranular stress corrsion carcking life for sensitized 304 stainless steels, a series of the creviced bent beem (CBB) and the uni-axial constant load tests were carried out in oxygenated high temperature, high purity water. The following concludions were resulted; (1) The initiation process of intergranular stress corrosion cracking has been assumed to be approximated by the Poisson stochastic process, based on the CBB test results. (2) The probability distribution of intergranular stress corrosion cracking life may consequently be approximated by the exponential probability distribution. (3) The experimental data could be fitted to the exponential probability distribution. (author)

  9. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  10. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  11. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  12. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  13. Friendship in childhood and adulthood: lessons across the life span.

    Science.gov (United States)

    Sherman, A M; de Vries, B; Lansford, J E

    2000-01-01

    Friendship occupies an important place in the growing body of literature in child development and gerontological research. As such, it may be useful for researchers from both fields to consider what can be learned from work carried out in each tradition. Therefore, we present a selected review of topics in friendship research across the life span. Through discussion of the value of friendship, the development of friendship, challenges to friendship, the gendered nature of friendship, and the connection between friends and family, points of commonality and contrast are identified. We conclude by presenting possible avenues for future investigation for researchers interested in friendship at any point in the life span.

  14. Changes in sensitivity to radiation and to bleomycin occurring during the life history of monolayer cultures of a mouse tumour cell line

    International Nuclear Information System (INIS)

    Twentyman, P.R.; Bleehen, N.M.

    1975-01-01

    The response to X-radiation and to bleomycin has been measured at a number of times during the life of monolayer cultures of EMT6 mouse tumour cells. Little change in radiation sensitivity was seen at any time and no loss of the shoulder to the survival curve occurred. Cultures in early plateau phase (where a considerable amount of cell proliferation is balanced by cell loss) showed a reduced sensitivity to bleomycin when compared with cells in exponential growth. However, after a longer period in plateau phase, when proliferation had virtually ceased, the sensitivity became greater than that of exponential phase cells. These findings are discussed with reference to the conflicting results of other workers. (author)

  15. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  16. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  17. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  18. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  19. Defense Language Institute Russian Basic Course. Volumes XXVIII, Lessons 131-140. Volume XXX, Lessons 151-159.

    Science.gov (United States)

    Defense Language Inst., Washington, DC.

    The 19 lessons in these two volumes are intended for the advanced phase of a 159-lesson intensive audiolingual basic Russian course developed recently by the Defense Language Institute to train native speakers of English to a Level 3 second language proficiency. These third and fifth volumes contain such features as (1) texts on the Russian Civil…

  20. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.