WorldWideScience

Sample records for microbial threats board

  1. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  2. Microbial Threats to Health: Emergence, Detection, and Response

    National Research Council Canada - National Science Library

    Smolinski, Mark S; Hamburg, Margaret A; Lederberg, Joshua

    2003-01-01

    .... The recent SARS outbreak is a prime example. Knowing neither geographic nor political borders, often arriving silently and lethally, microbial pathogens constitute a grave threat to the health of humans...

  3. The power of the Brown v. Board of Education decision: theorizing threats to sustainability.

    Science.gov (United States)

    Fine, Michelle

    2004-09-01

    Interviews with African American and White American elders capture the immediate power of the Brown v. Board of Education (1954) decision and the biography of its impact over time. This article reviews the lived experience of the decision and theorizes 3 threats to sustainability that ruthlessly undermined the decision over time: (a) the unacknowledged and enormous sacrifice endured by the African American community in the name of desegregation; b) the violent and relentless resistance to the decision by government officials, educators, and many White community members; and (c) the dramatic shrinkage of the vision of Brown from the dismantling of White supremacy to a technical matter of busing. Implications are drawn for the study of desegregation and for the study of sustainability of social justice more broadly. ((c) 2004 APA, all rights reserved)

  4. DEVELOPMENT OF RESISTANCE IN BACTERIA AGAINST ANTI - MICROBIAL AGENTS: REASONS, THREATS AND ONGOING ENCOUNTER

    Directory of Open Access Journals (Sweden)

    Shibabrata Pattanayak

    2011-07-01

    Full Text Available Development of Multi Druug Resistant bacteria is creating a very severe problem in anti-microbial chemotherapy. Many recently developed antibiotics are found incapable to control resistant organisms.The reasons of development of resistance gene in the bacterial plasmid and their quick spread among various related and unrelated bacteria are analysed in this article along with discussion of world wide ongoing research to combat the problem.

  5. DEVELOPMENT OF RESISTANCE IN BACTERIA AGAINST ANTI - MICROBIAL AGENTS: REASONS, THREATS AND ONGOING ENCOUNTER

    OpenAIRE

    Shibabrata Pattanayak

    2011-01-01

    Development of Multi Druug Resistant bacteria is creating a very severe problem in anti-microbial chemotherapy. Many recently developed antibiotics are found incapable to control resistant organisms.The reasons of development of resistance gene in the bacterial plasmid and their quick spread among various related and unrelated bacteria are analysed in this article along with discussion of world wide ongoing research to combat the problem.

  6. Microbial Degradation of Forensic Samples of Biological Origin: Potential Threat to Human DNA Typing.

    Science.gov (United States)

    Dash, Hirak Ranjan; Das, Surajit

    2018-02-01

    Forensic biology is a sub-discipline of biological science with an amalgam of other branches of science used in the criminal justice system. Any nucleated cell/tissue harbouring DNA, either live or dead, can be used as forensic exhibits, a source of investigation through DNA typing. These biological materials of human origin are rich source of proteins, carbohydrates, lipids, trace elements as well as water and, thus, provide a virtuous milieu for the growth of microbes. The obstinate microbial growth augments the degradation process and is amplified with the passage of time and improper storage of the biological materials. Degradation of these biological materials carriages a huge challenge in the downstream processes of forensic DNA typing technique, such as short tandem repeats (STR) DNA typing. Microbial degradation yields improper or no PCR amplification, heterozygous peak imbalance, DNA contamination from non-human sources, degradation of DNA by microbial by-products, etc. Consequently, the most precise STR DNA typing technique is nullified and definite opinion can be hardly given with degraded forensic exhibits. Thus, suitable precautionary measures should be taken for proper storage and processing of the biological exhibits to minimize their decaying process by micro-organisms.

  7. The high energy multicharged particle exposure of the microbial ecology evaluation device on board the Apollo 16 spacecraft

    Science.gov (United States)

    Benton, E. V.; Henke, R. P.

    1973-01-01

    The high energy multicharged cosmic-ray-particle exposure of the Microbial Ecology Evaluation Device package on board the Apollo 16 spacecraft was monitored using cellulose nitrate, Lexan polycarbonate, nuclear emulsion, and silver chloride crystal nuclear-track detectors. The results of the analysis of these detectors include the measured particle fluences, the linear energy transfer spectra, and the integral atomic number spectrum of stopping particle density. The linear energy transfer spectrum is used to compute the fractional cell loss in human kidney (T1) cells caused by heavy particles. Because the Microbial Ecology Evaluation Device was better shielded, the high-energy multicharged particle exposure was less than that measured on the crew passive dosimeters.

  8. Forum of Microbial Threats

    Science.gov (United States)

    2011-06-01

    March and early April 2009, a new influenza A (H1N1) virus (S-OIV) emerged in Mexico and the United States. During the first few weeks of surveillance...this new influenza virus spread out of Mexico to other parts of North America and then on to Europe, the Far East, and now Australia and the Pacific...geographic origins of several historical plague (Y. pestis) epidemics and the recent cholera epidemic in Haiti. June 28th – Afternoon Session

  9. Board-invited review: Rumen microbiology: Leading the way in microbial ecology

    Science.gov (United States)

    Robert Hungate, considered the father of rumen microbiology, was the first to initiate a systematic exploration of the microbial ecosystem of the rumen, but he was not alone. The techniques he developed to isolate and identify cellulose-digesting bacteria from the rumen have had a major impact not ...

  10. Board-invited review: Rumen microbiology: leading the way in microbial ecology.

    Science.gov (United States)

    Krause, D O; Nagaraja, T G; Wright, A D G; Callaway, T R

    2013-01-01

    Robert Hungate, considered the father of rumen microbiology, was the first to initiate a systematic exploration of the microbial ecosystem of the rumen, but he was not alone. The techniques he developed to isolate and identify cellulose-digesting bacteria from the rumen have had a major impact not only in delineating the complex ecosystem of the rumen but also in clinical microbiology and in the exploration of a number of other anaerobic ecosystems, including the human hindgut. Rumen microbiology has pioneered our understanding of much of microbial ecology and has broadened our knowledge of ecology in general, as well as improved the ability to feed ruminants more efficiently. The discovery of anaerobic fungi as a component of the ruminal flora disproved the central dogma in microbiology that all fungi are aerobic organisms. Further novel interactions between bacterial species such as nutrient cross feeding and interspecies H2 transfer were first described in ruminal microorganisms. The complexity and diversity present in the rumen make it an ideal testing ground for microbial theories (e.g., the effects of nutrient limitation and excess) and techniques (such as 16S rRNA), which have rewarded the investigators that have used this easily accessed ecosystem to understand larger truths. Our understanding of characteristics of the ruminal microbial population has opened new avenues of microbial ecology, such as the existence of hyperammonia-producing bacteria and how they can be used to improve N efficiency in ruminants. In this review, we examine some of the contributions to science that were first made in the rumen, which have not been recognized in a broader sense.

  11. Microbial Communities Shaped by Treatment Processes in a Drinking Water Treatment Plant and Their Contribution and Threat to Drinking Water Safety

    Science.gov (United States)

    Li, Qi; Yu, Shuili; Li, Lei; Liu, Guicai; Gu, Zhengyang; Liu, Minmin; Liu, Zhiyuan; Ye, Yubing; Xia, Qing; Ren, Liumo

    2017-01-01

    Bacteria play an important role in water purification in drinking water treatment systems. On one hand, bacteria present in the untreated water may help in its purification through biodegradation of the contaminants. On the other hand, some bacteria may be human pathogens and pose a threat to consumers. The present study investigated bacterial communities using Illumina MiSeq sequencing of 16S rRNA genes and their functions were predicted using PICRUSt in a treatment system, including the biofilms on sand filters and biological activated carbon (BAC) filters, in 4 months. In addition, quantitative analyses of specific bacterial populations were performed by real-time quantitative polymerase chain reaction (qPCR). The bacterial community composition of post-ozonation effluent, BAC effluent and disinfected water varied with sampling time. However, the bacterial community structures at other treatment steps were relatively stable, despite great variations of source water quality, resulting in stable treatment performance. Illumina MiSeq sequencing illustrated that Proteobacteria was dominant bacterial phylum. Chlorine disinfection significantly influenced the microbial community structure, while other treatment processes were synergetic. Bacterial communities in water and biofilms were distinct, and distinctions of bacterial communities also existed between different biofilms. By contrast, the functional composition of biofilms on different filters were similar. Some functional genes related to pollutant degradation were found widely distributed throughout the treatment processes. The distributions of Mycobacterium spp. and Legionella spp. in water and biofilms were revealed by real-time quantitative polymerase chain reaction (qPCR). Most bacteria, including potential pathogens, could be effectively removed by chlorine disinfection. However, some bacteria presented great resistance to chlorine. qPCRs showed that Mycobacterium spp. could not be effectively removed by

  12. EU conference - 'The microbial threat'

    DEFF Research Database (Denmark)

    Mevius, D.J.; Sprenger, M.J.W.; Wegener, Henrik Caspar

    1999-01-01

    and its compliance with guidelines. Keeping animals for food production involves the responsibility for their well being. This includes treatment of infections. However, the use of feed additive, growth-promoting antimicrobials related to therapeutics in human medicine, should be banned immediately......A global or European strategy should be developed to deal with increasing antimicrobial resistance. This strategy includes surveillance of antimicrobial resistance and monitoring of the use of antimicrobial agents in animals and humans. In animals, surveillance should be focussed on potential...... transfer of resistant, zoonotic, food-born pathogens and resistance genes to humans. In humans the surveillance should be clinically relevant. Guidelines for rational therapy should be implemented and 'antibiotic teams' should be installed in each hospital to evaluate the prescription of antibiotics...

  13. Microbial Monitoring from the Frontlines to Space: A Successful Validation of a Department of Defense (DoD) Funded Small Business Innovation Research (SBIR) Technology on Board the International Space Station (ISS)

    Science.gov (United States)

    Oubre, Cherie; Khodadad, Christina; Castro, Victoria; Ott, Mark; Pollack, Lawrence; Roman, Monsi

    2017-01-01

    The RAZOR EX (Registered Trademark) PCR unit was initially developed by the DoD as part of an SBIR project to detect and identify biothreats during field deployment. The system was evaluated by NASA as a commercial technology for future microbial monitoring requirements and has been successfully demonstrated in microgravity on-board the International Space Station.

  14. Effect Of Spaceflight On Microbial Gene Expression And Virulence: Preliminary Results From Microbe Payload Flown On-Board STS-115

    Science.gov (United States)

    Wilson, J. W.; HonerzuBentrup, K,; Schurr, M. J.; Buchanan, K.; Morici, L.; Hammond, T.; Allen, P.; Baker, C.; Ott, C. M.; Nelman-Gonzalez M.; hide

    2007-01-01

    Human presence in space, whether permanent or temporary, is accompanied by the presence of microbes. However, the extent of microbial changes in response to spaceflight conditions and the corresponding changes to infectious disease risk is unclear. Previous studies have indicated that spaceflight weakens the immune system in humans and animals. In addition, preflight and in-flight monitoring of the International Space Station (ISS) and other spacecraft indicates the presence of opportunistic pathogens and the potential of obligate pathogens. Altered antibiotic resistance of microbes in flight has also been shown. As astronauts and cosmonauts live for longer periods in a closed environment, especially one using recycled water and air, there is an increased risk to crewmembers of infectious disease events occurring in-flight. Therefore, understanding how the space environment affects microorganisms and their disease potential is critically important for spaceflight missions and requires further study. The goal of this flight experiment, operationally called MICROBE, is to utilize three model microbial pathogens, Salmonella typhimurium, Pseudomonas aeruginosa, and Candida albicans to examine the global effects of spaceflight on microbial gene expression and virulence attributes. Specifically, the aims are (1) to perform microarray-mediated gene expression profiling of S. typhimurium, P. aeruginosa, and C. albicans, in response to spaceflight in comparison to ground controls and (2) to determine the effect of spaceflight on the virulence potential of these microorganisms immediately following their return from spaceflight using murine models. The model microorganisms were selected as they have been isolated from preflight or in-flight monitoring, represent different degrees of pathogenic behavior, are well characterized, and have sequenced genomes with available microarrays. In particular, extensive studies of S. typhimurium by the Principal Investigator, Dr. Nickerson

  15. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  16. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  17. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  18. Board game

    International Nuclear Information System (INIS)

    Brennan, N.S.

    1982-01-01

    A board game comprises a board, a number of counters and two dice. The board is marked to provide a central area, representing the nucleus of an atom, and six or more annular rings extending concentrically around the central area, the rings being divided into 2,8,18,32,48 and 72 squares. Each ring represents an electron shell, and some of the squares are numbered, the number representing the atomic number of different elements. (author)

  19. A new model for simulating microbial cyanide production and optimizing the medium parameters for recovering precious metals from waste printed circuit boards.

    Science.gov (United States)

    Yuan, Zhihui; Ruan, Jujun; Li, Yaying; Qiu, Rongliang

    2018-04-10

    Bioleaching is a green recycling technology for recovering precious metals from waste printed circuit boards (WPCBs). However, this technology requires increasing cyanide production to obtain desirable recovery efficiency. Luria-Bertani medium (LB medium, containing tryptone 10 g/L, yeast extract 5 g/L, NaCl 10 g/L) was commonly used in bioleaching of precious metal. In this study, results showed that LB medium did not produce highest yield of cyanide. Under optimal culture conditions (25 °C, pH 7.5), the maximum cyanide yield of the optimized medium (containing tryptone 6 g/L and yeast extract 5 g/L) was 1.5 times as high as that of LB medium. In addition, kinetics and relationship of cell growth and cyanide production was studied. Data of cell growth fitted logistics model well. Allometric model was demonstrated effective in describing relationship between cell growth and cyanide production. By inserting logistics equation into allometric equation, we got a novel hybrid equation containing five parameters. Kinetic data for cyanide production were well fitted to the new model. Model parameters reflected both cell growth and cyanide production process. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. Making Boards More Effective: The Issue Of Independence | Ajogwu ...

    African Journals Online (AJOL)

    The authors argue that the independence of the board will be put in jeopardy if the board is made up mainly of executive directors, and if the non-executive directors, where they exist, have significant relationships with parties connected to the firm. Other sources of threat to the independence of the board are the combination ...

  1. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  2. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  3. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  4. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  5. Buddy Board

    DEFF Research Database (Denmark)

    Enggaard, Helle; Moselund, Lene

    2015-01-01

    Projekt ’BuddyBoard’ er kommet i stand via et samarbejde mellem Frederikshavn kommune, Bunker43 og Lab. X. Afdeling en ’Havly’ på Sæby Ældrecenter fungerer som living lab, hvilket betyder, at det udgør et levende laboratorium for udvikling og afprøvning af teknologi (Schultz, 2013). Projektet er....... Bunker43 har udviklet en teknologi (BuddyBoard) til hurtig formidling af billeder fra pårørende og personale til beboere på institutioner. Pårørende og personale uploader billeder via en APP eller en hjemmeside og har mulighed for at tilføje en kort forklarende tekst til hvert billede. Beboeren ser...... billederne via en tablet. Systemet bygger på et simpelt og brugervenligt design, så ældre med kognitive og/eller fysiske funktionsnedsættelser kan anvende teknologien. BuddyBoard fungerer via internettet, og billederne gemmes på en sikret server hos udbyderen, som er Bunker43. Intentionerne med BuddyBoard er...

  6. 77 FR 49440 - Membership of the Performance Review Board

    Science.gov (United States)

    2012-08-16

    ..., Defense Security Cooperation Agency, Defense Threat Reduction Agency, Missile Defense Agency, and Pentagon... DEPARTMENT OF DEFENSE Office of the Secretary Membership of the Performance Review Board AGENCY: Office of the Secretary of Defense (OSD), DoD. ACTION: Notice of board membership. SUMMARY: This notice...

  7. 78 FR 52517 - Membership of the Performance Review Board

    Science.gov (United States)

    2013-08-23

    ..., Defense Security Cooperation Agency, Defense Threat Reduction Agency, Missile Defense Agency, and Pentagon... DEPARTMENT OF DEFENSE Office of the Secretary Membership of the Performance Review Board AGENCY: Office of the Secretary of Defense (OSD), DoD. ACTION: Notice of board membership. SUMMARY: This notice...

  8. 76 FR 60473 - Membership of the Performance Review Board

    Science.gov (United States)

    2011-09-29

    ... Services Agency, Defense Logistics Agency, Defense Threat Reduction Agency, Missile Defense Agency, and... DEPARTMENT OF DEFENSE Office of the Secretary Membership of the Performance Review Board AGENCY: Office of the Secretary (OSD), Department of Defense (DoD). ACTION: Notice of board membership. SUMMARY...

  9. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  10. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  11. Deep subsurface microbial processes

    Science.gov (United States)

    Lovley, D.R.; Chapelle, F.H.

    1995-01-01

    Information on the microbiology of the deep subsurface is necessary in order to understand the factors controlling the rate and extent of the microbially catalyzed redox reactions that influence the geophysical properties of these environments. Furthermore, there is an increasing threat that deep aquifers, an important drinking water resource, may be contaminated by man's activities, and there is a need to predict the extent to which microbial activity may remediate such contamination. Metabolically active microorganisms can be recovered from a diversity of deep subsurface environments. The available evidence suggests that these microorganisms are responsible for catalyzing the oxidation of organic matter coupled to a variety of electron acceptors just as microorganisms do in surface sediments, but at much slower rates. The technical difficulties in aseptically sampling deep subsurface sediments and the fact that microbial processes in laboratory incubations of deep subsurface material often do not mimic in situ processes frequently necessitate that microbial activity in the deep subsurface be inferred through nonmicrobiological analyses of ground water. These approaches include measurements of dissolved H2, which can predict the predominant microbially catalyzed redox reactions in aquifers, as well as geochemical and groundwater flow modeling, which can be used to estimate the rates of microbial processes. Microorganisms recovered from the deep subsurface have the potential to affect the fate of toxic organics and inorganic contaminants in groundwater. Microbial activity also greatly influences 1 the chemistry of many pristine groundwaters and contributes to such phenomena as porosity development in carbonate aquifers, accumulation of undesirably high concentrations of dissolved iron, and production of methane and hydrogen sulfide. Although the last decade has seen a dramatic increase in interest in deep subsurface microbiology, in comparison with the study of

  12. Toward Understanding, Managing, and Protecting Microbial Ecosystems

    Science.gov (United States)

    Bodelier, Paul L. E.

    2011-01-01

    Microbial communities are at the very basis of life on earth, catalyzing biogeochemical reactions driving global nutrient cycles. However, unlike for plants and animals, microbial diversity is not on the biodiversity–conservation agenda. The latter, however, would imply that microbial diversity is not under any threat by anthropogenic disturbance or climate change. This maybe a misconception caused by the rudimentary knowledge we have concerning microbial diversity and its role in ecosystem functioning. This perspective paper identifies major areas with knowledge gaps within the field of environmental microbiology that preclude a comprehension of microbial ecosystems on the level we have for plants and animals. Opportunities and challenges are pointed out to open the microbial black box and to go from descriptive to predictive microbial ecology. PMID:21747797

  13. Towards understanding, managing and protecting microbial ecosystems

    Directory of Open Access Journals (Sweden)

    Paul eBodelier

    2011-04-01

    Full Text Available Microbial communities are at the very basis of life on earth, catalysing biogeochemical reactions driving global nutrient cycles. However, unlike for plants and animals, microbial diversity is not on the biodiversity conservation agenda. The latter, however, would imply that microbial diversity is not under any threat by anthropogenic disturbance or climate change. This maybe a misconception caused by the rudimentary knowledge we have concerning microbial diversity and its role in ecosystem functioning. This perspective paper indentifies major areas with knowledge gaps within the field of environmental microbiology that preclude a comprehension of microbial ecosystems on the level we have for plants and animals. Opportunities and challenges are pointed out to open the microbial black box and to go from descriptive to predictive microbial ecology.

  14. Toward understanding, managing, and protecting microbial ecosystems.

    Science.gov (United States)

    Bodelier, Paul L E

    2011-01-01

    Microbial communities are at the very basis of life on earth, catalyzing biogeochemical reactions driving global nutrient cycles. However, unlike for plants and animals, microbial diversity is not on the biodiversity-conservation agenda. The latter, however, would imply that microbial diversity is not under any threat by anthropogenic disturbance or climate change. This maybe a misconception caused by the rudimentary knowledge we have concerning microbial diversity and its role in ecosystem functioning. This perspective paper identifies major areas with knowledge gaps within the field of environmental microbiology that preclude a comprehension of microbial ecosystems on the level we have for plants and animals. Opportunities and challenges are pointed out to open the microbial black box and to go from descriptive to predictive microbial ecology.

  15. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  16. Board Task Performance

    DEFF Research Database (Denmark)

    Minichilli, Alessandro; Zattoni, Alessandro; Nielsen, Sabina

    2012-01-01

    identify three board processes as micro-level determinants of board effectiveness. Specifically, we focus on effort norms, cognitive conflicts and the use of knowledge and skills as determinants of board control and advisory task performance. Further, we consider how two different institutional settings....... The findings show that: (i) Board processes have a larger potential than demographic variables to explain board task performance; (ii) board task performance differs significantly between boards operating in different contexts; and (iii) national context moderates the relationships between board processes...... and board task performance....

  17. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  18. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  19. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  20. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  1. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  2. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  3. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  4. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  5. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  6. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  7. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  8. Microbial biosensors

    International Nuclear Information System (INIS)

    Le Yu; Chen, Wilfred; Mulchandani, Ashok

    2006-01-01

    A microbial biosensor is an analytical device that couples microorganisms with a transducer to enable rapid, accurate and sensitive detection of target analytes in fields as diverse as medicine, environmental monitoring, defense, food processing and safety. The earlier microbial biosensors used the respiratory and metabolic functions of the microorganisms to detect a substance that is either a substrate or an inhibitor of these processes. Recently, genetically engineered microorganisms based on fusing of the lux, gfp or lacZ gene reporters to an inducible gene promoter have been widely applied to assay toxicity and bioavailability. This paper reviews the recent trends in the development and application of microbial biosensors. Current advances and prospective future direction in developing microbial biosensor have also been discussed

  9. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  10. Emerging Infections: Microbial Threats to Health in the United States

    Science.gov (United States)

    1992-01-01

    anti-idiotvpic antibodies, and passive immuni/atmion Maria Glass . Division of AIDS. NIAID. personal communication. 1992). An alter- nati\\ e approach...R. J. Whitle%. i991. Resistance to .nitiiral dIres. ASil Ne%%s 57:514-517, Lawson. if. W.. MI. MI. Braun. R. 1. M. Glass . S. F. Stiiw. S. S, \\Ionroe...and T. IL. D~eardtorfft- 198S. Rev~enue ol’ die sushi parasite. Ness% Eniziand Jotirnal of Metdicine 3 ik). l 28. I 2 it MN~ ceill . W. If. 1976

  11. Departmental Appeals Board Decisions

    Data.gov (United States)

    U.S. Department of Health & Human Services — Decisions issued by the Chair and Board Members of the Departmental Appeals Board concerning determinations in discretionary, project grant programs, including...

  12. Pilot Boarding Areas

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Pilot boarding areas are locations at sea where pilots familiar with local waters board incoming vessels to navigate their passage to a destination port. Pilotage is...

  13. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  14. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  15. In Defense of Boards

    NARCIS (Netherlands)

    B. Visser (Bauke); S. Dominguez Martinez (Silvia); O.H. Swank (Otto)

    2007-01-01

    textabstractIt is often assumed that bad corporate performance means a bad CEO. The task of a board of directors is then simple: dismiss the executive. If it fails to do so, the board is said to be indolent. We take a kinder approach to observed board behaviour and point to the problems even

  16. Board of Directors or Supervisory Board

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2009-01-01

    The article analyses the legal consequences of the choice now available to Danish public limited companies, which can now opt for a two-tier management structure, in which the management board undertakes both the day-to-day and the overall management, while a supervisory board exercises control...... over the management board, including its appointment and dismissal. The article considers which companies a two-tier structure may be relevant for, and reviews the consequences for the composition, election and functioning of the company organs....

  17. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Stienstra, S.

    2007-01-01

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  18. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  19. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  20. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  2. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  3. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  4. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  5. Microbial glycoproteomics

    DEFF Research Database (Denmark)

    Halim, Adnan; Anonsen, Jan Haug

    2017-01-01

    Mass spectrometry-based "-omics" technologies are important tools for global and detailed mapping of post-translational modifications. Protein glycosylation is an abundant and important post translational modification widespread throughout all domains of life. Characterization of glycoproteins...... and research in this area is rapidly accelerating. Here, we review recent developments in glycoproteomic technologies with a special focus on microbial protein glycosylation....

  6. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  7. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  8. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  9. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  10. The Atomic Safety and Licensing Board Panel

    International Nuclear Information System (INIS)

    1998-01-01

    Through the Atomic Energy Act, Congress made is possible for the public to get a full and fair hearing on civilian nuclear matters. Individuals who are directly affected by any licensing action involving a facility producing or utilizing nuclear materials may participate in a formal hearing, on the record, before independent judges on the Atomic Safety and Licensing Board Panel (ASLBP or Panel). Frequently, in deciding whether a license, permit, amendment, or extension should be granted to a particular applicant, the Panel members must be more than mere umpires. If appropriate, they are authorized to go beyond the issues the parties place before them in order to identify, explore, and resolve significant questions involving threats to the public health and safety that come to a board's attention during the proceedings. This brochure explains the purpose of the panel. Also addressed are: type of hearing handled; method of public participation; formality of hearings; high-level waste; other panel responsibilities and litigation technology

  11. Microbial xanthophylls.

    Science.gov (United States)

    Bhosale, Prakash; Bernstein, Paul S

    2005-09-01

    Xanthophylls are oxygenated carotenoids abundant in the human food supply. Lutein, zeaxanthin, and cryptoxanthin are major xanthophyll carotenoids in human plasma. The consumption of these xanthophylls is directly associated with reduction in the risk of cancers, cardiovascular disease, age-related macular degeneration, and cataract formation. Canthaxanthin and astaxanthin also have considerable importance in aquaculture for salmonid and crustacean pigmentation, and are of commercial interest for the pharmaceutical and food industries. Chemical synthesis is a major source for the heavy demand of xanthophylls in the consumer market; however, microbial producers also have potential as commercial sources. In this review, we discuss the biosynthesis, commercial utility, and major microbial sources of xanthophylls. We also present a critical review of current research and technologies involved in promoting microbes as potential commercial sources for mass production.

  12. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  13. Atomic Energy Control Board

    International Nuclear Information System (INIS)

    Blackman, N.S.; Gummer, W.K.

    1982-02-01

    This paper has been prepared to provide an overview of the responsibilities and activities of the Atomic Energy Control Board. It is designed to address questions that are often asked concerning the establishment of the Atomic Energy Control Board, its enabling legislation, licensing and compliance activities, federal-provincial relationships, international obligations, and communications with the public

  14. SMART Boards Rock

    Science.gov (United States)

    Giles, Rebecca M.; Shaw, Edward L.

    2011-01-01

    SMART Board is a technology that combines the functionality of a whiteboard, computer, and projector into a single system. The interactive nature of the SMART Board offers many practical uses for providing an introduction to or review of material, while the large work area invites collaboration through social interaction and communication. As a…

  15. Microbial Biofilm as a Smart Material

    DEFF Research Database (Denmark)

    Garde, Christian; Welch, Martin; Ferkinghoff-Borg, Jesper

    2015-01-01

    Microbial biofilm colonies will in many cases form a smart material capable of responding to external threats dependent on their size and internal state. The microbial community accordingly switches between passive, protective, or attack modes of action. In order to decide which strategy to employ......, it is essential for the biofilm community to be able to sense its own size. The sensor designed to perform this task is termed a quorum sensor, since it only permits collective behaviour once a sufficiently large assembly of microbes have been established. The generic quorum sensor construct involves two genes...

  16. 77 FR 2541 - Board Meeting

    Science.gov (United States)

    2012-01-18

    ... FARM CREDIT SYSTEM INSURANCE CORPORATION Board Meeting AGENCY: Farm Credit System Insurance Corporation Board; Regular Meeting. SUMMARY: Notice is hereby given of the regular meeting of the Farm Credit System Insurance Corporation Board (Board). DATE AND TIME: The meeting of the Board will be held at the...

  17. Decamp Clock Board Firmware

    International Nuclear Information System (INIS)

    Vicente, J. de; Castilla, J.; Martinez, G.

    2007-01-01

    Decamp (Dark Energy Survey Camera) is a new instrument designed to explore the universe aiming to reveal the nature of Dark Energy. The camera consists of 72 CCDs and 520 Mpixels. The readout electronics of DECam is based on the Monsoon system. Monsoon is a new image acquisition system developed by the NOAO (National Optical Astronomical Observatory) for the new generation of astronomical cameras. The Monsoon system uses three types of boards inserted in a Eurocard format based crate: master control board, acquisition board and clock board. The direct use of the Monsoon system for DECam readout electronics requires nine crates mainly due to the high number of clock boards needed. Unfortunately, the available space for DECam electronics is constrained to four crates at maximum. The major drawback to achieve such desired compaction degree resides in the clock board signal density. This document describes the changes performed at CIEMAT on the programmable logic of the Monsoon clock board aiming to meet such restricted space constraints. (Author) 5 refs

  18. Decamp Clock Board Firmware

    Energy Technology Data Exchange (ETDEWEB)

    Vicente, J. de; Castilla, J.; Martinez, G.

    2007-09-27

    Decamp (Dark Energy Survey Camera) is a new instrument designed to explore the universe aiming to reveal the nature of Dark Energy. The camera consists of 72 CCDs and 520 Mpixels. The readout electronics of DECam is based on the Monsoon system. Monsoon is a new image acquisition system developed by the NOAO (National Optical Astronomical Observatory) for the new generation of astronomical cameras. The Monsoon system uses three types of boards inserted in a Eurocard format based crate: master control board, acquisition board and clock board. The direct use of the Monsoon system for DECam readout electronics requires nine crates mainly due to the high number of clock boards needed. Unfortunately, the available space for DECam electronics is constrained to four crates at maximum. The major drawback to achieve such desired compaction degree resides in the clock board signal density. This document describes the changes performed at CIEMAT on the programmable logic of the Monsoon clock board aiming to meet such restricted space constraints. (Author) 5 refs.

  19. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Luc Vos with regard to advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 14 to 28 June 2002. Human Resources Division Tel. 74128

  20. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel against the decision to grant him only a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main building (bldg. 500) from 1 September to 14 September 2008. Human Resources Department (73911)

  1. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Poul Frandsen concerning his assimilation into the new career structure. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 13 to 24 January 2003. Human Resources Division Tel. 74128

  2. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Personnel Division

    1999-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Joào Bento with regard to residential category. As the appellant has not objected, the recommendations of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article RÊVIÊ1.20 of the Staff Regulations.The relevant documents will therefore be posted on the notice boards of the Administration Building (N¡ 60) from 29 October to 12 November 1999.Personnel DivisionTel. 74128

  3. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2006-01-01

    The Joint Advisory Appeals Board was convened to examine an appeal lodged by a member of the personnel with regard to advancement. The person concerned has requested that the report of the Board and the final decision of the Director-General be brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (No. 60) from 24 March to 10 April 2006. Human Resources Department Tel. 74128

  4. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2007-01-01

    The Joint Advisory Appeals Board was convened to examine an internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has requested that the report of the Board and the final decision of the Director-General be brought to the notice of the members of the personnel, in accordance with Article R VI 1.18 of the Staff Regulations. The relevant documents will therefore be posted on the notice board of the Main building (Bldg. 60) from 24 September to 7 October 2007. Human Resources Department

  5. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Olivier Francis Martin with regard to indefinite contract. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 8 to 25 June 2001.

  6. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Jack Blanchard with regard to 'non recognition of specific functions'. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 12th to 26th April 2002. Human Resources Division Tel. 74128

  7. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mrs Judith Igo-Kemenes concerning the application of procedures foreseen by Administrative Circular N§ 26 (Rev. 3). As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 6 to 20 June 2003. Human Resources Division Tel. 74128

  8. Joint Advisory Appeals Board

    CERN Multimedia

    2004-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mrs Maria DIMOU with regard to a periodic one-step increase. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 30 April to 14 May 2004. Human Resources Department Tel. 74128

  9. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Joël Lahaye with regard to non-resident allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 18 May to 1st June 2001.

  10. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel with regard to the decision not to award him a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main building (Bldg. 500) from 17 March to 30 March 2008. Human Resources Department Tel. 73911

  11. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Bertrand Nicquevert with regard to the non-resident allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 29 November to 13 December 2002. Human Resources Division Tel. 74128

  12. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Antonio Millich with regard to advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 27 September to 11 October 2002. Human Resources Division Tel. 74128

  13. Joint Advisory Appeals Board

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Joint Advisory Appeals Board was convened to examine an appeal lodged by a member of the personnel with regard to a periodic one-step increase. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 1 to 15 April 2005. Human Resources Department Tel. 74128

  14. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel against the decision to grant him only a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main Building (Bldg. 500) from 1 September to 14 September 2008. Human Resources Department (73911)

  15. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Gert Jan Bossen with regard to dependent child allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 1st to 15 March 2002. Human Resources Division Tel. 74128

  16. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main Building (Bldg. 500) from 26 May to 6 June 2008. Human Resources Department (73911)

  17. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Serge Peraire with regard to exceptional advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 17 to 31 May 2002. Human Resources Division Tel. 74128

  18. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board was convened to examine an internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel, in accordance with Article R VI 1.18 of the Staff Regulations. These documents will therefore be posted on the notice board of the Main Building (Bldg. 60) from 21 January to 3 February 2008. Human Resources Department (73911)

  19. Primer printed circuit boards

    CERN Document Server

    Argyle, Andrew

    2009-01-01

    Step-by-step instructions for making your own PCBs at home. Making your own printed circuit board (PCB) might seem a daunting task, but once you master the steps, it's easy to attain professional-looking results. Printed circuit boards, which connect chips and other components, are what make almost all modern electronic devices possible. PCBs are made from sheets of fiberglass clad with copper, usually in multiplelayers. Cut a computer motherboard in two, for instance, and you'll often see five or more differently patterned layers. Making boards at home is relatively easy

  20. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Aloïs Girardoz with regard to classification and advancement. As the appellant has not objected, the Board's report and the Director-General's decision will be brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 15 to 29 August 2003. Human Resources Division Tel. 74128

  1. Microbial effects

    International Nuclear Information System (INIS)

    Sharpe, V.J.

    1985-10-01

    The long term safety and integrity of radioactive waste disposal sites proposed for use by Ontario Hydro may be affected by the release of radioactive gases. Microbes mediate the primary pathways of waste degradation and hence an assessment of their potential to produce gaseous end products from the breakdown of low level waste was performed. Due to a number of unknown variables, assumptions were made regarding environmental and waste conditions that controlled microbial activity; however, it was concluded that 14 C and 3 H would be produced, albeit over a long time scale of about 1500 years for 14 C in the worst case situation

  2. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  3. Boat boarding ladder placement

    Science.gov (United States)

    1998-04-01

    Presented in three volumes; 'Boat Boarding Ladder Placement,' which explores safety considerations including potential for human contact with a rotating propeller; 'Boat Handhold Placement,' which explores essential principles and methods of fall con...

  4. Checking a printed board

    CERN Multimedia

    1977-01-01

    An 'Interactive Printed Circuit Board Design System' has been developed by a company in a Member-State. Printed circuits are now produced at the SB's surface treatment workshop using a digitized photo-plotter.

  5. Boarding school rules.

    Science.gov (United States)

    Griffiths, Matt

    2017-01-04

    Ofsted inspects and regulates services that care for children and young people, including boarding facilities. Medication management is an integral part of caring for children in boarding schools, and robust systems must be in place to pass inspection. These systems must cover how medicines are dispensed, administered and stored at the facility, risk assessments, identifying which pupils can manage their own medicines and the individual health needs of boarders, so that care plans can be put in place for children with specific needs.

  6. COLLABORATION BOARD (CB55)

    CERN Multimedia

    B. Cousins

    Open Access Publication Policy ATLAS had recently issued a short statement in support of open access publishing. The mood of the discussions in the December CMS Collaboration Board had appeared to be in favour and so it was being proposed that CMS issue the same statement as that made by ATLAS (the statement is attached to the agenda of this meeting). The Collaboration Board agreed. Election of the Chair of the Collaboration Board Following the agreement to shorten the terms of both the Spokesperson and the Collaboration Board Chair, and to introduce a longer overlap period between the election and the start of the term, the election for the next Collaboration Board Chair was due in December 2007. If the old standard schedule specified in the Constitution were adapted to this date, then the Board should be informed at the present meeting that the election was being prepared. However, it was felt that the experience of the previous year's election of the Spokesperson had shown that it would be desirable to...

  7. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  8. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  9. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  11. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  12. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  13. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  14. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  15. 78 FR 4847 - Board Meeting

    Science.gov (United States)

    2013-01-23

    ... FARM CREDIT SYSTEM INSURANCE CORPORATION Board Meeting AGENCY: Farm Credit System Insurance Corporation. SUMMARY: Notice is hereby given of the regular meeting of the Farm Credit System Insurance Corporation Board (Board). DATE AND TIME: The meeting of the Board will be held at the offices of the Farm...

  16. 77 FR 55837 - Board Meeting

    Science.gov (United States)

    2012-09-11

    ... FARM CREDIT SYSTEM INSURANCE CORPORATION Board Meeting AGENCY: Farm Credit System Insurance Corporation. ACTION: Regular meeting. SUMMARY: Notice is hereby given of the regular meeting of the Farm Credit System Insurance Corporation Board (Board). Date and Time: The meeting of the Board will be held...

  17. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  18. 7 CFR 1160.105 - Board.

    Science.gov (United States)

    2010-01-01

    ... and Orders; Milk), DEPARTMENT OF AGRICULTURE FLUID MILK PROMOTION PROGRAM Fluid Milk Promotion Order Definitions § 1160.105 Board. Board means the National Processor Advertising and Promotion Board established... Promotion Board or Board). ...

  19. Microbial resistance to antibiotics | Chinedum | African Journal of ...

    African Journals Online (AJOL)

    Organisms that are normally sensitive to the action of an antibiotic may sometimes develop resistance or insensitivity to it. This, they may do through destroying the antibiotic or by retaining their growth even in the presence of the drug. Microbial resistance to antibiotics is now widespread and poses a serious clinical threat.

  20. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Neil Calder, Mrs Sudeshna Datta Cockerill, Mrs Andrée Fontbonne, Mrs Moniek Laurent and Mr Ulrich Liptow with regard to membership in the Pension Fund under the period with a Paid Associate contract, appeals dealt with on a collective basis. As the appellants have not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 10 to 31 August 2001.

  1. Pension Fund Governing Board

    CERN Multimedia

    HR Department

    2008-01-01

    Note The CERN pension scheme is based on the principle of defined benefits, so beneficiaries continue to receive the benefits to which they are entitled in accordance with the Rules of the Pension Fund. This means that pension entitlements under the Rules are not directly affected by the financial crisis and the current economic situation. However, the adjustment of pensions to the cost of living is not automatic and, under the method applied since 2006, must take into account the Fund’s financial position. Meeting of the Pension Fund Governing Board The Pension Fund Governing Board held its eighth meeting at ESO in Garching, Germany (near Munich) on 24 October 2008. Before starting its work, the Governing Board had the privilege of hearing an opening address by Professor Tim de Zeeuw, the Director General of ESO. Professor de Zeeuw described the mission of ESO and the ambitious projects of his organisation, which performs astronomy observations using telescopes located in...

  2. WeaselBoard :

    Energy Technology Data Exchange (ETDEWEB)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  3. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  4. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  5. Joint Advisory Appeals Board

    CERN Multimedia

    2013-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a former member of the personnel, a beneficiary of the CERN Pension Fund, against the calculation of his pension in the framework of the Progressive Retirement Programme.   The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be available from 26 July to 11 August 2013 at the following link. HR Department Head Office

  6. New Service Status Board

    CERN Multimedia

    2013-01-01

    On Monday 14 October, the Service Status Board for GS and IT will change. The new Status Board will be integrated with the CERN Service Portal and with the CERN Service Catalogue.   As of today, the SSB will display “Service Incidents”, “Planned Interventions” and “Service Changes”. References valid from 14 October: CERN SSB at https://cern.ch/ssb Computing SSB (previously IT SSB) at https://cern.ch/itssb   Nicole Cremel, IT and GS Service Management Support

  7. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  8. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  9. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Does Board Diversity Really Matter?

    DEFF Research Database (Denmark)

    Rose, Caspar; Munch-Madsen, Peter; Funch, Maja

    2013-01-01

    We study the impact of female board representation as well as citizenship on corporate performance based on a sample of the largest listed firms in the Nordic countries as well as Germany. We also seek to determine the variation of board structures using factor analysis. We find no support for any...... performance impact relating to female board representation. However, we find an impact of board citizenship on performance showing that board members with a background from common law have a significant positive influence on corporate performance measured as ROA, ROE and ROCE. Consistent with other studies we...... also document that large boards impact corporate performance negatively. Moreover we also show that data set on boards can be explained by four underlying factors. This article adds insight to board determinants of corporate performance as well as the classification of board variation. Specifically...

  11. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  12. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  13. Magnetic field on board

    International Nuclear Information System (INIS)

    Estevez Radio, H.; Fernandez Arenal, C.A.

    1995-01-01

    Here, the calculation of the magnetic field on board ships is performed, using matrix calculus, in a similar way as when the magnetic field in matter is studied. Thus the final formulas are written in a more compact form and they are obtained through a simpler way, more suitable for the university education. (Author)

  14. Board affiliation and pay gap

    Directory of Open Access Journals (Sweden)

    Shenglan Chen

    2014-06-01

    Full Text Available This paper examines the effects of board affiliation on the corporate pay gap. Using a sample of Chinese listed firms from 2005 to 2011, we find that boards with a greater presence of directors appointed by block shareholders have lower pay gaps. Furthermore, the governance effects of board affiliation with and without pay are distinguished. The empirical results show that board affiliation without pay is negatively related to the pay gap, while board affiliation with pay is positively related to the pay gap. Overall, the results shed light on how block shareholders affect their companies’ pay gaps through board affiliation.

  15. SVX Sequencer Board

    International Nuclear Information System (INIS)

    Utes, M.

    1997-01-01

    The SVX Sequencer boards are 9U by 280mm circuit boards that reside in slots 2 through 21 of each of eight Eurocard crates in the D0 Detector Platform. The basic purpose is to control the SVX chips for data acquisition and when a trigger occurs, to gather the SVX data and relay the data to the VRB boards in the Movable Counting House. Functions and features are as follows: (1) Initialization of eight SVX chip strings using the MIL-STD-1553 data bus; (2) Real time manipulation of the SVX control lines to effect data acquisition, digitization, and readout based on the NRZ/Clock signals from the Controller; (3) Conversion of 8-bit electrical SVX readout data to an optical signal operating at 1.062 Gbit/sec, sent to the VRB. Eight HDIs will be serviced per board; (4) Built-in logic analyzer which can record the most important control and data lines during a data acquisition cycle and put this recorded information onto the 1553 bus; (5) Identification header and end of data trailer tacked onto data stream; (6) 1553 register which can read the current values of the control and data lines; (7) 1553 register which can test the optical link; (8) 1553 registers for crossing pulse width, calibration pulse voltage, and calibration pipeline select; (9) 1553 register for reading the optical drivers status link; (10) 1553 register for power control of SVX chips and ignoring bad SVX strings; (11) Front panel displays and LEDs show the board status at a glance; (12) In-system programmable EPLDs are programmed via 1553 or Altera's 'Bitblaster'; (13) Automatic readout abort after 45us; (14) Supplies BUSY signal back to Trigger Framework; (15) Supports a heartbeat system to prevent excessive SVX current draw; and (16) Supports a SVX power trip feature if heartbeat failure occurs.

  16. Microbial micropatches within microbial hotspots

    Science.gov (United States)

    Smith, Renee J.; Tobe, Shanan S.; Paterson, James S.; Seymour, Justin R.; Oliver, Rod L.; Mitchell, James G.

    2018-01-01

    The spatial distributions of organism abundance and diversity are often heterogeneous. This includes the sub-centimetre distributions of microbes, which have ‘hotspots’ of high abundance, and ‘coldspots’ of low abundance. Previously we showed that 300 μl abundance hotspots, coldspots and background regions were distinct at all taxonomic levels. Here we build on these results by showing taxonomic micropatches within these 300 μl microscale hotspots, coldspots and background regions at the 1 μl scale. This heterogeneity among 1 μl subsamples was driven by heightened abundance of specific genera. The micropatches were most pronounced within hotspots. Micropatches were dominated by Pseudomonas, Bacteroides, Parasporobacterium and Lachnospiraceae incertae sedis, with Pseudomonas and Bacteroides being responsible for a shift in the most dominant genera in individual hotspot subsamples, representing up to 80.6% and 47.3% average abundance, respectively. The presence of these micropatches implies the ability these groups have to create, establish themselves in, or exploit heterogeneous microenvironments. These genera are often particle-associated, from which we infer that these micropatches are evidence for sub-millimetre aggregates and the aquatic polymer matrix. These findings support the emerging paradigm that the microscale distributions of planktonic microbes are numerically and taxonomically heterogeneous at scales of millimetres and less. We show that microscale microbial hotspots have internal structure within which specific local nutrient exchanges and cellular interactions might occur. PMID:29787564

  17. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  18. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  19. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  20. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  1. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  2. Board diversity in family firms

    OpenAIRE

    Menozzi, Anna; Fraquelli, Giovanni; Novara, Jolanda de

    2015-01-01

    The paper deals with diversity as a key factor to improve the board of directors’ decision process in family firms. The empirical literature about board diversity points at the positive impact of diversity on board functioning and firm performance. The paper uses a statistical diversity index to capture the heterogeneity of board of directors and put it in relation with firm performance, as measured by firm profitability. The empirical analysis is based on a newly collected panel of 327 famil...

  3. Why Not Charter School Boards?

    Science.gov (United States)

    Schlechty, Phillip C.; Cole, Robert W.

    1993-01-01

    Claiming that individual school board members act in selfish ways, proposes electing entire school board as a slate. Board would collectively be held responsible for performance of the school system and all of its employees. State legislation would be required to specify how interested groups would select a slate and create a charter, which is the…

  4. Board effectiveness: Investigating payment asymmetry between board members and shareholders

    Directory of Open Access Journals (Sweden)

    Wuchun Chi

    2008-01-01

    Full Text Available Board members may well be responsible for dissension between themselves and shareholders since they are simultaneously the setters and receivers of both board remuneration and dividends. They may act out of their own personal interests at the expense of external shareholders. We investigate the impact of ownership structure, board structure and control deviation on payment asymmetry, where excessively high remuneration is paid to board members but considerably lower dividends are distributed to shareholders. We find strong evidence confirming that the smaller the shareholdings of board members and outside blockholders are, the more asymmetric the payments are. With controlling family members on the board and a higher percentage of seats held by independent board members, there is a slight reduction in the likelihood and severity of payment asymmetry. In addition, it is abundantly clear that the larger the board seat-control deviation is, the greater is the likelihood and severity of payment asymmetry. While prior research has primarily focused on board-manager agency issues, the board-shareholder perspective could be even more important in that it is the board that is the most directly delegated agent of shareholders, not the managers

  5. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  6. Pension Fund Governing Board

    CERN Multimedia

    HR Department

    2008-01-01

    Note The CERN pension scheme is based on the principle of defined benefits, so beneficiaries continue to receive the benefits to which they are entitled in accordance with the Rules of the Pension Fund. This means that pension entitlements under the Rules are not directly affected by the financial crisis and the current economic situation. However, the adjustment of pensions to the cost of living is not automatic and, under the method applied since 2006, must take into account the Fund’s financial position. Meeting of the Pension Fund Governing Board The Pension Fund Governing Board held its eighth meeting at ESO in Garching (near Munich), Germany on 24 October 2008. Before starting its work, the Governing Board had the privilege of hearing an opening address by Professor Tim de Zeeuw, the Director General of ESO. Professor de Zeeuw described the mission of ESO and the ambitious projects of his organisation, which performs astronomy observations using telescopes located in Chile. The Director-General receiv...

  7. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  8. 11 Soil Microbial Biomass

    African Journals Online (AJOL)

    186–198. Insam H. (1990). Are the soil microbial biomass and basal respiration governed by the climatic regime? Soil. Biol. Biochem. 22: 525–532. Insam H. D. and Domsch K. H. (1989). Influence of microclimate on soil microbial biomass. Soil Biol. Biochem. 21: 211–21. Jenkinson D. S. (1988). Determination of microbial.

  9. Molecular microbial ecology manual

    NARCIS (Netherlands)

    Kowalchuk, G.A.; Bruijn, de F.J.; Head, I.M.; Akkermans, A.D.L.

    2004-01-01

    The field of microbial ecology has been revolutionized in the past two decades by the introduction of molecular methods into the toolbox of the microbial ecologist. This molecular arsenal has helped to unveil the enormity of microbial diversity across the breadth of the earth's ecosystems, and has

  10. Microbial Rechargeable Battery

    NARCIS (Netherlands)

    Molenaar, Sam D.; Mol, Annemerel R.; Sleutels, Tom H.J.A.; Heijne, Ter Annemiek; Buisman, Cees J.N.

    2016-01-01

    Bioelectrochemical systems hold potential for both conversion of electricity into chemicals through microbial electrosynthesis (MES) and the provision of electrical power by oxidation of organics using microbial fuel cells (MFCs). This study provides a proof of concept for a microbial

  11. Childhood microbial keratitis

    Directory of Open Access Journals (Sweden)

    Abdullah G Al Otaibi

    2012-01-01

    Conclusion: Children with suspected microbial keratitis require comprehensive evaluation and management. Early recognition, identifying the predisposing factors and etiological microbial organisms, and instituting appropriate treatment measures have a crucial role in outcome. Ocular trauma was the leading cause of childhood microbial keratitis in our study.

  12. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  13. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  14. Patients overwhelmingly prefer inpatient boarding to emergency department boarding.

    Science.gov (United States)

    Viccellio, Peter; Zito, Joseph A; Sayage, Valerie; Chohan, Jasmine; Garra, Gregory; Santora, Carolyn; Singer, Adam J

    2013-12-01

    Boarding of admitted patients in the emergency department (ED) is a major cause of crowding. One alternative to boarding in the ED, a full-capacity protocol where boarded patients are redeployed to inpatient units, can reduce crowding and improve overall flow. Our aim was to compare patient satisfaction with boarding in the ED vs. inpatient hallways. We performed a structured telephone survey regarding patient experiences and preferences for boarding among admitted ED patients who experienced boarding in the ED hallway and then were subsequently transferred to inpatient hallways. Demographic and clinical characteristics, as well as patient preferences, including items related to patient comfort and safety using a 5-point scale, were recorded and descriptive statistics were used to summarize the data. Of 110 patients contacted, 105 consented to participate. Mean age was 57 ± 16 years and 52% were female. All patients were initially boarded in the ED in a hallway before their transfer to an inpatient hallway bed. The overall preferred location after admission was the inpatient hallway in 85% (95% confidence interval 75-90) of respondents. In comparing ED vs. inpatient hallway boarding, the following percentages of respondents preferred inpatient boarding with regard to the following 8 items: rest, 85%; safety, 83%; confidentiality, 82%; treatment, 78%; comfort, 79%; quiet, 84%; staff availability, 84%; and privacy, 84%. For no item was there a preference for boarding in the ED. Patients overwhelmingly preferred the inpatient hallway rather than the ED hallway when admitted to the hospital. Copyright © 2013 Elsevier Inc. All rights reserved.

  15. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  16. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  17. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  18. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  19. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  20. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  1. Bioactive natural products from novel microbial sources.

    Science.gov (United States)

    Challinor, Victoria L; Bode, Helge B

    2015-09-01

    Despite the importance of microbial natural products for human health, only a few bacterial genera have been mined for the new natural products needed to overcome the urgent threat of antibiotic resistance. This is surprising, given that genome sequencing projects have revealed that the capability to produce natural products is not a rare feature among bacteria. Even the bacteria occurring in the human microbiome produce potent antibiotics, and thus potentially are an untapped resource for novel compounds, potentially with new activities. This review highlights examples of bacteria that should be considered new sources of natural products, including anaerobes, pathogens, and symbionts of humans, insects, and nematodes. Exploitation of these producer strains, combined with advances in modern natural product research methodology, has the potential to open the way for a new golden age of microbial therapeutics. © 2015 New York Academy of Sciences.

  2. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  3. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  4. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  5. Designing the Microbial Research Commons

    Energy Technology Data Exchange (ETDEWEB)

    Uhlir, Paul F. [Board on Research Data and Information Policy and Global Affairs, Washington, DC (United States)

    2011-10-01

    Recent decades have witnessed an ever-increasing range and volume of digital data. All elements of the pillars of science--whether observation, experiment, or theory and modeling--are being transformed by the continuous cycle of generation, dissemination, and use of factual information. This is even more so in terms of the re-using and re-purposing of digital scientific data beyond the original intent of the data collectors, often with dramatic results. We all know about the potential benefits and impacts of digital data, but we are also aware of the barriers, the challenges in maximizing the access, and use of such data. There is thus a need to think about how a data infrastructure can enhance capabilities for finding, using, and integrating information to accelerate discovery and innovation. How can we best implement an accessible, interoperable digital environment so that the data can be repeatedly used by a wide variety of users in different settings and with different applications? With this objective: to use the microbial communities and microbial data, literature, and the research materials themselves as a test case, the Board on Research Data and Information held an International Symposium on Designing the Microbial Research Commons at the National Academy of Sciences in Washington, DC on 8-9 October 2009. The symposium addressed topics such as models to lower the transaction costs and support access to and use of microbiological materials and digital resources from the perspective of publicly funded research, public-private interactions, and developing country concerns. The overall goal of the symposium was to stimulate more research and implementation of improved legal and institutional models for publicly funded research in microbiology.

  6. 49 CFR 1011.2 - The Board.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION GENERAL RULES AND REGULATIONS BOARD ORGANIZATION; DELEGATIONS OF AUTHORITY § 1011.2 The Board. (a... submitted for decision except those assigned to an individual Board Member or employee or an employee board...) The Board may bring before it any matter assigned to an individual Board Member or employee or...

  7. Threats and Violence in the Lead-up to Psychiatric Mechanical Restraint – a Danish Case Law Study

    DEFF Research Database (Denmark)

    Birkeland, Søren

    for instigating MR is dangerous patient behavior and research has suggested that many MR episodes result from experienced violence or threat of violence by staff these aspects attract special attention. This study analyzes the role of threat, violence, and contextual characteristics in MR lawsuits. Methodology......: In Denmark a Psychiatric Complaint Board considers patients’ complaints about compliance with law. The Board annually makes public a selection of case decisions. A case law review was carried out on all publicly available lawsuits concerning MR completed by the Board during the years 2007-2014 with focus.......g. psychological) or aggressive behavior was described (e.g. humiliating remarks). In 52 cases (32%) there was information that belt fixation had been supplemented with arm or leg fixation. MR was concluded illegal in 124 (76%) of cases and in 33 cases (20%) the duration of MR use was concluded illegal. Among...

  8. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  9. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  10. Microbial contaminants in Pakistan: a review

    Directory of Open Access Journals (Sweden)

    Maida Kanwal

    2016-04-01

    Full Text Available Worldwide contamination of surface waters with microbial pathogens is of substantial health concern. These contaminants are usually transmitted by improper sanitation measures, unsafe waste disposal, excretions from patients, and physical contacts, i.e., sexual and nonsexual. Majority of these microbial pathogens have been categorized into three classes, i.e., bacteria, viruses and protozoa. Pakistan, being a developing country, is facing a noteworthy threat due to microbial contamination. In Pakistan, bacterial contaminants are reported extensively followed by viral and protozoa contaminants. The health issues associated with bacterial population includes dysentery, abdominal pain, headache, diarrhea etc.; and usually includes faecal and total coliforms, E. coli, Salmonella, Shigella and Campylobacter. The cases related to viral contamination are lesser but chronic and evidenced the presence of HCV, HAV, HEV viruses causing hepatitis, and other hepatic disorders. Lastly, the health impacts associated with protozoans are least reported; and a number of diseases such as giardia, cryptosporidium and toxoplasma have been linked with this class of contaminants. The current review compiles information of these biological contaminants along with their health issues in Pakistan. Moreover, potential sources and fate of microbial contaminants are also discussed.

  11. Refinement of boards' role required.

    Science.gov (United States)

    Umbdenstock, R J

    1987-01-01

    The governing board's role in health care is not changing, but new competitive forces necessitate a refinement of the board's approach to fulfilling its role. In a free-standing, community, not-for-profit hospital, the board functions as though it were the "owner." Although it does not truly own the facility in the legal sense, the board does have legal, fiduciary, and financial responsibilities conferred on it by the state. In a religious-sponsored facility, the board fulfills these same obligations on behalf of the sponsoring institute, subject to the institute's reserved powers. In multi-institutional systems, the hospital board's power and authority depend on the role granted it by the system. Boards in all types of facilities are currently faced with the following challenges: Fulfilling their basic responsibilities, such as legal requirements, financial duties, and obligations for the quality of care. Encouraging management and the board itself to "think strategically" in attacking new competitive market forces while protecting the organization's traditional mission and values. Assessing recommended strategies in light of consequences if constituencies think the organization is abandoning its commitments. Boards can take several steps to match their mode of operation with the challenges of the new environment. Boards must rededicate themselves to the hospital's mission. Trustees must expand their understanding of health care trends and issues and their effect on the organization. Boards must evaluate and help strengthen management's performance, rather than acting as a "watchdog" in an adversarial position. Boards must think strategically, rather than focusing solely on operational details. Boards must evaluate the methods they use for conducting business.

  12. What makes great boards great.

    Science.gov (United States)

    Sonnenfeld, Jeffrey A

    2002-09-01

    In the wake of meltdowns at WorldCom, Tyco, and Enron, enormous attention has been focused on the companies' boards. It seems inconceivable that business disasters of such magnitude could happen without gross or even criminal negligence on the part of board members. And yet a close examination of those boards reveals no broad pattern of incompetence or corruption. In fact, they followed most of the accepted standards for board operations: Members showed up for meetings; they had money invested in the company; audit committees, compensation committees, and codes of ethics were in place; the boards weren't too small or too big, nor were they dominated by insiders. In other words, they passed the tests that would normally be applied to determine whether a board of directors was likely to do a good job. And that's precisely what's so scary, according to corporate governance expert Jeffrey Sonnenfeld, who suggests that it's time for some new thinking about how corporate boards operate and are evaluated. He proposes thinking not only about how to structure the board's work but also about how to manage it as a social system. Good boards are, very simply, high-functioning work groups. They're distinguished by a climate of respect, trust, and candor among board members and between the board and management. Information is shared openly and on time; emergent political factions are quickly eliminated. Members feel free to challenge one another's assumptions and conclusions, and management encourages lively discussion of strategic issues. Directors feel a responsibility to contribute meaningfully to the board's performance. In addition, good boards assess their own performance, both collectively and individually.

  13. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  14. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  15. Currency Boards; The Ultimate Fix?

    OpenAIRE

    Atish R. Ghosh

    1998-01-01

    The growing integration of world capital markets has made it fashionable to argue that only extreme exchange rate regimes are sustainable. Short of adopting a common currency, currency board arrangements represent the most extreme form of exchange rate peg. This paper compares the macroeconomic performance of countries with currency boards to those with other forms of pegged exchange rate regime. Currency boards are indeed associated with better inflation performance, even allowing for potent...

  16. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  17. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  18. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  19. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  20. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  1. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  2. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  3. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  4. Pension Fund governing board

    CERN Multimedia

    HR Department

    2008-01-01

    On 16 March and 7 May, the Pension Fund Governing Board (PFGB) held its fourth and fifth meetings The first of these meetings was primarily dedicated to the examination of the strategic asset allocation. The PFGB reaffirmed the main goal of the new strategic asset allocation: to improve the Pension Fund’s position with regard to risk by lowering overall portfolio volatility through suitable investments in less volatile asset classes such as real estate and absolute return strategies, where the return does not depend on market trends and negative growth is extremely unlikely. The finalised document will be presented to the Finance Committee and the Council at their June meetings for approval, in accordance with the provisions of the Levaux report. The PFGB also took note of the Internal Audit’s report on Pension Fund operations and decided to refer it to Working Group I as a working document for establishing a control and internal monitoring system for Pension Fund oper...

  5. Microbial electrosynthetic cells

    Energy Technology Data Exchange (ETDEWEB)

    May, Harold D.; Marshall, Christopher W.; Labelle, Edward V.

    2018-01-30

    Methods are provided for microbial electrosynthesis of H.sub.2 and organic compounds such as methane and acetate. Method of producing mature electrosynthetic microbial populations by continuous culture is also provided. Microbial populations produced in accordance with the embodiments as shown to efficiently synthesize H.sub.2, methane and acetate in the presence of CO.sub.2 and a voltage potential. The production of biodegradable and renewable plastics from electricity and carbon dioxide is also disclosed.

  6. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  7. An Olive Branch for Boards.

    Science.gov (United States)

    Harrington-Lueker, Donna

    1993-01-01

    Peacekeeping strategies for school-board meetings include developing a code of conduct that spells out guidelines for behavior and then enforcing it; bringing in a neutral observer to help board members work through what is really worrying them; and concentrating on policy. (MLF)

  8. General purpose programmable accelerator board

    Science.gov (United States)

    Robertson, Perry J.; Witzke, Edward L.

    2001-01-01

    A general purpose accelerator board and acceleration method comprising use of: one or more programmable logic devices; a plurality of memory blocks; bus interface for communicating data between the memory blocks and devices external to the board; and dynamic programming capabilities for providing logic to the programmable logic device to be executed on data in the memory blocks.

  9. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  10. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  11. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  12. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  13. German versus Nordic Board Models

    DEFF Research Database (Denmark)

    Ringe, Georg

    2016-01-01

    Board structure is an important component of the individual governance of firms, and the appropriateness of the various models is one of the most debated issues in corporate governance today. A comparison of the Nordic and German approaches to the structure of corporate boards reveals stark...... conceptual differences, as emphasized by the 2014 Lekvall Report on the Nordic Corporate Governance Model. This article provides a conceptual comparison between the two approaches to board structure and confirms the fundamental divergence between both models. However, relying on a number of recent legal...... changes and developments in business practice, the article argues that board practices in the two systems effectively blur the structural distinction, and that board organization is converging in practice. It thereby contributes to the broader debates on functionality and comparative corporate law...

  14. 49 CFR 1011.5 - Employee boards.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Employee boards. 1011.5 Section 1011.5... OF TRANSPORTATION GENERAL RULES AND REGULATIONS BOARD ORGANIZATION; DELEGATIONS OF AUTHORITY § 1011.5 Employee boards. This section covers matters assigned to the Accounting Board, a board of employees of the...

  15. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    annual investment of about $2.5 billion. The study also recommended that the Department of Defense enhance its ab ility to perform the kinds of broad...homeland fundamentally change the nature of the problem to one of strategic deterrence and that the spirit of the terms of reference was more...adversary investments in regional, precision attack cruise and ballistic threaten that foundation, investments that have dramatically increased both

  16. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  17. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  18. Microbial accumulation of uranium

    International Nuclear Information System (INIS)

    Zhang Wei; Dong Faqin; Dai Qunwei

    2005-01-01

    The mechanism of microbial accumulation of uranium and the effects of some factors (including pH, initial uranium concentration, pretreatment of bacteria, and so on) on microbial accumulation of uranium are discussed briefly. The research direction and application prospect are presented. (authors)

  19. MICROBIAL FUEL CELL

    DEFF Research Database (Denmark)

    2008-01-01

    A novel microbial fuel cell construction for the generation of electrical energy. The microbial fuel cell comprises: (i) an anode electrode, (ii) a cathode chamber, said cathode chamber comprising an in let through which an influent enters the cathode chamber, an outlet through which an effluent...

  20. Microbial control of pollution

    Energy Technology Data Exchange (ETDEWEB)

    Fry, J C; Gadd, G M; Herbert, R A; Jones, C W; Watson-Craik, I A [eds.

    1992-01-01

    12 papers are presented on the microbial control of pollution. Topics covered include: bioremediation of oil spills; microbial control of heavy metal pollution; pollution control using microorganisms and magnetic separation; degradation of cyanide and nitriles; nitrogen removal from water and waste; and land reclamation and restoration.

  1. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  2. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  3. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  4. Crowdsourcing for children : exploring threats and opportunities

    NARCIS (Netherlands)

    de Wit, J.M.S.; Manojlovic, S.; Gavrilo, K.; Khan, J.V.; Hansson, K.; Aitamurto, T.; Ludwig, T.; Gupta, N.; Muller, M.

    2016-01-01

    Children are increasingly being engaged in product development, but they have yet to be introduced to the concept of crowdsourcing. Several opportunities and threats when designing a crowdsourcing platform specifically for children are proposed as topics for further discussion.

  5. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  6. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  7. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  8. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  9. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... Form Controls Cancel Submit Search The CDC Antibiotic / Antimicrobial Resistance Note: Javascript is disabled or is not ... please visit this page: About CDC.gov . Antibiotic / Antimicrobial Resistance About Antimicrobial Resistance Biggest Threats Emerging Drug ...

  10. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  11. Association of Regulatory Boards of Optometry

    Science.gov (United States)

    ... website of the Association of Regulatory Boards of Optometry (ARBO). ARBO's web site is designed to provide resources to regulatory boards of optometry throughout the world. State/Provincial/Territorial Boards of ...

  12. 76 FR 21877 - Environmental Management Advisory Board

    Science.gov (United States)

    2011-04-19

    ... DEPARTMENT OF ENERGY Environmental Management Advisory Board AGENCY: Department of Energy. ACTION: Notice of call for nominations for appointment to the Environmental Management Advisory Board. SUMMARY... Environmental Management Advisory Board. DATES: Nominations will be accepted through May 13, 2011. ADDRESSES...

  13. 78 FR 66384 - Membership of the Merit Systems Protection Board's Performance Review Board

    Science.gov (United States)

    2013-11-05

    ... MERIT SYSTEMS PROTECTION BOARD Membership of the Merit Systems Protection Board's Performance Review Board AGENCY: Merit Systems Protection Board. ACTION: Notice. SUMMARY: Notice is hereby given of the members of the Merit Systems Protection Board's Performance Review Board. DATES: November 5, 2013...

  14. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  15. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  16. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  17. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  18. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  19. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  20. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  1. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  2. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  3. Microbial Forensics: A Scientific Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Paul

    2003-02-17

    procedures and training to meet these initial challenges so as minimize disturbance of the evidence. While epidemiology and forensics are similar sciences with similar goals when applied to biocrimes, forensics has additional and more stringent requirements. Maintaining a chain of custody on evidentiary samples is one example of an extra requirement imposed on an investigation of a biocrime. Another issue is the intent in microbial forensics to identify a bioattack organism in greatest detail. If possible, forensic investigations will strive to identify the precise strain and substrain, rather than just to the species level, which might be sufficient in an epidemiological investigation. Although multiple groups have developed lists of bioterrorism target pathogens, these lists are too narrow. An expansion of microorganisms relevant to food and water threats should be considered. Computerized networks should be established to track infectious disease outbreaks in real time. These systems could alert public health and agricultural officials to the existence of a potential bioattack earlier than simply waiting for a report of a suspicious cluster of similar patients. Once a biocrime is suspected, a wide variety of methods are available to identify the microorganism used in the bioattack and to analyze features that might lead to the source of the event. A multi-pronged approach to such an investigation may be preferable, using many available methods-ranging from genomics to sequencing to physiology to analysis of substances in the sample. Microbial forensics will be most effective if there is sufficient basic scientific information concerning microbial genetics, evolution, physiology, and ecology. Strain subtyping analysis will be difficult to interpret if we do not understand some of the basic evolutionary mechanisms and population diversity of pathogens. Phenotypic features associated with evidentiary pathogens also may provide investigative leads, but full exploitation of

  4. An agenda for board research

    Directory of Open Access Journals (Sweden)

    Sandra Guerra

    2008-01-01

    Full Text Available Scholarly investigations on the board of directors, although intense from the mid-1990s onward, did not lead to entirely convincing results. This study proposes discussion on building a multidisciplinary and integrated theoretical framework able to capture the complexity and distinctive dimensions of the board as a group decision-making process. This is achieved through an essay developed from analytical and descriptive review of the literature. A synthesis on board research is presented, aiming to understand theoretical models lenses used to study corporate governance issues. The strengths and weaknesses of these models are pointed out, and their influence on board investigation is observed. This essay concludes by proposing a research agenda that considers the addition of psychological and sociological approaches to economic models of the analysis of group decision-making

  5. Specialty Board on Fluency Disorders

    Science.gov (United States)

    ... or large groups of speech-language pathologists. Speech-language pathologists who are Board Certified Specialists in Fluency may be found on this website by searching name, city(location) or zip code. ...

  6. Investor Perceptions of Board Performance

    DEFF Research Database (Denmark)

    Fischer, Paul E.; Gramlich, Jeffrey D.; Miller, Brian P.

    2009-01-01

    This paper provides evidence that uncontested director elections provide informative polls of investor perceptions regarding board performance. We find that higher (lower) vote approval is associated with lower (higher) stock price reactions to subsequent announcements of management turnovers. In...

  7. Employee on Boarding Process Automation

    OpenAIRE

    Khushboo Nalband; Priyanka Jadhav; Geetanjali Salunke

    2017-01-01

    On boarding, also known as organizational socialization, plays a vital role in building the initial relationship between an organization and an employee. It also contributes to an employees’ satisfaction, better performance and greater organizational commitment thus increasing an employees’ effectiveness and productivity in his/her role. Therefore, it is essential that on boarding process of an organization is efficient and effective to improve new employees’ retention. Generally this on boar...

  8. African marketing boards under structural adjustment : the experience of Sub-Saharan Africa during the 1980s

    NARCIS (Netherlands)

    Laan, van der H.L.; Haaren, van W.T.M.

    1990-01-01

    Sum.: The economic policy of structural adjustment, which was initiated in most African countries during the 1980s, posed a serious threat to agricultural marketing boards in sub-Saharan Africa. Two elements of structural adjustment were particularly ominous: 'privatization' threatened the continued

  9. Assessment of the microbial quality of river water sources in rural ...

    African Journals Online (AJOL)

    drinie

    2002-07-03

    Jul 3, 2002 ... Assessment of the microbial quality of river water sources ... These untreated water sources are used for drinking and domestic purposes and pose a serious threat to ... These diseases cause crippling, devastating and debilitating effects ..... gastrointestinal illness, due mainly by enteric viruses in sewage.

  10. Method for the prioritization of areas experiencing microbial pollution of surface water

    CSIR Research Space (South Africa)

    Venter, SN

    1998-01-01

    Full Text Available The increased threat of faecal pollution in recent years and the high priority of protecting human health by the government led to the initiation of a national microbial monitoring programme for surface water in South Africa. According to the design...

  11. Why board of nursing disciplinary actions do not always yield the expected results.

    Science.gov (United States)

    Raper, James Luther; Hudspeth, Randall

    2008-01-01

    One of the ways boards of nursing serve to protect the public health, safety, and welfare is by removing from practice those nurses who fail to meet recognized standards of care or otherwise pose a public threat. Self-reporting and discovery through criminal background checks and reports from the court system or other regulatory bodies represent only small numbers of those disciplined. Most complaints investigated by a board are reported by nursing administrators, either chief nursing officers or nurse managers. Frequently, the reporting nurses provide the board with information from their own investigation that identifies the problem and the cause and includes supporting evidence. Based on their own independent investigation, the reporting nurses often assume that the outcome of board action is a foregone conclusion. Without understanding all of the ramifications of disciplinary processes and the requirements to protect the rights of the nurse that are guaranteed under the US Constitution, the final outcome decision can be totally different than anticipated and thus disappointing to the reporting nurse administrator. They could perceive the decision as wrong, nonsupportive, and discounting the efforts made by the reporting nurse. This unhappiness with the outcome causes vulnerability in the major reporting source to a board, namely, the relationship between the board and the nurse administrator. An initial step in mitigating this vulnerability is a better understanding by nursing administrators of the legal procedures that guide disciplinary processes and boards providing timely feedback to reporting nurses on the disposition of cases.

  12. Evolution of microbial pathogens

    National Research Council Canada - National Science Library

    DiRita, Victor J; Seifert, H. Steven

    2006-01-01

    ... A. Hogan vvi ■ CONTENTS 8. Evolution of Pathogens in Soil Rachel Muir and Man-Wah Tan / 131 9. Experimental Models of Symbiotic Host-Microbial Relationships: Understanding the Underpinnings of ...

  13. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  14. Synthetic Electric Microbial Biosensors

    Science.gov (United States)

    2017-06-10

    domains and DNA-binding domains into a single protein for deregulation of down stream genes of have been favored [10]. Initially experiments with... Germany DISTRIBUTION A. Approved for public release: distribution unlimited.   Talk title: “Synthetic biology based microbial biosensors for the...toolbox” in Heidelberg, Germany Poster title: “Anaerobic whole cell microbial biosensors” Link: http://phdsymposium.embl.org/#home   September, 2014

  15. Microbial bioinformatics 2020.

    Science.gov (United States)

    Pallen, Mark J

    2016-09-01

    Microbial bioinformatics in 2020 will remain a vibrant, creative discipline, adding value to the ever-growing flood of new sequence data, while embracing novel technologies and fresh approaches. Databases and search strategies will struggle to cope and manual curation will not be sustainable during the scale-up to the million-microbial-genome era. Microbial taxonomy will have to adapt to a situation in which most microorganisms are discovered and characterised through the analysis of sequences. Genome sequencing will become a routine approach in clinical and research laboratories, with fresh demands for interpretable user-friendly outputs. The "internet of things" will penetrate healthcare systems, so that even a piece of hospital plumbing might have its own IP address that can be integrated with pathogen genome sequences. Microbiome mania will continue, but the tide will turn from molecular barcoding towards metagenomics. Crowd-sourced analyses will collide with cloud computing, but eternal vigilance will be the price of preventing the misinterpretation and overselling of microbial sequence data. Output from hand-held sequencers will be analysed on mobile devices. Open-source training materials will address the need for the development of a skilled labour force. As we boldly go into the third decade of the twenty-first century, microbial sequence space will remain the final frontier! © 2016 The Author. Microbial Biotechnology published by John Wiley & Sons Ltd and Society for Applied Microbiology.

  16. Presidential Search: An Overview for Board Members

    Science.gov (United States)

    Association of Governing Boards of Universities and Colleges, 2012

    2012-01-01

    The selection of a president is a governing board's most important responsibility, and the search process is the board's best opportunity to help guide its institution into a successful new era. This guide outlines the leadership roles during a search (those of the board, the board chair, the search committee, and others), briefs board…

  17. Bringing out the Best Board Behavior

    Science.gov (United States)

    Caruso, Nicholas

    2004-01-01

    The author's advice for for a school board superintendent is to assume incompetence instead of malevolence. Board members who behave inappropriately are a minority, and those with malicious intent are extremely rare. Most misbehaving board members act out of frustration. They may not understand the appropriate role of a board member.…

  18. 22 CFR 902.3 - Board staff.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Board staff. 902.3 Section 902.3 Foreign Relations FOREIGN SERVICE GRIEVANCE BOARD ORGANIZATION § 902.3 Board staff. The chairperson shall select the Board's executive secretary and other staff provided for in the Act. The executive secretary and staff...

  19. Advisory Boards: Gateway to Business Engagement

    Science.gov (United States)

    Meeder, Hans; Pawlowski, Brett

    2012-01-01

    Interest has been growing in how to build or manage an effective business advisory board. Developing an advisory board is crucial to keeping CTE programs relevant and viable by engaging the support of business and industry. This article delves into how to build and manage a board, and how to re-energize boards that already exist but may be lacking.

  20. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  1. Response of soil microbial communities and microbial interactions to long-term heavy metal contamination.

    Science.gov (United States)

    Li, Xiaoqi; Meng, Delong; Li, Juan; Yin, Huaqun; Liu, Hongwei; Liu, Xueduan; Cheng, Cheng; Xiao, Yunhua; Liu, Zhenghua; Yan, Mingli

    2017-12-01

    Due to the persistence of metals in the ecosystem and their threat to all living organisms, effects of heavy metal on soil microbial communities were widely studied. However, little was known about the interactions among microorganisms in heavy metal-contaminated soils. In the present study, microbial communities in Non (CON), moderately (CL) and severely (CH) contaminated soils were investigated through high-throughput Illumina sequencing of 16s rRNA gene amplicons, and networks were constructed to show the interactions among microbes. Results showed that the microbial community composition was significantly, while the microbial diversity was not significantly affected by heavy metal contamination. Bacteria showed various response to heavy metals. Bacteria that positively correlated with Cd, e.g. Acidobacteria_Gp and Proteobacteria_thiobacillus, had more links between nodes and more positive interactions among microbes in CL- and CH-networks, while bacteria that negatively correlated with Cd, e.g. Longilinea, Gp2 and Gp4 had fewer network links and more negative interactions in CL and CH-networks. Unlike bacteria, members of the archaeal domain, i.e. phyla Crenarchaeota and Euryarchaeota, class Thermoprotei and order Thermoplasmatales showed only positive correlation with Cd and had more network interactions in CH-networks. The present study indicated that (i) the microbial community composition, as well as network interactions was shift to strengthen adaptability of microorganisms to heavy metal contamination, (ii) archaea were resistant to heavy metal contamination and may contribute to the adaption to heavy metals. It was proposed that the contribution might be achieved either by improving environment conditions or by cooperative interactions. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  3. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  4. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  5. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  6. The new Board of Governors

    International Nuclear Information System (INIS)

    1964-01-01

    Full text: Miss Blanche Margaret Meagher was elected chairman of the IAEA Board of Governors for 1964-65, after the new Board had been constituted at the Eighth Session of the General Conference in September. Since 1962 Miss Meagher has been Canadian Ambassador to Austria, and Canadian Governor of the Agency. Miss Meagher joined the Canadian Department of External Affairs in 1942, and has held a number of foreign diplomatic appointments; she has also served on Canadian delegations to the UN Educational, Scientific and Cultural Organization, the International Telecommunication Union, the Economic and Social Council of UN and the UN Disarmament Sub-Committee. The Vice-Chairmen of the Board are Mr. Wilhelm Billig (Poland) and Mr. Hassan M. Tohamy (UAR). Mr. Billig is Chairman of the State Council for Atomic Energy, and High Commissioner for Peaceful Uses of Atomic Energy. Mr. Tohamy is Ambassador to Austria, and Resident Representative to the Agency. Of the twelve elected members of the Board, five were chosen by the General Conference in 1964 for two years, viz. Argentina, Chile, Netherlands, Thailand and the United Arab Republic. Seven were elected in 1963: Afghanistan, China, Congo (Leopoldville), Morocco, Romania, Switzerland and Uruguay. The remaining thirteen members have been designated by the Board: Australia, Belgium, Brazil, Canada, Finland, France, India, Japan, Poland, South Africa, USSR, United Kingdom and United States. (author)

  7. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  8. Microbial ecology and biogeochemistry of continental Antarctic soils

    Directory of Open Access Journals (Sweden)

    Don A Cowan

    2014-04-01

    Full Text Available The Antarctica Dry Valleys are regarded as the coldest hyperarid desert system on Earth. While a wide variety of environmental stressors including very low minimum temperatures, frequent freeze-thaw cycles and low water availability impose severe limitations to life, suitable niches for abundant microbial colonization exist. Antarctic desert soils contain much higher levels of microbial diversity than previously thought. Edaphic niches, including cryptic and refuge habitats, microbial mats and permafrost soils all harbour microbial communities which drive key biogeochemical cycling processes. For example, lithobionts (hypoliths and endoliths possess a genetic capacity for nitrogen and carbon cycling, polymer degradation and other system processes. Nitrogen fixation rates of hypoliths, as assessed through acetylene reduction assays, suggest that these communities are a significant input source for nitrogen into these oligotrophic soils. Here we review aspects of microbial diversity in Antarctic soils with an emphasis on functionality and capacity. We assess current knowledge regarding adaptations to Antarctic soil environments and highlight the current threats to Antarctic desert soil communities.

  9. Microbial ecology and biogeochemistry of continental Antarctic soils.

    Science.gov (United States)

    Cowan, Don A; Makhalanyane, Thulani P; Dennis, Paul G; Hopkins, David W

    2014-01-01

    The Antarctica Dry Valleys are regarded as the coldest hyperarid desert system on Earth. While a wide variety of environmental stressors including very low minimum temperatures, frequent freeze-thaw cycles and low water availability impose severe limitations to life, suitable niches for abundant microbial colonization exist. Antarctic desert soils contain much higher levels of microbial diversity than previously thought. Edaphic niches, including cryptic and refuge habitats, microbial mats and permafrost soils all harbor microbial communities which drive key biogeochemical cycling processes. For example, lithobionts (hypoliths and endoliths) possess a genetic capacity for nitrogen and carbon cycling, polymer degradation, and other system processes. Nitrogen fixation rates of hypoliths, as assessed through acetylene reduction assays, suggest that these communities are a significant input source for nitrogen into these oligotrophic soils. Here we review aspects of microbial diversity in Antarctic soils with an emphasis on functionality and capacity. We assess current knowledge regarding adaptations to Antarctic soil environments and highlight the current threats to Antarctic desert soil communities.

  10. Hepatitis C Virus in North Africa: An Emerging Threat

    Directory of Open Access Journals (Sweden)

    Mohamed A. Daw

    2016-01-01

    Full Text Available Hepatitis C virus is a major public health threat associated with serious clinical consequences worldwide. North Africa is a unique region composed of seven countries that vary considerably in the predisposing factors to microbial diseases both historically and at the present time. The dynamics of HCV in the region are not well documented. The data are both limited and controversial in most of the countries in the region. In North Africa, the epidemiology of HCV is disparate and understanding it has been hampered by regional “epidemiological homogeneity” concepts. As the dynamics of HCV vary from country to country, context-specific research is needed. In this review, we assess studies performed in each country in the general populations as well as among blood donors and groups exposed to the HCV infection. The reported prevalence of HCV ranges from 0.6% to 8.4% in the Maghreb countries and is predominated by genotype 1. In the Nile valley region, it ranges from 2.2% to 18.9% and is dominated by genotype 4. In North African countries, HCV seems to be a serious problem that is driven by different vectors even in different geographical locations within the same country. Efforts should be combined at both the national and regional levels to implement efficient preventive and treatment strategies.

  11. Controlling electronics boards with PVSS

    CERN Document Server

    Jacobsson, Richard

    2005-01-01

    This paper addresses several aspects of implementing a control system for electronics boards in order to perform remote Field Programmable Gate Array (FPGA) programming, hardware configuration, register control, and monitoring, as well as interfacing it to an expert system. The paper presents an implementation, using the Distributed Information Management (DIM) package and the industrial SCADA system PVSS II from ETM, in which the access mechanisms to the board resources are completely generic and in which the device prescription and the handling of mapping between functional parameters and physical registers follow a common structure independent of the board type. The control system also incorporates mechanisms by which it may be controlled from a finite state machine based expert system. Finally the paper suggests an improvement in which the mapping between logical parameters and physical registers is represented by descriptors in the device description such that the translation can be handled by a common m...

  12. Segregation in a Galton Board

    International Nuclear Information System (INIS)

    Benito, J G; Vidales, A M; Ippolito, I

    2009-01-01

    This work deals with a numerical study of the problem of separation of particles with different elastic properties. The separation procedure uses a Galton Board which consist in a bidimensional system of obstacles arranged in a triangular lattice. Disks of equal diameters but different elastic properties are launched from the top of the device. The Galton Board is commonly used for mixing particles, but here, we intend to find special conditions under which one can use it as a segregating device. We introduce a mixture of particles and generate, through simulations, different conditions to favor the segregation process based on the different elastic coefficients of the particles. We inspect which is the best configuration of size, density of obstacles and wall separation to favor the separations of particles. Our results prove that the Galton Board can be used as a segregation device under certain conditions.

  13. Institutional Evolution and Corporate Boards

    DEFF Research Database (Denmark)

    Chen, Victor Zitian; Hobdari, Bersant; Sun, Pei

    2014-01-01

    We argue that corporate boards are a dynamic repository of human- and social capital in response to external institutional evolution. Theoretically, integrating institutional economics, agency theory and resource dependence theory, we explain that evolution of market-, legal- and political......, since the board changes are typically proposed by the block shareholders, whose motivation for doing so is closely associated with a corporation’s financial performance, we further argue that financial performance is a key moderator of the relationships between institutional evolution and changes...... institutions restructures the particular context in which board members play their two primary roles: monitoring the CEO on behalf of the shareholders, suggested by the agency theory, and supporting the CEO by providing resources, knowledge and information, suggested by the resource dependence theory...

  14. Board's system of publications. [National Radiological Protection Board

    Energy Technology Data Exchange (ETDEWEB)

    Gaines, M J [National Radiological Protection Board, Harwell (UK)

    1978-07-01

    The purpose of each of the several classes of publication issued by the National Radiological Protection Board is stated. The classes are: advice on standards for protection, emergency reference levels, technical reports, instrument evaluation reports, annual research and development reports, three-yearly reports on the work of the NRPB, miscellaneous specialist booklets, publications for the layman, radiological protection bulletin, information sheets, and brochures.

  15. The Board's Role in Financial Oversight. AGB Board Essentials Series

    Science.gov (United States)

    Krawitz, Natalie

    2015-01-01

    An often-volatile economy, changing demographics, and technological innovations in educational delivery are among the dramatic changes across higher education that have forced boards and institutions to question the viability of the existing business model. Flat or declining state support in real terms, lower investment returns in some years,…

  16. Microbial conversion technologies

    Energy Technology Data Exchange (ETDEWEB)

    Lau, P. [National Research Council of Canada, Ottawa, ON (Canada). Bioconversion and Sustainable Development

    2006-07-01

    Microbes are a biomass and an valuable resource. This presentation discussed microbial conversion technologies along with background information on microbial cells, their characteristics and microbial diversity. Untapped opportunities for microbial conversion were identified. Metagenomic and genome mining approaches were also discussed, as they can provide access to uncultivated or unculturable microorganisms in communal populations and are an unlimited resource for biocatalysts, novel genes and metabolites. Genome mining was seen as an economical approach. The presentation also emphasized that the development of microbial biorefineries would require significant insights into the relevant microorganisms and that biocatalysts were the ultimate in sustainability. In addition, the presentation discussed the natural fibres initiative for biochemicals and biomaterials. Anticipated outputs were identified and work in progress of a new enzyme-retting cocktail to provide diversity and/or consistency in fibre characteristics for various applications were also presented. It was concluded that it is necessary to leverage understanding of biological processes to produce bioproducts in a clean and sustainable manner. tabs., figs.

  17. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  18. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  19. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  20. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  1. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  2. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  3. Cyber threat intelligence exchange: A growing requirement

    CSIR Research Space (South Africa)

    Veerasamy, Namosha

    2017-06-01

    Full Text Available Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a...

  4. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  5. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  6. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  7. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  8. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic

  9. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  10. The Divisive Threat of Immigration in Europe

    Science.gov (United States)

    2012-12-01

    Wilders established the Party for Freedom (PVV), in 2005 with a strong anti-immigration agenda. The party believes Judeo-Christian and humanist ...Allied administration of post-WWI Europe. Right-wing movements of the 60’s and 80’s were a response to an existential threat during the Cold War rather

  11. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  12. The importance of board independence

    NARCIS (Netherlands)

    Zijl, N.J.M.

    2012-01-01

    Although the attributed importance of board independence is high, a clear definition of independence does not exist. Furthermore, the aim and consequences of independence are the subject of discussion and empirical evidence about the impact of independence is weak and disputable. Despite this lack

  13. Joint Advisory Appeals Board report

    CERN Document Server

    Lalande, Amanda

    2018-01-01

    With regard to the internal appeal procedure, Article R VI 1.18 of the Staff Rules and Regulations states that unless the member of the personnel objects, (the) decision and report of the JAAB (Joint Advisory Appeals Board) shall be brought to the attention of the members of the personnel.

  14. Faculty Communication with Governing Boards

    Science.gov (United States)

    Tiede, Hans-Joerg

    2013-01-01

    College and university governance works best when every constituency within the institution has a clear understanding of its role with respect to the other constituencies. It works best when communication among the governing board, the administration, and the faculty (not to mention the staff and students) is regular, open, and honest. Too often…

  15. The Atomic Energy Control Board

    International Nuclear Information System (INIS)

    Shultz, R.J.

    1980-01-01

    Certain aspects of the Atomic Energy Control Board's relationships with Cabinet, the Minister, Government officials, The licensees and the public are analyzed. The way some of the relationships would have been modified by the Nuclear Control and Administration Act proposed in 1977 is examined. (L.L.)

  16. Assessing Your Board's Risk Tolerance

    Science.gov (United States)

    Griswold, John S.; Jarvis, William F.

    2014-01-01

    In the wake of the financial crisis, trustees of many endowed nonprofit institutions realized that their portfolio was riskier than they thought and their own ability to tolerate loss wasn't as strong as they imagined. What can board and investment committee members do to improve their ability to assess their--and their institution's--capacity for…

  17. Internationalilzation of the Firm and its Board

    DEFF Research Database (Denmark)

    Oxelheim, Lars; Gregoric, Aleksandra; Randøy, Trond

    competencies required by firm internationalization positively affect board internationalization, whereas the impact of the internationalization of a firm’s commercial operations is positive but not significant across all model specifications. We find that the higher the number of national board members......, the amount of foreigners on the nomination committee also positively relates to the number of foreigners on the board. Rather than age, the median board tenure negatively impacts the prevalence of foreigners on the supervisory board. This barrier to board internationalization may reflect conservatism, fear...

  18. EVA Suit Microbial Leakage Investigation

    Data.gov (United States)

    National Aeronautics and Space Administration — The objective of this project is to collect microbial samples from various EVA suits to determine how much microbial contamination is typically released during...

  19. Microbial Biofilm as a Smart Material

    Directory of Open Access Journals (Sweden)

    Christian Garde

    2015-02-01

    Full Text Available Microbial biofilm colonies will in many cases form a smart material capable of responding to external threats dependent on their size and internal state. The microbial community accordingly switches between passive, protective, or attack modes of action. In order to decide which strategy to employ, it is essential for the biofilm community to be able to sense its own size. The sensor designed to perform this task is termed a quorum sensor, since it only permits collective behaviour once a sufficiently large assembly of microbes have been established. The generic quorum sensor construct involves two genes, one coding for the production of a diffusible signal molecule and one coding for a regulator protein dedicated to sensing the signal molecules. A positive feedback in the signal molecule production sets a well-defined condition for switching into the collective mode. The activation of the regulator involves a slow dimerization, which allows low-pass filtering of the activation of the collective mode. Here, we review and combine the model components that form the basic quorum sensor in a number of Gram-negative bacteria, e.g., Pseudomonas aeruginosa.

  20. A review of the impacts of degradation threats on soil properties in the UK.

    Science.gov (United States)

    Gregory, A S; Ritz, K; McGrath, S P; Quinton, J N; Goulding, K W T; Jones, R J A; Harris, J A; Bol, R; Wallace, P; Pilgrim, E S; Whitmore, A P

    2015-10-01

    National governments are becoming increasingly aware of the importance of their soil resources and are shaping strategies accordingly. Implicit in any such strategy is that degradation threats and their potential effect on important soil properties and functions are defined and understood. In this paper, we aimed to review the principal degradation threats on important soil properties in the UK, seeking quantitative data where possible. Soil erosion results in the removal of important topsoil and, with it, nutrients, C and porosity. A decline in soil organic matter principally affects soil biological and microbiological properties, but also impacts on soil physical properties because of the link with soil structure. Soil contamination affects soil chemical properties, affecting nutrient availability and degrading microbial properties, whilst soil compaction degrades the soil pore network. Soil sealing removes the link between the soil and most of the 'spheres', significantly affecting hydrological and microbial functions, and soils on re-developed brownfield sites are typically degraded in most soil properties. Having synthesized the literature on the impact on soil properties, we discuss potential subsequent impacts on the important soil functions, including food and fibre production, storage of water and C, support for biodiversity, and protection of cultural and archaeological heritage. Looking forward, we suggest a twin approach of field-based monitoring supported by controlled laboratory experimentation to improve our mechanistic understanding of soils. This would enable us to better predict future impacts of degradation processes, including climate change, on soil properties and functions so that we may manage soil resources sustainably.

  1. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  2. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  3. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  4. Molecular ecology of microbial mats

    NARCIS (Netherlands)

    Bolhuis, H.; Cretoiu, M.S.; Stal, L.J.

    2014-01-01

    Phototrophic microbial mats are ideal model systems for ecological and evolutionary analysis of highly diverse microbial communities. Microbial mats are small-scale, nearly closed, and self-sustaining benthic ecosystems that comprise the major element cycles, trophic levels, and food webs. The steep

  5. Threatened corals provide underexplored microbial habitats.

    Directory of Open Access Journals (Sweden)

    Shinichi Sunagawa

    2010-03-01

    Full Text Available Contemporary in-depth sequencing of environmental samples has provided novel insights into microbial community structures, revealing that their diversity had been previously underestimated. Communities in marine environments are commonly composed of a few dominant taxa and a high number of taxonomically diverse, low-abundance organisms. However, studying the roles and genomic information of these "rare" organisms remains challenging, because little is known about their ecological niches and the environmental conditions to which they respond. Given the current threat to coral reef ecosystems, we investigated the potential of corals to provide highly specialized habitats for bacterial taxa including those that are rarely detected or absent in surrounding reef waters. The analysis of more than 350,000 small subunit ribosomal RNA (16S rRNA sequence tags and almost 2,000 nearly full-length 16S rRNA gene sequences revealed that rare seawater biosphere members are highly abundant or even dominant in diverse Caribbean corals. Closely related corals (in the same genus/family harbored similar bacterial communities. At higher taxonomic levels, however, the similarities of these communities did not correlate with the phylogenetic relationships among corals, opening novel questions about the evolutionary stability of coral-microbial associations. Large proportions of OTUs (28.7-49.1% were unique to the coral species of origin. Analysis of the most dominant ribotypes suggests that many uncovered bacterial taxa exist in coral habitats and await future exploration. Our results indicate that coral species, and by extension other animal hosts, act as specialized habitats of otherwise rare microbes in marine ecosystems. Here, deep sequencing provided insights into coral microbiota at an unparalleled resolution and revealed that corals harbor many bacterial taxa previously not known. Given that two of the coral species investigated are listed as threatened under

  6. Why monetary board: Monetary board and endogenic price flexibility

    Directory of Open Access Journals (Sweden)

    Bašić Tamara

    2004-01-01

    Full Text Available The paper presents a model which proves that a unilateral exchange rate fixing, i.e. monetary board, as opposed to certain opinions, is an optimal policy since it increases flexibility of nominal prices, which is the ultimate goal of a flexible exchange rate policy. A suitable calibration of the model shows that the higher the initial price flexibility, the lower the difference needed for "utility increase" in getting the producers to switch from fixed to flexible prices. The results obtained in all cases indicate that exchange rate fixing increases price flexibility, which proves that a unilateral exchange rate fixing, i.e. monetary board, could be an optimal monetary policy.

  7. Board members’ contribution to strategy: The mediating role of board internal processes

    Directory of Open Access Journals (Sweden)

    Carmen Barroso-Castro

    2017-05-01

    Full Text Available This study aims to explore what directors do on the board, to what extent the processes occurring in the board allow the sharing and integrating of the existing knowledge, thus facilitating the board members’ contributions to strategy. We adopt the view that the internal board processes increase the impact of the cognitive resources on board performance. Using survey data from 200 large Spanish companies we demonstrate that directors’ level of knowledge of the firm and board job-related diversity positively influence the degree of the board's strategic involvement. Additionally, the internal processes that take place within the board – particularly Cognitive Conflict, the Critical and Independent Approach and the Comprehensive Discussion Process – influence the board's strategic involvement and play a partial mediating role on the aforementioned relationships. However, our results show no evidence for a positive relationship between Board Meeting Dynamics and the board's strategic involvement.

  8. Anaerobic microbial dehalogenation

    NARCIS (Netherlands)

    Smidt, H.; Vos, de W.M.

    2004-01-01

    The natural production and anthropogenic release of halogenated hydrocarbons into the environment has been the likely driving force for the evolution of an unexpectedly high microbial capacity to dehalogenate different classes of xenobiotic haloorganics. This contribution provides an update on the

  9. Diazotrophic microbial mats

    NARCIS (Netherlands)

    Severin, I.; Stal, L.J.; Seckbach, J.; Oren, A.

    2010-01-01

    Microbial mats have been the focus of scientific research for a few decades. These small-scale ecosystems are examples of versatile benthic communities of microorganisms, usually dominated by phototrophic bacteria (e.g., Krumbein et al., 1977; Jørgensen et al., 1983). They develop as vertically

  10. Microbial Energy Conversion

    Energy Technology Data Exchange (ETDEWEB)

    Buckley, Merry [American Society for Microbiology (ASM), Washington, DC (United States); Wall, Judy D. [Univ. of Missouri, Columbia, MO (United States)

    2006-10-01

    The American Academy of Microbiology convened a colloquium March 10-12, 2006, in San Francisco, California, to discuss the production of energy fuels by microbial conversions. The status of research into various microbial energy technologies, the advantages and disadvantages of each of these approaches, research needs in the field, and education and training issues were examined, with the goal of identifying routes for producing biofuels that would both decrease the need for fossil fuels and reduce greenhouse gas emissions. Currently, the choices for providing energy are limited. Policy makers and the research community must begin to pursue a broader array of potential energy technologies. A diverse energy portfolio that includes an assortment of microbial energy choices will allow communities and consumers to select the best energy solution for their own particular needs. Funding agencies and governments alike need to prepare for future energy needs by investing both in the microbial energy technologies that work today and in the untested technologies that will serve the world’s needs tomorrow. More mature bioprocesses, such as ethanol production from starchy materials and methane from waste digestors, will find applications in the short term. However, innovative techniques for liquid fuel or biohydrogen production are among the longer term possibilities that should also be vigorously explored, starting now. Microorganisms can help meet human energy needs in any of a number of ways. In their most obvious role in energy conversion, microorganisms can generate fuels, including ethanol, hydrogen, methane, lipids, and butanol, which can be burned to produce energy. Alternatively, bacteria can be put to use in microbial fuel cells, where they carry out the direct conversion of biomass into electricity. Microorganisms may also be used some day to make oil and natural gas technologies more efficient by sequestering carbon or by assisting in the recovery of oil and

  11. Microbial electrosynthesis of biochemicals

    NARCIS (Netherlands)

    Bajracharya, S.

    2016-01-01

    Microbial electrosynthesis (MES) is an electricity-driven production of chemicals from low-value waste using microorganisms as biocatalysts. MES from CO2 comprises conversion of CO2 to multi-carbon compounds employing microbes at the cathode which use electricity as an energy source. This thesis

  12. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  13. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  14. Current nuclear threats and possible responses

    Science.gov (United States)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  15. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  16. Self-Models and Relationship Threat

    Directory of Open Access Journals (Sweden)

    Máire B. Ford

    2015-07-01

    Full Text Available This study investigated a key claim of risk regulation theory, namely, that psychological internalizing of a relationship threat will serve as a mediator of the link between self-models (self-esteem and attachment anxiety and relationship responses (moving closer to a partner vs. distancing from a partner. Participants (N = 101 received feedback that threatened their current romantic relationship (or no feedback and then completed measures of internal–external focus, relationship closeness–distancing, and acceptance–rejection of the feedback. Results showed that participants with negative self-models responded to the relationship threat by becoming more internally focused and by distancing from their partners, whereas those with positive self-models became more externally focused and moved closer to their partners. Mediation analyses indicated that the link between self-models and relationship closeness–distancing was partially explained by internal focus.

  17. Boys' boarding school management: understanding the choice ...

    African Journals Online (AJOL)

    Maggard,. 1976). Kotler ... positioning strategy for a secondary boys' boarding school should seek to match its .... (in this case, the attributes parents consider important in boarding school selection), ..... Marketing for Hospitality and Tourism (3rd ed).

  18. 76 FR 57712 - Performance Review Board Membership

    Science.gov (United States)

    2011-09-16

    ... DEPARTMENT OF COMMERCE Performance Review Board Membership AGENCY: Economics and Statistics... the Performance Review Board (PRB) in accordance with the Economics and Statistics Administration's.... Bostic, Jr., Arnold A. Jackson, Theodore A. Johnson, Steven J. Jost, J. Steven Landefeld, Jennifer Madans...

  19. 7 CFR 1230.4 - Board.

    Science.gov (United States)

    2010-01-01

    ... of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE PORK PROMOTION, RESEARCH, AND CONSUMER INFORMATION Pork Promotion, Research, and Consumer Information Order Definitions § 1230.4 Board. Board means...

  20. 7 CFR 1215.2 - Board.

    Science.gov (United States)

    2010-01-01

    ... of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE POPCORN PROMOTION, RESEARCH, AND CONSUMER INFORMATION Popcorn Promotion, Research, and Consumer Information Order Definitions § 1215.2 Board. Board...

  1. American Board of Obesity Medicine (ABOM)

    Science.gov (United States)

    ... not trained in how to manage it. The American Board of Obesity Medicine certifies physicians looking to bridge this gap. ... an ABOM diplomate. APPLY NOW OUR MISSION The American Board of Obesity Medicine (ABOM) serves the public and the field ...

  2. Sustainability issues in circuit board recycling

    DEFF Research Database (Denmark)

    Legarth, Jens Brøbech; Alting, Leo; Baldo, Gian Luca

    1995-01-01

    The resource recovery and environmental impact issues of printed circuit board recycling by secondary copper smelters are discussed. Guidelines concerning material selection for circuit board manufacture and concerning the recycling processes are given to enhance recovery efficiency and to lower...

  3. THREATS AND BENEFITS OF EXCHANGE RATE REGIMES FOR UKRAINE IN TERMS OF EUROPEAN INTEGRATION

    Directory of Open Access Journals (Sweden)

    Svitlana Glushchenko

    2016-11-01

    Full Text Available The purpose of the paper is to determine threats and benefits of exchange rate regimes in terms of the integration of Ukraine into the European community. Emphasizing features of the manifestation of currency exchange rate in Ukrainian practice is a precondition for choosing the optimal exchange rate regime for Ukraine, which, in its turn, will provide an opportunity to reduce inflation and implement effective tools of monetary and fiscal policies to promote further economic growth and competitiveness of the country. The uses of free-floating exchange rate and «currency board» regimes have either positive effects for Ukraine or certain threats. Methodology. This research is based on a synthesis of data on the uses of exchange rate regimes in Ukraine as an independent. It is considered angular regimes, which are by far the most suitable for Ukraine in terms of the European vector of its development. Peculiarities of using these regimes are revealed and their major threats to the domestic economy are pointed out. This article analyzes the dynamics of the trade balance of payments of Ukraine, the dynamics of the commodity structure of Ukraine`s exports and imports and the external debt of Ukraine. Results. Taking into account the experience of countries, which were in crisis situations, they show the necessity of the uses of freefloating exchange rate regime and possibilities of «currency board» regime, despite threats that they may have. World experience testifies the implementation of structural reforms, effective monetary policy, fiscal policy and discipline of the government. Thorough preparation of Ukraine’s transition to the «currency board» regime can justify itself in conditions of crisis and provide impetus to Ukrainian economy benefits. The paper defines conditions under which the success of a new model of exchange rate policy will be achieved. Practical implications. The study accents attention on the specifics of the uses of the

  4. Smart Grid Security: Threats, Challenges, and Solutions

    OpenAIRE

    Sanjab, Anibal; Saad, Walid; Guvenc, Ismail; Sarwat, Arif; Biswas, Saroj

    2016-01-01

    The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utmost importance to: a) understand its underlying vulnerabilities and associated threats, b) quanti...

  5. THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT

    Science.gov (United States)

    2016-04-01

    Putin’s intent. What we can do is learn from his actions, and what we see suggests growing Russian capabilities, significant military modernization...AU/ACSC/POWELL, N/AY16 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT...The methodology focuses on Russian capability, capacity, and intention to threaten NATO members’ existence. While Russia does possess nuclear weapons

  6. Hollow Threats: Why Coercive Diplomacy Fails

    Science.gov (United States)

    2015-06-01

    brand this as selection bias, the study of coercion has neglected the cumulative factor and is therefore worth bringing into the spotlight. As this...ended. Therefore, the Somali factions had both the luxury and foreknowledge to wait until the menace decreased and the costs increased (as...observation, was a trip wire. Since the luxury of hindsight demonstrates that Assad did use WMD and since that part of the deterrent threat was

  7. Water Privatization: A Threat to Human Rights?

    OpenAIRE

    Pavelich, Kelly

    2017-01-01

    In developing countries, women often have responsibilities that are water dependent, such as collecting water and tending to the sick (Sewpaul, 2008: 45) As unpolluted water supplies diminish, these tasks become increasingly difficult to accomplish. Women face greater threats to their security as they are forced to walk farther, occasionally into dangerous areas, and lose several hours of their day, potentially reducing the household income and resulting in missed economic opportunities (Sewp...

  8. Zika Virus: An Emerging Worldwide Threat

    OpenAIRE

    Irfan A. Rather; Jameel B. Lone; Vivek K. Bajpai; Woon K. Paek; Jeongheui Lim

    2017-01-01

    ZIKA virus (ZIKV) poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV) and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is bei...

  9. Threats and opportunities for information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-10-01

    Full Text Available Reference Inadequate or weak contract management, fuzzy focus [16, 30, 50, 58, 62, 64] Inadequate process (“how”) e.g. inadequate planning [16, 17, 30, 36, 57] Poor management of contractors and lack of governance [16, 17, 30, 46, 61, 64, 71... decision-making cycles, lack of proper programme management and disempowered outsource programme team members. Threats in the outsourcing process and the management of the outsourcing contract may result in poor management of contractors, a lack...

  10. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  11. Maritime Threat Detection using Plan Recognition

    Science.gov (United States)

    2012-11-01

    operate in close proximity to large but much less maneuverable vessels. Various approaches for automated threat and anomaly detection have been...version space techniques, and other closed -world reasoning algorithms, while probabilistic algorithms include those that use stochastic grammars and...differ along many dimensions, such as their agent relation (e.g., keyhole , intention, adversarial), what they infer (e.g., action, plan, goal

  12. Date Sensitive Computing Problems: Understanding the Threat

    Science.gov (United States)

    1998-08-29

    equipment on Earth.3 It can also interfere with electromagnetic signals from such devices as cell phones, radio, televison , and radar. By itself, the ...spacecraft. Debris from impacted satellites will add to the existing orbital debris problem, and could eventually cause damage to other satellites...Date Sensitive Computing Problems Understanding the Threat Aug. 17, 1998 Revised Aug. 29, 1998 Prepared by: The National Crisis Response

  13. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  14. Assessment of the Emerging Biocruise Threat

    Science.gov (United States)

    2000-08-01

    more about Los Angeles than they do about Taiwan.”15 And obviously believing in the efficacy of their long-range nuclear missile capability in... vaccinated against anthrax. Apparently, Hussein was deterred from using his WMD by U.S. and Israeli threats of nuclear retaliation. The credibility of the...gangrene, aflatoxin, trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus , camel pox Israel Researching

  15. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  16. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  17. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  18. Toddlers’ Duration of Attention towards Putative Threat

    Science.gov (United States)

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  19. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  20. ChalkBoard: Mapping Functions to Polygons

    Science.gov (United States)

    Matlage, Kevin; Gill, Andy

    ChalkBoard is a domain specific language for describing images. The ChalkBoard language is uncompromisingly functional and encourages the use of modern functional idioms. ChalkBoard uses off-the-shelf graphics cards to speed up rendering of functional descriptions. In this paper, we describe the design of the core ChalkBoard language, and the architecture of our static image generation accelerator.

  1. Corporate boards and bank loan contracting

    OpenAIRE

    Francis, Bill; Hasan, Iftekhar; Koetter, Michael; Wu, Qiang

    2012-01-01

    We investigate the role of corporate boards in bank loan contracting. We find that when corporate boards are more independent, both price and nonprice loan terms (e.g., interest rates, collateral, covenants, and performance-pricing provisions) are more favorable, and syndicated loans comprise more lenders. In addition, board size, audit committee structure, and other board characteristics influence bank loan prices. However, they do not consistently affect all nonprice loan terms except for a...

  2. Cultural differences and board gender diversity

    OpenAIRE

    Carrasco , Amélia; Francoeur , Claude; Réal , Isabelle; Laffarga , Joaquina; Ruiz-Barbadillo , Emiliano

    2012-01-01

    International audience; As evidence of the continuing interest raised by "board gender diversity", major studies (Catalyst, 2008; World Economic Forum, 2010; European Board Diversity Analysis, 2010) were recently carried out and have all led to reports confirming the imbalance of women on boards and the need to address this issue. Moreover, our analysis of these reports indicates that the low proportion of women observed on corporate boards varies across countries, which raises the question a...

  3. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  4. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  5. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  6. From Global Firms to Global Boards?

    DEFF Research Database (Denmark)

    Thomsen, Steen; Gregoric, Aleksandra; Randøy, Trond

    2011-01-01

    . This indicates some support for the view that different kinds of firm internationalization – commercial versus financial - might lead to different types of board internationalization. We find no evidence that the internationalization of boards is limited by the conservatism of existing national board members...

  7. Fermilab Friends for Science Education | Board Tools

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Board Tools Testimonials Our Donors Board of Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education FFSE Scholarship Tools Google Drive Join Us/Renew Membership Forms: Online - Print Support Us Donation

  8. 42 CFR 426.489 - Board remands.

    Science.gov (United States)

    2010-10-01

    ... decision; and (2) Explains why the case is being remanded and the specific actions ordered by the Board. (b) Action by an ALJ on remand. An ALJ takes any action that is ordered by the Board and may take any additional action that is not inconsistent with the Board's remand order. ...

  9. Advisory Board on Alcoholism and Drug Abuse

    Science.gov (United States)

    State Employees Advisory Board on Alcoholism and Drug Abuse DHSS State of Alaska Home Divisions and ; Advisory Board on Alcoholism and Drug Abuse Page Content Alison Kulas Executive Director If you, a family Kulas Begins Tenure as Executive Director The Advisory Board on Alcoholism and Drug Abuse, The Alaska

  10. 75 FR 11870 - Inland Waterways Users Board

    Science.gov (United States)

    2010-03-12

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  11. 78 FR 44934 - Inland Waterways Users Board

    Science.gov (United States)

    2013-07-25

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  12. 75 FR 57264 - Inland Waterways Users Board

    Science.gov (United States)

    2010-09-20

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  13. 76 FR 11216 - Inland Waterways Users Board

    Science.gov (United States)

    2011-03-01

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  14. 78 FR 72070 - Inland Waterways Users Board

    Science.gov (United States)

    2013-12-02

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  15. 77 FR 69447 - Inland Waterways Users Board

    Science.gov (United States)

    2012-11-19

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  16. The effect of threat of litigation on forensic pathologist diagnostic decision making.

    Science.gov (United States)

    Oliver, William Russell

    2011-12-01

    Recent litigation involving medical examiners has caused concern over certifying deaths. We administered a survey of 716 medical examiners regarding the effects of the threat of litigation. Two hundred twenty-two medical examiners responded (31%). Of those who responded, approximately 13.5% admitted to having modified their diagnostic findings due to threat of litigation, and approximately 32.5% stated these considerations would affect their decisions in the future. Physicians who indicated they had or would modify their diagnoses expressed more concern over the possibility of litigation. Chiefs of services were less likely than staff members to indicate changing diagnoses. Practitioners whose jurisdictions included rural areas were significantly more likely to indicate that litigation considerations would affect their diagnoses in the future, although this was not true with those who had already modified their diagnoses. No correlation was found with elected versus appointed positions, accreditation status, sex, race, geographic location, or board certification. Although very few medical examiners have actually been sued because of their diagnoses, a demonstrated threat of litigation has a substantial effect on diagnostic decision making.

  17. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  19. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  20. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  1. VISUALISERINGSTAVLA : Visualisering av Kanban boards

    OpenAIRE

    Y. F. Sam, Adam

    2013-01-01

    Hos många företag används whiteboards för att visualisera arbetsprocessen. En vanlig metodik för detta är så kallade Kanban boards, ett system av tabeller och lappar för att indikera olika avvikelser eller moment i projekt med datum och annan relevant information. Företag kan även välja att använda en mjukvara som simulerar samma metodik, ett exempel på detta är så kallade Elektroniska kanban boards. I detta arbete har båda dessa metoder (whiteboard samt en digital lösning) observerats hos tr...

  2. Issues in Canadian board transparency

    Directory of Open Access Journals (Sweden)

    Chris Bart

    2007-01-01

    Full Text Available Transparency is considered one of the principles of good corporate governance. But what does it mean – in practice – especially when it comes to Board transparency – i.e. the ability of shareholders to gain knowledge about an organization’s corporate governance practices in order to make an informed assessment of Directors’ individual and collective roles and performance. In a preliminary investigation of Board transparency practices in Canadian listed firms (using data from 2003-2004, it was found that there were wide variations in the nature and quantity of corporate governance practices disclosed. The reasons for these variations are discussed and a number of recommendations for improved disclosure are presented.

  3. The Atomic Energy Control Board

    International Nuclear Information System (INIS)

    Doern, G.B.

    1976-01-01

    This study describes and assesses the regulatory and administrative processes and procedures of the Atomic Energy Control Board, the AECB. The Atomic Energy Control Act authorized the AECB to control atomic energy materials and equipment in the national interest and to participate in measures for the international control of atomic energy. The AECB is authorized to make regulations to control atomic energy materials and equipment and to make grants in support of atomic energy research. (author)

  4. Who's who on the Board

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    Brief summaries of the curriculum vitae and present positions held by each member of the National Radiological Protection Board are given. The members are Sir Richard Southwood, Mr. A.M. Allen, Professor A. Barret, Professor J.H. Edwards, Professor H.J. Evans, Professor K.J. Evans, Professor P. Haggett, Professor J.R. Lee, Professor J.S. Orr, Dr. R. Owen, Professor J. Peto, Dr. D.H. Roberts and Mr. M.E. Trowbridge. (U.K.)

  5. 14 CFR 250.5 - Amount of denied boarding compensation for passengers denied boarding involuntarily.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Amount of denied boarding compensation for passengers denied boarding involuntarily. 250.5 Section 250.5 Aeronautics and Space OFFICE OF THE SECRETARY... boarding compensation for passengers denied boarding involuntarily. (a) Subject to the exceptions provided...

  6. Motives and Power of School Board Members: Implications for School Board-Superintendent Relationships

    Science.gov (United States)

    Mountford, Meredith

    2004-01-01

    The qualitative study presented in this article explores motivations for school board membership and conceptions of power held by school board members. The findings of the study suggest a relationship exists between the way board members define power and the type of motivation board members have for service. The implications of these findings for…

  7. 75 FR 9196 - Letter From Secretary of Energy Accepting Defense Nuclear Facilities Safety Board (Board...

    Science.gov (United States)

    2010-03-01

    ... DEPARTMENT OF ENERGY Letter From Secretary of Energy Accepting Defense Nuclear Facilities Safety Board (Board) Recommendation 2009-2 AGENCY: Department of Energy. ACTION: Notice. SUMMARY: The...: The Department of Energy (DOE) acknowledges receipt of Defense Nuclear Facilities Safety Board (Board...

  8. 76 FR 52997 - Public Company Accounting Oversight Board; Order Approving Proposed Board Funding Final Rules for...

    Science.gov (United States)

    2011-08-24

    ... Accounting Oversight Board; Order Approving Proposed Board Funding Final Rules for Allocation of the Board's... August 18, 2011. I. Introduction On June 21, 2011, the Public Company Accounting Oversight Board (the... public accounting firm, in amounts that are sufficient to cover the costs of processing and reviewing...

  9. The Perceptions of Georgia School Board Members' Need for Training on School Board Governance

    Science.gov (United States)

    Nutt, Pamela Studdard

    2010-01-01

    This study explored the perceptions of training needs of school board members in Georgia. The study examined perceptions of school board chairs, board members with 1 to 5 years experience, members with 6 to 10 years experience, members with 11 to 15 years experience and board members with 16 plus years experience in the areas of school board…

  10. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  11. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  12. Integrated reporting and board features

    Directory of Open Access Journals (Sweden)

    Rares HURGHIS

    2017-02-01

    Full Text Available In the last two decades the concept of sustainability reporting gained more importance in the companies’ annual reports, a trend which is embedded also in integrated reporting. Issuing an integrated report became a necessity, because the report explains to the investors how the organization creates value over time. The governance structure, more exactly the board of directors, decides whether or not the company will issue an integrated report. Thus, are there certain features of the board that might influence the issue of an integrated report? Do the companies which issue an integrated report have certain features of the governance structure? Looking for an answer to these questions, we seek for any possible correlations between a disclosure index and the corporate governance structure characteristics, on a sample from the companies participating at the International Integrated Reporting Council Examples Database. The results highlight that only the size of the board influences the extent to which the issued integrated report is in accordance with the International Framework.

  13. Hospital board effectiveness: relationships between board training and hospital financial viability.

    Science.gov (United States)

    Molinari, C; Morlock, L; Alexander, J; Lyles, C A

    1992-01-01

    This study examined whether hospital governing boards that invest in board education and training are more informed and effective decision-making bodies. Measures of hospital financial viability (i.e., selected financial ratios and outcomes) are used as indicators of hospital board effectiveness. Board participation in educational programs was significantly associated with improved profitability, liquidity, and occupancy levels, suggesting that investment in the education of directors is likely to enhance hospital viability and thus increase board effectiveness.

  14. Rumen microbial genomics

    International Nuclear Information System (INIS)

    Morrison, M.; Nelson, K.E.

    2005-01-01

    Improving microbial degradation of plant cell wall polysaccharides remains one of the highest priority goals for all livestock enterprises, including the cattle herds and draught animals of developing countries. The North American Consortium for Genomics of Fibrolytic Ruminal Bacteria was created to promote the sequencing and comparative analysis of rumen microbial genomes, offering the potential to fully assess the genetic potential in a functional and comparative fashion. It has been found that the Fibrobacter succinogenes genome encodes many more endoglucanases and cellodextrinases than previously isolated, and several new processive endoglucanases have been identified by genome and proteomic analysis of Ruminococcus albus, in addition to a variety of strategies for its adhesion to fibre. The ramifications of acquiring genome sequence data for rumen microorganisms are profound, including the potential to elucidate and overcome the biochemical, ecological or physiological processes that are rate limiting for ruminal fibre degradation. (author)

  15. Microbial Genomes Multiply

    Science.gov (United States)

    Doolittle, Russell F.

    2002-01-01

    The publication of the first complete sequence of a bacterial genome in 1995 was a signal event, underscored by the fact that the article has been cited more than 2,100 times during the intervening seven years. It was a marvelous technical achievement, made possible by automatic DNA-sequencing machines. The feat is the more impressive in that complete genome sequencing has now been adopted in many different laboratories around the world. Four years ago in these columns I examined the situation after a dozen microbial genomes had been completed. Now, with upwards of 60 microbial genome sequences determined and twice that many in progress, it seems reasonable to assess just what is being learned. Are new concepts emerging about how cells work? Have there been practical benefits in the fields of medicine and agriculture? Is it feasible to determine the genomic sequence of every bacterial species on Earth? The answers to these questions maybe Yes, Perhaps, and No, respectively.

  16. Degradation of microbial polyesters.

    Science.gov (United States)

    Tokiwa, Yutaka; Calabia, Buenaventurada P

    2004-08-01

    Microbial polyhydroxyalkanoates (PHAs), one of the largest groups of thermoplastic polyesters are receiving much attention as biodegradable substitutes for non-degradable plastics. Poly(D-3-hydroxybutyrate) (PHB) is the most ubiquitous and most intensively studied PHA. Microorganisms degrading these polyesters are widely distributed in various environments. Although various PHB-degrading microorganisms and PHB depolymerases have been studied and characterized, there are still many groups of microorganisms and enzymes with varying properties awaiting various applications. Distributions of PHB-degrading microorganisms, factors affecting the biodegradability of PHB, and microbial and enzymatic degradation of PHB are discussed in this review. We also propose an application of a new isolated, thermophilic PHB-degrading microorganism, Streptomyces strain MG, for producing pure monomers of PHA and useful chemicals, including D-3-hydroxycarboxylic acids such as D-3-hydroxybutyric acid, by enzymatic degradation of PHB.

  17. Global Microbial Identifier

    DEFF Research Database (Denmark)

    Wielinga, Peter; Hendriksen, Rene S.; Aarestrup, Frank Møller

    2017-01-01

    ) will likely also enable a much better understanding of the pathogenesis of the infection and the molecular basis of the host response to infection. But the full potential of these advances will only transpire if the data in this area become transferable and thereby comparable, preferably in open-source...... of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect outbreaks and emerging pathogens. To harness the full potential of WGS, a shared global database of genomes linked to relevant metadata and the necessary software tools needs to be generated, hence the global...... microbial identifier (GMI) initiative. This tool will ideally be used in amongst others in the diagnosis of infectious diseases in humans and animals, in the identification of microorganisms in food and environment, and to track and trace microbial agents in all arenas globally. This will require...

  18. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  19. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  20. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  1. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  2. Approaches on Correlation between Board of Directors and Risk Management in Resilient Economies

    Directory of Open Access Journals (Sweden)

    Daniel Ştefan Armeanu

    2017-01-01

    Full Text Available The recent financial crisis highlighted the need for a strong emphasis on the effectiveness of board risk oversight practices. Good corporate governance upholds effective risk management, which in turn ensures the flexibility to reply to unpredicted threats and take benefit of opportunities. Thus, risk management affords corporate resilience that engenders competitive advantage due to the capacity to circumvent, deter, defend, react, and adjust to any kind of disturbance, besides recovering quickly. Guaranteeing that the board is prepared and adequately resilient to deal with a crisis circumstance is a crucial part of good governance. By employing a data set of companies listed in Romania, this paper analyzes whether boards of directors influence risk management. We measure boards by means of size, independence, diversity, establishment of Consultative Committees, as well as CEO duality, gender, age, and tenure. Based on ten financial ratios, we develop two risk indicators regarding shareholders’ wealth and short-term risk, alongside a global business failure risk tool, by means of principal component analysis. Furthermore, the output of the multivariate regression analysis show that CEO gender, the size of the board, and Audit Committee negatively influence business failure risk.

  3. Climatic threats on the worldwide peace

    International Nuclear Information System (INIS)

    Valantin, J.M.

    2005-06-01

    This book approaches the climatic change under the international relation aspect. It recalls the progressive growth of the collective awareness about the threats of human activities on Earth's climate and analyzes more particularly the policies adopted by the US, UK and the European Union. It evokes also the problems encountered by the developing countries, the energy needs of which are continuously increasing. Finally, it puts the question of the capacity of the international community to solve, by negotiations and not by conflicts, the tensions generated by environmental crises. (J.S.)

  4. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  5. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  6. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  7. Habitat Fragmentation can Modulate Drought Effects on the Plant-soil-microbial System in Mediterranean Holm Oak (Quercus ilex) Forests.

    Science.gov (United States)

    Flores-Rentería, Dulce; Curiel Yuste, Jorge; Rincón, Ana; Brearley, Francis Q; García-Gil, Juan Carlos; Valladares, Fernando

    2015-05-01

    Ecological transformations derived from habitat fragmentation have led to increased threats to above-ground biodiversity. However, the impacts of forest fragmentation on soils and their microbial communities are not well understood. We examined the effects of contrasting fragment sizes on the structure and functioning of soil microbial communities from holm oak forest patches in two bioclimatically different regions of Spain. We used a microcosm approach to simulate the annual summer drought cycle and first autumn rainfall (rewetting), evaluating the functional response of a plant-soil-microbial system. Forest fragment size had a significant effect on physicochemical characteristics and microbial functioning of soils, although the diversity and structure of microbial communities were not affected. The response of our plant-soil-microbial systems to drought was strongly modulated by the bioclimatic conditions and the fragment size from where the soils were obtained. Decreasing fragment size modulated the effects of drought by improving local environmental conditions with higher water and nutrient availability. However, this modulation was stronger for plant-soil-microbial systems built with soils from the northern region (colder and wetter) than for those built with soils from the southern region (warmer and drier) suggesting that the responsiveness of the soil-plant-microbial system to habitat fragmentation was strongly dependent on both the physicochemical characteristics of soils and the historical adaptation of soil microbial communities to specific bioclimatic conditions. This interaction challenges our understanding of future global change scenarios in Mediterranean ecosystems involving drier conditions and increased frequency of forest fragmentation.

  8. Synthetic microbial ecology and the dynamic interplay between microbial genotypes.

    Science.gov (United States)

    Dolinšek, Jan; Goldschmidt, Felix; Johnson, David R

    2016-11-01

    Assemblages of microbial genotypes growing together can display surprisingly complex and unexpected dynamics and result in community-level functions and behaviors that are not readily expected from analyzing each genotype in isolation. This complexity has, at least in part, inspired a discipline of synthetic microbial ecology. Synthetic microbial ecology focuses on designing, building and analyzing the dynamic behavior of ‘ecological circuits’ (i.e. a set of interacting microbial genotypes) and understanding how community-level properties emerge as a consequence of those interactions. In this review, we discuss typical objectives of synthetic microbial ecology and the main advantages and rationales of using synthetic microbial assemblages. We then summarize recent findings of current synthetic microbial ecology investigations. In particular, we focus on the causes and consequences of the interplay between different microbial genotypes and illustrate how simple interactions can create complex dynamics and promote unexpected community-level properties. We finally propose that distinguishing between active and passive interactions and accounting for the pervasiveness of competition can improve existing frameworks for designing and predicting the dynamics of microbial assemblages.

  9. Gender Quotas for Corporate Boards

    OpenAIRE

    Elomäki, Anna

    2017-01-01

    Gender quotas for corporate boards can be seen as a way of drawing attention to gendered power within the economy as well as a way to democratize the economy, yet the debate about them has focused on the economic and business benefits of gender equality rather than on gender justice or democracy. This article examines how women’s under-representation in economic decision-making was constituted as an economic problem in the European Union’s gender-equality policies and how the economization of...

  10. The fourth Board of Governors

    International Nuclear Information System (INIS)

    1961-01-01

    The General Conference of the International Atomic Energy Agency at its fourth regular session, which was held in Vienna from 20 September to 1 October 1960, elected five Member States to serve a two-year term on the Agency's Board of Governors. The five were Argentina, El Salvador, the Federal Republic of Germany, Iraq and Thailand. The new members succeed Indonesia, the Netherlands, Peru, the United Arab Republic and Venezuela, which were elected for a two-year term by the second session of the General Conference in 1958

  11. Preserving the Legitimacy of Board Certification.

    Science.gov (United States)

    Hanemann, Michael S; Wall, Holly C; Dean, John A

    2017-06-01

    The aims of this discussion were to inform the medical community about the American Board of Cosmetic Surgery's ongoing attempts in Louisiana to achieve equivalency to American Board of Medical Specialties (ABMS) member boards so that its diplomates may use the term "board certified" in advertising and to ensure public safety by upholding the standards for medical board certification. In 2011, Louisiana passed a truth in medical advertising law, which was intended to protect the public by prohibiting the use of the term "board certified" by improperly credentialed physicians. An American Board of Cosmetic Surgery diplomate petitioned the Louisiana State Board of Medical Examiners to approve a rule that would establish a pathway to equivalency for non-ABMS member boards, whose diplomates have not completed training approved by the Accreditation Council for Graduate Medical Education (ACGME) in the specialty they are certifying. Physicians and physician organizations representing multiple specialties (facial plastic and reconstructive surgery, otolaryngology [head and neck surgery], orthopedic spine surgery, pediatric neurosurgery, dermatology, and plastic surgery) urged the Louisiana State Board of Medical Examiners to clarify its advertising policy, limiting the use of the term "board certified" to physicians who have completed ACGME-approved training in the specialty or subspecialty named in the certificate. The public equates the term "board certified" with the highest level of expertise in a medical specialty. When a certifying board does not require completion of ACGME or American Osteopathic Association (AOA)-accredited training in the specialty it certifies, the result is an unacceptable degree of variability in the education and training standards applied to its diplomates. Independent, third-party oversight of certifying boards and training programs is necessary to ensure quality standards are upheld. Any system that assesses a non-ABMS member or non

  12. Prefrontal control of attention to threat

    Directory of Open Access Journals (Sweden)

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  13. Religion, group threat and sacred values

    Directory of Open Access Journals (Sweden)

    Hammad Sheikh

    2012-03-01

    Full Text Available Sacred or protected values have important influences on decision making, particularly in the context of intergroup disputes. Thus far, we know little about the process of a value becoming sacred or why one person may be more likely than another to hold a sacred value. We present evidence that participation in religious ritual and perceived threat to the group lead people to be more likely to consider preferences as protected or sacred values. Specifically, three studies carried out with Americans and Palestinians show: (a that the more people participate in religious ritual the more likely they are to report a preference to be a sacred value (Studies 1--3; (b that people claim more sacred values when they are reminded of religious ritual (Study 2; and (c that the effect of religious ritual on the likelihood of holding a sacred value is amplified by the perception of high threat to the in-group (Study 3. We discuss implications of these findings for understanding intergroup conflicts, and suggest avenues for future research into the emergence and spread of sacred values.

  14. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  15. Initial perspectives on process threat management

    International Nuclear Information System (INIS)

    Whiteley, James R. Rob; Mannan, M. Sam

    2004-01-01

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this 'inside the gate' response as process threat management. The authors have initiated a joint industry/academia study to address: - the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and; - identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study

  16. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  17. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  18. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  19. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  20. Microbial Cell Dynamics Lab (MCDL)

    Data.gov (United States)

    Federal Laboratory Consortium — The Microbial Cell Dynamics Laboratory at PNNL enables scientists to study the molecular details of microbes under relevant environmental conditions. The MCDL seeks...

  1. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  2. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    Science.gov (United States)

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  3. The Editorial Board is Changing

    Directory of Open Access Journals (Sweden)

    LE Nicolle

    2005-01-01

    Full Text Available The success of The Canadian Journal of Infectious Diseases & Medical Microbiology over the past 16 years is largely attributable to the continuing and substantial support from a dedicated and enthusiastic Editorial Board. The individuals who have participated are listed on the masthead in each issue of the Journal. Many of the current Editorial Board members have participated continually since the initiation of the Journal - a commitment of over 16 years. They have provided oversight as the Journal has evolved, and their critical insights in the discussion of issues as they have developed, as well as their suggestions for new directions, have significantly contributed to the maintenance of Journal quality. Our associate editors have been particularly active. They have coordinated and, frequently, developed much of the content for the special sections - adult and paediatric infectious disease notes, clinical vignettes and reviews. They have also facilitated the peer review of submitted manuscripts by identifying reviewers and making recommendations for revisions and publication. These contributions have been essential to the continuing operation and high, scientific quality of the Journal.

  4. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  5. Optimal back-to-front airplane boarding

    Science.gov (United States)

    Bachmat, Eitan; Khachaturov, Vassilii; Kuperman, Ran

    2013-06-01

    The problem of finding an optimal back-to-front airplane boarding policy is explored, using a mathematical model that is related to the 1+1 polynuclear growth model with concave boundary conditions and to causal sets in gravity. We study all airplane configurations and boarding group sizes. Optimal boarding policies for various airplane configurations are presented. Detailed calculations are provided along with simulations that support the main conclusions of the theory. We show that the effectiveness of back-to-front policies undergoes a phase transition when passing from lightly congested airplanes to heavily congested airplanes. The phase transition also affects the nature of the optimal or near-optimal policies. Under what we consider to be realistic conditions, optimal back-to-front policies lead to a modest 8-12% improvement in boarding time over random (no policy) boarding, using two boarding groups. Having more than two groups is not effective.

  6. Optimal back-to-front airplane boarding.

    Science.gov (United States)

    Bachmat, Eitan; Khachaturov, Vassilii; Kuperman, Ran

    2013-06-01

    The problem of finding an optimal back-to-front airplane boarding policy is explored, using a mathematical model that is related to the 1+1 polynuclear growth model with concave boundary conditions and to causal sets in gravity. We study all airplane configurations and boarding group sizes. Optimal boarding policies for various airplane configurations are presented. Detailed calculations are provided along with simulations that support the main conclusions of the theory. We show that the effectiveness of back-to-front policies undergoes a phase transition when passing from lightly congested airplanes to heavily congested airplanes. The phase transition also affects the nature of the optimal or near-optimal policies. Under what we consider to be realistic conditions, optimal back-to-front policies lead to a modest 8-12% improvement in boarding time over random (no policy) boarding, using two boarding groups. Having more than two groups is not effective.

  7. Microbial products II

    Energy Technology Data Exchange (ETDEWEB)

    Pape, H; Rehm, H J [eds.

    1986-01-01

    The present volume deals mainly with compounds which have been detected as natural microbial products. Part 1 of this volume introduces the general aspects of the overproduction of metabolites and the concepts and genetics of secondary metabolism. Compounds such as nucleosides, nucleotides, coenzymes, vitamins and lipids are dealt with in part 2. Part 3 then is devoted to products and antibiotics with uses im medicine, veterinary medicine, plant protection and metabolites with antitumor activity. Several secondary metabolites have found uses in human and animal health care. With 244 figs., 109 tabs.

  8. Microbial bebop: creating music from complex dynamics in microbial ecology.

    Directory of Open Access Journals (Sweden)

    Peter Larsen

    Full Text Available In order for society to make effective policy decisions on complex and far-reaching subjects, such as appropriate responses to global climate change, scientists must effectively communicate complex results to the non-scientifically specialized public. However, there are few ways however to transform highly complicated scientific data into formats that are engaging to the general community. Taking inspiration from patterns observed in nature and from some of the principles of jazz bebop improvisation, we have generated Microbial Bebop, a method by which microbial environmental data are transformed into music. Microbial Bebop uses meter, pitch, duration, and harmony to highlight the relationships between multiple data types in complex biological datasets. We use a comprehensive microbial ecology, time course dataset collected at the L4 marine monitoring station in the Western English Channel as an example of microbial ecological data that can be transformed into music. Four compositions were generated (www.bio.anl.gov/MicrobialBebop.htm. from L4 Station data using Microbial Bebop. Each composition, though deriving from the same dataset, is created to highlight different relationships between environmental conditions and microbial community structure. The approach presented here can be applied to a wide variety of complex biological datasets.

  9. Microbial bebop: creating music from complex dynamics in microbial ecology.

    Science.gov (United States)

    Larsen, Peter; Gilbert, Jack

    2013-01-01

    In order for society to make effective policy decisions on complex and far-reaching subjects, such as appropriate responses to global climate change, scientists must effectively communicate complex results to the non-scientifically specialized public. However, there are few ways however to transform highly complicated scientific data into formats that are engaging to the general community. Taking inspiration from patterns observed in nature and from some of the principles of jazz bebop improvisation, we have generated Microbial Bebop, a method by which microbial environmental data are transformed into music. Microbial Bebop uses meter, pitch, duration, and harmony to highlight the relationships between multiple data types in complex biological datasets. We use a comprehensive microbial ecology, time course dataset collected at the L4 marine monitoring station in the Western English Channel as an example of microbial ecological data that can be transformed into music. Four compositions were generated (www.bio.anl.gov/MicrobialBebop.htm.) from L4 Station data using Microbial Bebop. Each composition, though deriving from the same dataset, is created to highlight different relationships between environmental conditions and microbial community structure. The approach presented here can be applied to a wide variety of complex biological datasets.

  10. New Rationales for Women on Boards

    OpenAIRE

    Choudhury, B.

    2014-01-01

    Should measures promoting women to corporate boards be solely justified in terms of economic arguments? Traditionally, such measures have tended to rely on utilitarian arguments, despite the fact that the most prominent of these arguments—the relationship between women’s presence on boards and firm financial performance—is equivocal. Conversely, this article argues that rationales for increasing women on boards should be based on both equality and economics grounds. An equality rationale is n...

  11. Board Directors and Corporate Social Responsibility

    Directory of Open Access Journals (Sweden)

    Mariana Nedelcu (Bunea

    2014-08-01

    Full Text Available The boards of directors and corporate social responsibility (CSR have been the subject of much study and debate in the corporate governance circles over the two last decades. With issues ranging from poor corporate reporting to excessive executive compensation often splashed in the headlines, the role of boards comes into the media limelight as never before. Boards of directors are also becoming increasingly aware of corporate social responsibility issues.

  12. Board Directors and Corporate Social Responsibility

    OpenAIRE

    Mariana Nedelcu (Bunea)

    2014-01-01

    The boards of directors and corporate social responsibility (CSR) have been the subject of much study and debate in the corporate governance circles over the two last decades. With issues ranging from poor corporate reporting to excessive executive compensation often splashed in the headlines, the role of boards comes into the media limelight as never before. Boards of directors are also becoming increasingly aware of corporate social responsibility issues.

  13. Diversity of what? Multifaceted Boards and Directors

    OpenAIRE

    A. Hillman; S. Nielsen; A. Zattoni

    2012-01-01

    Board diversity has long intrigued practitioners and scholars. Constituents encourage companies to vary of director characteristics, but companies often resist. Academics debate whether diversity is beneficial for board decision-making and the empirical evidence is mixed, partly because “diversity” is treated as a singular construct despite representing many different forms (e.g. demographic, human capital and social capital). We propose a theoretical model of board diversit...

  14. Does firm performance affect board independence?

    Directory of Open Access Journals (Sweden)

    Yi Wang

    2010-07-01

    Full Text Available This paper seeks to shed some light on the antecedents of board independence. Specifically, it attempts to test the conceptual frameworks which make different predictions about the effect of firm performance on the level of board independence. The results provide support for the perspective that appointing more independent members to the boards may merely represent firms’ attempts to comply with institutional pressures. It is found that higher blockholder shareholdings lead to lower independence on the board, and audit and remuneration committees. Moreover, larger firms have relatively more independent directors sitting on nomination and remuneration committees.

  15. The Ontario Energy Board's proposed new mandate

    International Nuclear Information System (INIS)

    Laughren, F.

    1998-01-01

    The Ontario Energy Board's proposed new mandate was reviewed. The role of the Board will be to regulate the monopoly delivery components of the electricity and natural gas industry and to smooth the transition to competition. The Board will monitor market performance and will encourage electricity and natural gas monopoly services to be compatible where possible. The Board will also assist local restructuring efforts when called upon do so and ensure that the marketplace operates efficiently and effectively. Gas marketers' licensing is scheduled to begin in early 1999. Licenses will also apply to the electric industry. The objectives of the proposed licensing, the regulatory requirements and the proposed regulatory approach are described

  16. 76 FR 67402 - Performance Review Board Appointments

    Science.gov (United States)

    2011-11-01

    ... Executive Service (SES), Senior Level (SL), and Scientific or Professional (ST) Performance Review Boards...; White, Dave. Research, Education and Economics (REE) Bartuska, Ann; Jacobs-Young, Chavonda; Woteki...

  17. Corporate Social Responsibility in the Board Room

    DEFF Research Database (Denmark)

    Knudsen, Jette Steen; Geisler, Kathrine; Ege, Mette

    2013-01-01

    When do board directors pay attention to corporate social responsibility (CSR) issues? Board directors have traditionally focused on maximizing shareholder profit and viewed corporate governance narrowly as a way to meet this goal. They have paid little or no attention to CSR issues because...... they see CSR as a contrast to profit maximization. We argue in this article that companies can no longer ignore CSR. We propose that three conditions must be met in order for boards to pay attention toCSR. First, the board must have a mindset that considers CSR as contributing value to the firm. Second...

  18. Social Responsibility in the Board Room

    DEFF Research Database (Denmark)

    Ege, Mette; Geisler, Kathrine; Knudsen, Jette Steen

    When do board directors pay attention to corporate social responsibility (CSR) issues? Board directors have traditionally focused on maximizing shareholder profit and viewed corporate governance narrowly as a way to meet this goal. They have paid little or no attention to CSR issues because...... they see CSR as a contrast to profit maximization. We argue in this article that companies can no longer ignore CSR. We propose that three conditions must be met in order for boards to pay attention to CSR. First, the board must have a mind-set that considers CSR as contributing value to the firm. Second...

  19. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  20. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  1. Threats and opportunities of plant pathogenic bacteria.

    Science.gov (United States)

    Tarkowski, Petr; Vereecke, Danny

    2014-01-01

    Plant pathogenic bacteria can have devastating effects on plant productivity and yield. Nevertheless, because these often soil-dwelling bacteria have evolved to interact with eukaryotes, they generally exhibit a strong adaptivity, a versatile metabolism, and ingenious mechanisms tailored to modify the development of their hosts. Consequently, besides being a threat for agricultural practices, phytopathogens may also represent opportunities for plant production or be useful for specific biotechnological applications. Here, we illustrate this idea by reviewing the pathogenic strategies and the (potential) uses of five very different (hemi)biotrophic plant pathogenic bacteria: Agrobacterium tumefaciens, A. rhizogenes, Rhodococcus fascians, scab-inducing Streptomyces spp., and Pseudomonas syringae. Copyright © 2013 Elsevier Inc. All rights reserved.

  2. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-12-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST conditions. The conditions included an explicit ST condition, an implicit ST condition, and a nullified condition. Results indicated that males in all three conditions performed similarly on a set of physics problems. Females in the nullified condition outperformed females in the explicit ST condition and females in the implicit and explicit conditions performed similarly. Males performed better than females in the implicit and explicit ST conditions, but male and female performance on the physics problems was not significantly different in the nullified condition. The implications of these findings for physics instruction and future research on gender differences in physics and ST in science are discussed.

  3. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  4. Consequences of a changing CBRN threat

    International Nuclear Information System (INIS)

    Medema, J.

    2009-01-01

    The OPCW now counts 186 member States. Member States that possessed chemical weapons (CW) are destroying those weapons, albeit at a slow pace. In the coming decade most, if not all, of the 100.000 + tons of CW from the previous century will have been destroyed. Of the 12± States, not part of the OPCW, four of them potentially have CW but their quantities are restricted to less than 1000 tons. About one kg of the more potent nerve agent or Mustard gas is required to produce on average one casualty amongst unprotected troops, 1000 tons potentially can produce 1 million casualties. Protection, passive chemical defense, is therefore mandatory. However, once a detection and protection system is in place, with a protection factor of say one thousand, the amount required to produce one casualty amongst troops in a military scenario becomes prohibitive. Furthermore, available CW quantities will have been reduced by pre-emptive airstrikes and the aggressor will have little chance to fully deploy his CW capability. The threat from massive CW with units facing several attacks per week has changed to incidental attacks on a smaller scale and with far lower frequency. This should have consequences for the chemical defense posture of the forces, Detection and protection are still required but the protection can have a lower capacity, less spares per individual. Because the number of incidents will be far lower it might be more cost effective to abandon contaminated equipment than to decontaminate it. As the number of CW casualties entering the military medical system will be small it might be better to find cures for diseases from biological weapons than to spent money on improved therapies for nerve agent or mustard. Although research in CW medical over the last 50 years was great, it has not produced a therapy for mustard or a significant improvement over the old therapy for nerve agent poisoning. With a declining CW threat the BW threat is on the rise, making a passive

  5. The nuclear threat. 6. enl. ed.

    International Nuclear Information System (INIS)

    Anders, G.

    1993-01-01

    This is the sixth edition of 'The last days and end of time', augmented by a foreword, which was first published in 1972. The reflections it contains cannot become outdated because their object: the risk of global catastrophe, persists. But it continues to exist not only because we can never now hope to efface what knowledge we have of self-annihilation methods, but also because we have become frighteningly used to the fact of being threatened. What we fight is not this or that adversary who attacks, or might be got rid of, by nuclear means, but the nuclear situation as such. Since this enemy is the enemy of all human beings, those who up to now have considered each other as adversaries should rally as allies against the common threat. (orig./HP) [de

  6. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  7. Zika Virus: An Emerging Worldwide Threat

    Directory of Open Access Journals (Sweden)

    Irfan A. Rather

    2017-07-01

    Full Text Available ZIKA virus (ZIKV poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is being performed by RT-PCR and IgM-captured enzyme-linked immunosorbent assay (MAC-ELISA. The real brunt of the virus is, however, borne by children and adults alike. Case studies of the ZIKV outbreaks in the French Polynesia and other places have suggested that there is a close link between the ZIKV and Gullian-Barre syndrome (GBS. The GBS has closely followed in areas facing ZIKV outbreaks. Although solid evidence is yet to emerge, clinical data integration has revealed a large number of ZIKV patients having GBS. Moreover, the amniotic fluids, blood cord, and miscarriage tissues of mothers have been detected with ZIKV, which indicates that the virus either gets transferred from mother to fetus or seeks direct entry in the fetus, causing microcephaly and other brain anomalies in the newborn babies. Studies on mice have confirmed the link between the ZIKV infection during pregnancy and microcephaly in babies. Reports have highlighted the sexual transmission of the ZIKV, as it has been detected in the semen and saliva of affected persons. The intensity with which the ZIKA is spreading can collapse the health sector of several countries, which are poor. A comprehensive strategy is a need of an hour to combat this virus so as to prevent its transmission and avert the looming threat. At the same time, more research on the cure of the ZIKV is imperative.

  8. NPS Transit System Passenger Boardings Study: Converting Ticket Sales to Passenger Boardings.

    Science.gov (United States)

    2016-01-01

    This report examines the reporting of passenger boardings (unlinked passenger trips) by NPS transit systems that use a ticket sales conversion methodology. By studying and validating the park units' passenger boarding methodology from converting tick...

  9. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  10. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  11. The effects of takeover threats of shareholders and firm value

    OpenAIRE

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  12. Planning a radar system for protection from the airborne threat

    International Nuclear Information System (INIS)

    Greneker, E.F.; McGee, M.C.

    1986-01-01

    A planning methodology for developing a radar system to protect nuclear materials facilities from the airborne threat is presented. Planning for physical security to counter the airborne threat is becoming even more important because hostile acts by terrorists are increasing and airborne platforms that can be used to bypass physical barriers are readily available. The comprehensive system planning process includes threat and facility surveys, defense hardening, analysis of detection and early warning requirements, optimization of sensor mix and placement, and system implementation considerations

  13. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  14. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  15. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  16. Microbial ecology of phototrophic biofilms

    NARCIS (Netherlands)

    Roeselers, G.

    2007-01-01

    Biofilms are layered structures of microbial cells and an extracellular matrix of polymeric substances, associated with surfaces and interfaces. Biofilms trap nutrients for growth of the enclosed microbial community and help prevent detachment of cells from surfaces in flowing systems. Phototrophic

  17. Hospital boards and hospital strategic focus: the impact of board involvement in strategic decision making.

    Science.gov (United States)

    Ford-Eickhoff, Karen; Plowman, Donde Ashmos; McDaniel, Reuben R

    2011-01-01

    Despite pressures to change the role of hospital boards, hospitals have made few changes in board composition or director selection criteria. Hospital boards have often continued to operate in their traditional roles as either "monitors" or "advisors." More attention to the direct involvement of hospital boards in the strategic decision-making process of the organizations they serve, the timing and circumstances under which board involvement occurs, and the board composition that enhances their abilities to participate fully is needed. We investigated the relationship between broader expertise among hospital board members, board involvement in the stages of strategic decision making, and the hospital's strategic focus. We surveyed top management team members of 72 nonacademic hospitals to explore the participation of critical stakeholder groups such as the board of directors in the strategic decision-making process. We used hierarchical regression analysis to explore our hypotheses that there is a relationship between both the nature and involvement of the board and the hospital's strategic orientation. Hospitals with broader expertise on their boards reported an external focus. For some of their externally-oriented goals, hospitals also reported that their boards were involved earlier in the stages of decision making. In light of the complex and dynamic environment of hospitals today, those charged with developing hospital boards should match the variety in the external issues that the hospital faces with more variety in board makeup. By developing a board with greater breadth of expertise, the hospital responds to its complex environment by absorbing that complexity, enabling a greater potential for sensemaking and learning. Rather than acting only as monitors and advisors, boards impact their hospitals' strategic focus through their participation in the strategic decision-making process.

  18. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  19. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  20. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  1. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  2. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  3. Hydrodynamics of microbial filter feeding

    DEFF Research Database (Denmark)

    Nielsen, Lasse Tor; Asadzadeh, Seyed Saeed; Dölger, Julia

    2017-01-01

    Microbial filter feeders are an important group of grazers, significant to the microbial loop, aquatic food webs, and biogeochemical cycling. Our understanding of microbial filter feeding is poor, and, importantly, it is unknown what force microbial filter feeders must generate to process adequate......-feeding choanoflagellate Diaphanoeca grandis using particle tracking, and demonstrate that the current understanding of microbial filter feeding is inconsistent with computational fluid dynamics (CFD) and analytical estimates. Both approaches underestimate observed filtration rates by more than an order of magnitude......; the beating flagellum is simply unable to draw enough water through the fine filter. We find similar discrepancies for other choanoflagellate species, highlighting an apparent paradox. Our observations motivate us to suggest a radically different filtration mechanism that requires a flagellar vane (sheet...

  4. Climate change: Bio-technologies are facing a huge challenge. Why is climate changing? Control and measurement of greenhouse gases in the atmosphere. Soils at the heart of climate change. Between pollution and climate change, the survival of soil organisms. Modelling microbial degradation in soils to analyse greenhouse gas releases. A threat against plant health. The opinion of the seed industry. Truly living clouds. Language, the other stake of the struggle against climate changes

    International Nuclear Information System (INIS)

    Salas y Melia, David; Delmotte, Marc; Chenu, Claire; Chevallier, Tiphaine; Mougin, Christian; Lamy, Isabelle; Caquet, Thierry; Garnier, Patricia; Sache, Ivan; Pagesse, Pierre; Amato, Pierre; Desprez, Basile; Vernet, Agnes

    2015-01-01

    As the Rio Earth Summit in 1992 decided to react to limit the irrecoverable global warming, this publication, through several articles, outlines that this issue has not progressed at all after 23 years on a political point of view, and has even regressed with respect to initially defined objectives, but has progressed in terms of understanding of climate change under the influence of our production modes, notably in the agriculture sector. Thus, the articles discuss or recall the origin and process of climate change, how greenhouse gas emissions are controlled and measured, how soil are impacted or play a role in climate change as the survival of soil organisms is at stake under the pressure of pollution and climate change, how climate change can be a threat for plants, how the seed industry perceives these issues, how micro-organisms present in the air and clouds are now a topic in atmosphere sciences. The last article discusses the importance of intelligibility of scientific publications on these issues

  5. Processor breadboard for on-board RFI detection and mitigation in MetOp-SG radiometers

    DEFF Research Database (Denmark)

    Skou, Niels; Kristensen, Steen S.; Kovanen, Arhippa

    2015-01-01

    Radio Frequency Interference (RFI) is an increasing threat to proper operation of space-borne Earth viewing microwave radiometer systems. There is a steady growth in active services, and tougher requirements to sensitivity and fidelity of future radiometer systems. Thus it has been decided...... that the next generation MetOp satellites must include some kind of RFI detection and mitigation system at Ku band. This paper describes a breadboard processor that detects and mitigates RFI on-board the satellite. Thus cleaned data can be generated in real time, and following suitable integration, downloaded...... to ground at the modest data rate usually associated with radiometer systems....

  6. Protection of Antarctic microbial communities – ‘out of sight, out of mind’

    Science.gov (United States)

    Hughes, Kevin A.; Cowan, Don A.; Wilmotte, Annick

    2015-01-01

    Recent advances in molecular biology techniques have shown the presence of diverse microbial communities and endemic species in Antarctica. Endemic microbes may be a potential source of novel biotechnologically important compounds, including, for example, new antibiotics. Thus, the scientific and biotechnological value of Antarctic terrestrial microbial habitats can be compromised by human visitation to a greater extent than previously realized. The ever-increasing human footprint in Antarctica makes consideration of this topic more pressing, as the number of locations known to be pristine habitats, where increasingly sophisticated cutting-edge research techniques may be used to their full potential, declines. Examination of the Protected Areas system of the Antarctic Treaty shows that microbial habitats are generally poorly protected. No other continent on Earth is dominated to the same degree by microbial species, and real opportunities exist to develop new ways of conceptualizing and implementing conservation of microbial biogeography on a continental scale. Here we highlight potential threats both to the conservation of terrestrial microbial ecosystems, and to future scientific research requiring their study. PMID:25762992

  7. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  8. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  9. Oceans and Human Health (OHH): a European perspective from the Marine Board of the European Science Foundation (Marine Board-ESF).

    Science.gov (United States)

    Moore, Michael N; Depledge, Michael H; Fleming, Lora; Hess, Philipp; Lees, David; Leonard, Paul; Madsen, Lise; Owen, Richard; Pirlet, Hans; Seys, Jan; Vasconcelos, Vitor; Viarengo, Aldo

    2013-05-01

    The oceans and coastal seas provide mankind with many benefits including food for around a third of the global population, the air that we breathe and our climate system which enables habitation of much of the planet. However, the converse is that generation of natural events (such as hurricanes, severe storms and tsunamis) can have devastating impacts on coastal populations, while pollution of the seas by pathogens and toxic waste can cause illness and death in humans and animals. Harmful effects from biogenic toxins produced by algal blooms (HABs) and from the pathogens associated with microbial pollution are also a health hazard in seafood and from direct contact with water. The overall global burden of human disease caused by sewage pollution of coastal waters has been estimated at 4 million lost person-years annually. Finally, the impacts of all of these issues will be exacerbated by climate change. A holistic systems approach is needed. It must consider whole ecosystems, and their sustainability, such as integrated coastal zone management, is necessary to address the highly interconnected scientific challenges of increased human population pressure, pollution and over-exploitation of food (and other) resources as drivers of adverse ecological, social and economic impacts. There is also an urgent and critical requirement for effective and integrated public health solutions to be developed through the formulation of politically and environmentally meaningful policies. The research community required to address "Oceans & Human Health" in Europe is currently very fragmented, and recognition by policy makers of some of the problems, outlined in the list of challenges above, is limited. Nevertheless, relevant key policy issues for governments worldwide include the reduction of the burden of disease (including the early detection of emerging pathogens and other threats) and improving the quality of the global environment. Failure to effectively address these issues

  10. 78 FR 67333 - Performance Review Board Membership

    Science.gov (United States)

    2013-11-12

    ... DEPARTMENT OF COMMERCE Performance Review Board Membership AGENCY: Economics and Statistics... eligible to serve on the Performance Review Board (PRB) in accordance with the Economics and Statistics.... Arnold William G. Bostic, Jr. Stephen B. Burke Joanne Buenzli Crane Susan R. Helper Ron S. Jarmin Enrique...

  11. Board Size Effects in Closely Held Corporations

    DEFF Research Database (Denmark)

    Bennedsen, Morten; Kongsted, H.C.; Meisner Nielsen, Kasper

    2004-01-01

    of board size by using a new instrument given bythe number of children of the founders of the firms. Our analysis shows thatboard size can be taken as exogenous in the performance equation. Furthermore,based on a flexible model specification we find that there is noempirical evidence of adverse board size...

  12. Using a board game to reinforce learning.

    Science.gov (United States)

    Yoon, Bona; Rodriguez, Leslie; Faselis, Charles J; Liappis, Angelike P

    2014-03-01

    Experiential gaming strategies offer a variation on traditional learning. A board game was used to present synthesized content of fundamental catheter care concepts and reinforce evidence-based practices relevant to nursing. Board games are innovative educational tools that can enhance active learning. Copyright 2014, SLACK Incorporated.

  13. Nonlinear finite element modeling of corrugated board

    Science.gov (United States)

    A. C. Gilchrist; J. C. Suhling; T. J. Urbanik

    1999-01-01

    In this research, an investigation on the mechanical behavior of corrugated board has been performed using finite element analysis. Numerical finite element models for corrugated board geometries have been created and executed. Both geometric (large deformation) and material nonlinearities were included in the models. The analyses were performed using the commercial...

  14. Gender Quotas on Board of Directors

    DEFF Research Database (Denmark)

    Smith, Nina

    2013-01-01

    Beside arguments of fairness and equal opportunities, it is often argued that gender diversity on boards of directors may improve firm performance, but the empirical results are mixed and often negative. Based on the available research, gender quotas on boards of directors cannot be justified...

  15. 49 CFR 1018.95 - Board determination.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Board determination. 1018.95 Section 1018.95... determination. (a) Following review of the evidence, the Board will issue a written decision which will include... determination, it shall notify the debtor of its intent to refer the debt to the IRS for offset against the...

  16. 42 CFR 56.304 - Governing board.

    Science.gov (United States)

    2010-10-01

    ...) Composition. (1) A majority of the board members must be migratory and seasonal agricultural workers and..., finance and banking, legal affairs, trade unions, and other commercial and industrial concerns, or social... establishment of policy in the conduct of the center. (2) The governing board shall hold regularly scheduled...

  17. 78 FR 66785 - SES Performance Review Board

    Science.gov (United States)

    2013-11-06

    ... Safety Board. Steven E. Goldberg, Chief Financial Officer, National Transportation Safety Board. John.... Goldberg's rating review). Anthony P. Scardino, Chief Financial Officer, U.S. Patent and Trademark Office... CONTACT: Emily T. Carroll, Chief, Human Resources Division, Office of Administration, National...

  18. Faculty and Governing Boards: Building Bridges.

    Science.gov (United States)

    Perley, James E.

    1997-01-01

    It is important for governing boards to understand that faculty see themselves less as employees than as officers of the institution, charged with constantly seeking the best for their discipline even if the values they advance seem at odds with those of the administration or board. They cherish collegiality, direct communication, and respect for…

  19. 12 CFR 704.4 - Board responsibilities.

    Science.gov (United States)

    2010-01-01

    ... of liquidity, market, and credit risk associated with current activities) are produced timely in... Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS CORPORATE CREDIT UNIONS § 704.4 Board responsibilities. (a) General. A corporate credit union's board of directors...

  20. 14 CFR 389.16 - Board publications.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Board publications. 389.16 Section 389.16...) ORGANIZATION FEES AND CHARGES FOR SPECIAL SERVICES Fees for Special Services § 389.16 Board publications. (a) Charges for publications. Charges have been established by the Superintendent of Documents for...

  1. Augmentation of board games using smartphones

    DEFF Research Database (Denmark)

    Kulsinskas, Arturas; Balan, Catalin; Egede Bukdahl, Nicholas

    2015-01-01

    This paper contains details about research into the effect of digital augmentation on social presence in board games. A case study of the board game Tobago was performed during the project and a prototype application for smartphones was developed in order to compare the players’ social presence...

  2. The Inner Workings of the Board

    DEFF Research Database (Denmark)

    de Haas, Ralph; Ferreira, Daniel; Kirchmaier, Tom

    We survey non-executive directors in emerging markets to obtain detailed information about the inner workings of corporate boards across a variety of institutional settings. We document substantial variation in the structure and conduct of boards as well as in directors’ perceptions about the local...

  3. 77 FR 61379 - Performance Review Board Membership

    Science.gov (United States)

    2012-10-09

    ... DEPARTMENT OF COMMERCE Performance Review Board Membership AGENCY: Economics and Statistics... eligible to serve on the Performance Review Board (PRB) in accordance with the Economics and Statistics.... Arnold William G. Bostic, Jr. Joanne Buenzli Crane Justin R. Ehrenwerth Ron S. Jarmin Theodore A. Johnson...

  4. 75 FR 57440 - Performance Review Board Membership

    Science.gov (United States)

    2010-09-21

    ... DEPARTMENT OF COMMERCE Performance Review Board Membership AGENCY: Economics and Statistics... the Performance Review Board in accordance with the Economics and Statistics Administration's Senior... Callahan, Nancy M. Gordon, Howard R. Hogan, Arnold A. Jackson, Theodore A. Johnson, Steven J. Jost, J...

  5. Board diligence, director business and corporate governance

    Directory of Open Access Journals (Sweden)

    Saibal Ghosh

    2007-11-01

    Full Text Available The paper examines the association between financial performance and boards of non-financial firms. Using data on over 200 listed manufacturing firms in India for 2005, the findings indicate that, after controlling for various firm-specific factors, board diligence as well as director busyness exerts a positive influence on corporate performance.

  6. Governing Board of the Pension Fund

    CERN Multimedia

    2006-01-01

    The Governing Board of the Pension Fund held its 142nd meeting on 14 March 2006. As an introduction to the meeting, the Administrator underlined that, at 12.4%, the performance achieved by the Fund on its assets had been excellent and had taken the Fund's assets at the end of the year to 4,209 MCHF, which was well above the 4 billion Swiss franc mark. The Chairman of the Governing Board, Professor Ferrini, reported on the Board's closed session on 7 March to examine the nominations received for the election of the Vice-Chairmen of the Governing Board of the Pension Fund. The Governing Board had unanimously agreed to recommend the CERN Council to appoint Mr A. J. Naudi and Dr J.-P. Matheys. At its session on 16 March 2006, the Council had followed the recommendation of the Governing Board by re-appointing J.-P. Matheys and A. J. Naudi Vice-Chairmen of the Board until the end of their respective terms of office as members of the Governing Board. Regarding the comparison with other European pension funds launc...

  7. 78 FR 22545 - Performance Review Board

    Science.gov (United States)

    2013-04-16

    ... FURTHER INFORMATION CONTACT: Harriette H. Charbonneau, Director of Human Resources, Federal Maritime... prescribed by the Office of Personnel Management, one or more performance review boards. The board shall..., Managing Director 15. Austin L. Schmitt, Director, Strategic Planning and Regulatory Review [FR Doc. 2013...

  8. Gendered Behavior Patterns in School Board Governance

    Science.gov (United States)

    Mountford, Meredith; Brunner, C. Cryss

    2010-01-01

    Background/Context: Educational leadership literature lacks research focused on how gender influences decision making, in particular at the highest level of school governance, the school board table. Consequently, whether gender makes a difference during decision making at the school board table has yet to be determined. Purpose/Objective/Research…

  9. 42 CFR 456.716 - DUR Board.

    Science.gov (United States)

    2010-10-01

    ... most effectively lead to improvement in the quality of drug therapy. The DUR board recommendations must... review, evaluation, and intervention. (4) Medical quality assurance. (b) Board composition. At least one... predetermined standards that pharmacies not using approved software must use in conducting prospective DUR. (2...

  10. Boys' boarding school management: understanding the choice ...

    African Journals Online (AJOL)

    The South African secondary boarding school sector has become more competitive as schools attempt to attract and retain pupils. Management of such schools must not only address the educational and boarding needs of pupils, but also apply appropriate management and marketing principles to compete effectively with ...

  11. Microbial disease and the coral holobiont

    Science.gov (United States)

    Bourne, David G.; Garren, Melissa; Work, Thierry M.; Rosenberg, Eugene; Smith, Garriet W.; Harvell, C. Drew

    2009-01-01

    Tropical coral reefs harbour a reservoir of enormous biodiversity that is increasingly threatened by direct human activities and indirect global climate shifts. Emerging coral diseases are one serious threat implicated in extensive reef deterioration through disruption of the integrity of the coral holobiont – a complex symbiosis between the coral animal, endobiotic alga and an array of microorganisms. In this article, we review our current understanding of the role of microorganisms in coral health and disease, and highlight the pressing interdisciplinary research priorities required to elucidate the mechanisms of disease. We advocate an approach that applies knowledge gained from experiences in human and veterinary medicine, integrated into multidisciplinary studies that investigate the interactions between host, agent and environment of a given coral disease. These approaches include robust and precise disease diagnosis, standardised ecological methods and application of rapidly developing DNA, RNA and protein technologies, alongside established histological, microbial ecology and ecological expertise. Such approaches will allow a better understanding of the causes of coral mortality and coral reef declines and help assess potential management options to mitigate their effects in the longer term.

  12. Assessing the Consequences of Microbial Infection in Field Trials: Seen, Unseen, Beneficial, Parasitic and Pathogenic

    Directory of Open Access Journals (Sweden)

    Mark E. Looseley

    2014-06-01

    Full Text Available Microbial infections of crop plants present an ongoing threat to agricultural production. However, in recent years, we have developed a more nuanced understanding of the ecological role of microbes and how they interact with plants. This includes an appreciation of the influence of crop physiology and environmental conditions on the expression of disease symptoms, the importance of non-pathogenic microbes on host plants and pathogens, and the capacity for plants to act as hosts for human pathogens. Alongside this we now have a variety of tools available for the identification and quantification of microbial infections on crops grown under field conditions. This review summarises some of the consequences of microbial infections in crop plants, and discusses how new and established assessment tools can be used to understand these processes. It challenges our current assumptions in yield loss relationships and offers understanding of the potential for more resilient crops.

  13. Monitoring Microbially Influenced Corrosion

    DEFF Research Database (Denmark)

    Hilbert, Lisbeth Rischel

    and diffusional effects and unreliable corrosion rates, when biofilm and ferrous sulphide corrosion products cover the steel surface. Corrosion rates can be overestimated by a factor of 10 to 100 by electrochemical techniques. Weight loss coupons and ER are recommended as necessary basic monitoring techniques......Abstract Microbially influenced corrosion (MIC) of carbon steel may occur in media with microbiological activity of especially sulphate-reducing bacteria (SRB). The applicability and reliability of a number of corrosion monitoring techniques for monitoring MIC has been evaluated in experiments....... EIS might be used for detection of MIC as the appearance of very large capacitances can be attributed to the combined ferrous sulphide and biofilm formation. Capacitance correlates directly with sulphide concentration in sterile sulphide media. Keywords: Corrosion monitoring, carbon steel, MIC, SRB...

  14. New microbial growth factor

    Science.gov (United States)

    Bok, S. H.; Casida, L. E., Jr.

    1977-01-01

    A screening procedure was used to isolate from soil a Penicillium sp., two bacterial isolates, and a Streptomyces sp. that produced a previously unknown microbial growth factor. This factor was an absolute growth requirement for three soil bacteria. The Penicillium sp. and one of the bacteria requiring the factor, an Arthrobacter sp., were selected for more extensive study concerning the production and characteristics of the growth factor. It did not seem to be related to the siderochromes. It was not present in soil extract, rumen fluid, or any other medium component tested. It appears to be a glycoprotein of high molecular weight and has high specific activity. When added to the diets for a meadow-vole mammalian test system, it caused an increased consumption of diet without a concurrent increase in rate of weight gain.

  15. New trends in designing NPP control boards

    International Nuclear Information System (INIS)

    Kondrat'ev, V.V.

    1981-01-01

    A short analytical summary of the latest developments and future trends in designing NPP control boards is given. The designs of the Westinghause and the Hynkley-Point NPP control boards are described in detail. The essence of the advanced control board concept consists , firstly, in expanded use of computer-controlled displays for the sake of reducing the content of unimportant information presented to an operator, and, secondary, in better account of human possibilities to convert the NPP operation information into a more suitable form. An enlarged use of the direct digital reactor control utilizing microprocessors is expected. Besides, the employment of full-scale control board mock-ups and information desks as well as testing newly-developed control boards at computer reactor simulators are concluded to be used at all-growing rate [ru

  16. VME bus based microcomputer system boards

    International Nuclear Information System (INIS)

    Chandra, A.K.; Ganesh, G.; Mayya, Anuradha; Chachondia, A.S.; Premraj, M.K.

    1991-01-01

    Several operator information systems for nuclear plants has been developed in the Division and these have involved extensive use of microcomputer boards for achieving various functions. Standard VME bus based boards have been developed to provide the most used functions. These boards have been fabricated and tested and used in several systems including Channel Temperature Monitoring systems, Disturbance Recording Systems etc. and are also proposed to be used in additional systems under developement. The use of standard bus and boards provides considerable savings in engineering time, prototyping, testing and evaluation costs, and maintenance support. This report desribes the various boards developed and the functions available on each. (author). 4 refs., 11 figs., 3 appendixes

  17. MATTERS PRESENTED AT THE JOINT BOARDS MEETING

    CERN Multimedia

    T. Virdee

    CMS Organisation (T. Virdee) The Management Board endorsed J. Incandela as Deputy Physics Coordinator; he would move to CERN in the middle of 2007. The Board also took note of the Level-2 Convenors in Computing, Offline Software and Physics. Suggestions for the unfilled positions were still welcome. It was urgent to appoint a Database Coordinator. In the cases where only one Level-2 coordinator was being nominated the second would be nominated in 9 months. It was stressed that the SLHC working group must do real simulations to address questions about the machine design. The Management Board took note of the proposal to formally assign Mentors to Physics and analysis groups, of the nominations of the Convenors of the Detector Performance Groups and recommended that the Trigger Coordinator be appointed soon. Discussion on Technical Recommendations (A. Ball) The Board was reminded of the conclusions presented at the Joint Boards meeting. The present planning assumed that the YB0 services installation could...

  18. An effective board from a team perspective

    Directory of Open Access Journals (Sweden)

    Eythor Ivar Jonsson

    2006-11-01

    Full Text Available This paper looks at boards from a team perspective, where insights from research on teams are used to discuss some classical problems of corporate governance. The Enron-case is used as an underlying theme as it portrays some of the biggest challenges that boards face today. Theories developed within the team literature emphasise that for boards to become more effective they need more time and better access to information as a source of knowledge, more structure and purposeful roles for directors and for the board in general, and they need to become smaller and more focused. In effect, the culture of teams could have avoided some of the blunders of the Enron board.

  19. Optimal boarding method for airline passengers

    Energy Technology Data Exchange (ETDEWEB)

    Steffen, Jason H.; /Fermilab

    2008-02-01

    Using a Markov Chain Monte Carlo optimization algorithm and a computer simulation, I find the passenger ordering which minimizes the time required to board the passengers onto an airplane. The model that I employ assumes that the time that a passenger requires to load his or her luggage is the dominant contribution to the time needed to completely fill the aircraft. The optimal boarding strategy may reduce the time required to board and airplane by over a factor of four and possibly more depending upon the dimensions of the aircraft. I explore some features of the optimal boarding method and discuss practical modifications to the optimal. Finally, I mention some of the benefits that could come from implementing an improved passenger boarding scheme.

  20. 4 CFR 22.2 - Board Consideration [Rule 2].

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Board Consideration [Rule 2]. 22.2 Section 22.2 Accounts... OFFICE CONTRACT APPEALS BOARD § 22.2 Board Consideration [Rule 2]. (a) Offices. The office of the Board... consideration of a matter by all members of the Contract Appeals Board will not be granted in any appeal filed...

  1. 29 CFR 1207.2 - Requests for Mediation Board action.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Requests for Mediation Board action. 1207.2 Section 1207.2 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD ESTABLISHMENT OF SPECIAL ADJUSTMENT BOARDS § 1207.2 Requests for Mediation Board action. (a) Requests for the National Mediation Board...

  2. 78 FR 73187 - Black Hills National Forest Advisory Board

    Science.gov (United States)

    2013-12-05

    ... DEPARTMENT OF AGRICULTURE Forest Service Black Hills National Forest Advisory Board AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Black Hills National Forest Advisory Board (Board... all members of the Advisory Board; (2) provide orientation to Board Members on Basic Laws governing...

  3. 46 CFR 78.90-1 - Pilot boarding operation.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Pilot boarding operation. 78.90-1 Section 78.90-1... Boarding Operations § 78.90-1 Pilot boarding operation. (a) The master shall ensure that pilot boarding... instructions. (b) The master shall ensure compliance with the following during pilot boarding operations: (1...

  4. 12 CFR 905.4 - Duties of the Finance Board.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Duties of the Finance Board. 905.4 Section 905.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS DESCRIPTION OF ORGANIZATION AND FUNCTIONS Functions and Responsibilities of Finance Board § 905.4 Duties of the Finance Board. (a) Bank Syste...

  5. The maturing of microbial ecology.

    Science.gov (United States)

    Schmidt, Thomas M

    2006-09-01

    A.J. Kluyver and C.B. van Niel introduced many scientists to the exceptional metabolic capacity of microbes and their remarkable ability to adapt to changing environments in The Microbe's Contribution to Biology. Beyond providing an overview of the physiology and adaptability of microbes, the book outlined many of the basic principles for the emerging discipline of microbial ecology. While the study of pure cultures was highlighted, provided a unifying framework for understanding the vast metabolic potential of microbes and their roles in the global cycling of elements, extrapolation from pure cultures to natural environments has often been overshadowed by microbiologists inability to culture many of the microbes seen in natural environments. A combination of genomic approaches is now providing a culture-independent view of the microbial world, revealing a more diverse and dynamic community of microbes than originally anticipated. As methods for determining the diversity of microbial communities become increasingly accessible, a major challenge to microbial ecologists is to link the structure of natural microbial communities with their functions. This article presents several examples from studies of aquatic and terrestrial microbial communities in which culture and culture-independent methods are providing an enhanced appreciation for the microbe's contribution to the evolution and maintenance of life on Earth, and offers some thoughts about the graduate-level educational programs needed to enhance the maturing field of microbial ecology.

  6. Global microbialization of coral reefs.

    Science.gov (United States)

    Haas, Andreas F; Fairoz, Mohamed F M; Kelly, Linda W; Nelson, Craig E; Dinsdale, Elizabeth A; Edwards, Robert A; Giles, Steve; Hatay, Mark; Hisakawa, Nao; Knowles, Ben; Lim, Yan Wei; Maughan, Heather; Pantos, Olga; Roach, Ty N F; Sanchez, Savannah E; Silveira, Cynthia B; Sandin, Stuart; Smith, Jennifer E; Rohwer, Forest

    2016-04-25

    Microbialization refers to the observed shift in ecosystem trophic structure towards higher microbial biomass and energy use. On coral reefs, the proximal causes of microbialization are overfishing and eutrophication, both of which facilitate enhanced growth of fleshy algae, conferring a competitive advantage over calcifying corals and coralline algae. The proposed mechanism for this competitive advantage is the DDAM positive feedback loop (dissolved organic carbon (DOC), disease, algae, microorganism), where DOC released by ungrazed fleshy algae supports copiotrophic, potentially pathogenic bacterial communities, ultimately harming corals and maintaining algal competitive dominance. Using an unprecedented data set of >400 samples from 60 coral reef sites, we show that the central DDAM predictions are consistent across three ocean basins. Reef algal cover is positively correlated with lower concentrations of DOC and higher microbial abundances. On turf and fleshy macroalgal-rich reefs, higher relative abundances of copiotrophic microbial taxa were identified. These microbial communities shift their metabolic potential for carbohydrate degradation from the more energy efficient Embden-Meyerhof-Parnas pathway on coral-dominated reefs to the less efficient Entner-Doudoroff and pentose phosphate pathways on algal-dominated reefs. This 'yield-to-power' switch by microorganism directly threatens reefs via increased hypoxia and greater CO2 release from the microbial respiration of DOC.

  7. Microbial biosensors for environmental monitoring

    Directory of Open Access Journals (Sweden)

    David VOGRINC

    2015-12-01

    Full Text Available Microbial biosensors are analytical devices capable of sensing substances in the environment due to the specific biological reaction of the microorganism or its parts. Construction of a microbial biosensor requires knowledge of microbial response to the specific analyte. Linking this response with the quantitative data, using a transducer, is the crucial step in the construction of a biosensor. Regarding the transducer type, biosensors are divided into electrochemical, optical biosensors and microbial fuel cells. The use of the proper configuration depends on the selection of the biosensing element. With the use of transgenic E. coli strains, bioluminescence or fluorescence based biosensors were developed. Microbial fuel cells enable the use of the heterogeneous microbial populations, isolated from wastewater. Different microorganisms are used for different pollutants – pesticides, heavy metals, phenolic compounds, organic waste, etc. Biosensing enables measurement of their concentration and their toxic or genotoxic effects on the microbes. Increasing environmental awareness has contributed to the increase of interest for biomonitoring. Although technologies, such as bioinformatics and genetic engineering, allow us to design complex and efficient microbial biosensors for environmental pollutants, the transfer of the laboratory work to the field still remains a problem to solve.

  8. Microbial electrode sensor for alcohols

    Energy Technology Data Exchange (ETDEWEB)

    Hikuma, M [Ajinomoto Co., Inc., Kawasaki, Japan; Kubo, T; Yasuda, T; Karube, I; Suzuki, S

    1979-10-01

    A microbial electrode consisting of immobilized microorganisms, a gas permeable Teflon membrane, and an oxygen electrode was prepared for the continuous determination of methyl and ethyl alcohols. Immobilized Trichosporon brassicae was employed for a microbial electrode sensor for ethyl alcohol. When a sample solution containing ethyl alcohol was injected into a microbial electrode system, the current of the electrode decreased markedly with time until a steady state was reached. The response time was within 10 min by the steady state method and within 6 min by the pulse method. A linear relationship was observed between the current decrease and the concentration of ethyl alcohol below 22.5 mg/liter. The current was reproducible within +- 6% of the relative error when a sample solution containing 16.5 mg/liter ethyl alcohol. The standard deviation was 0.5 mg/liter in 40 experiments. The selectivity of the microbial electrode sensor for ethyl alcohol was satisfactory. The microbial electrode sensor was applied to a fermentation broth of yeasts and satisfactory comparative results were obtained (correlation coefficient 0.98). The current output of the microbial electrode sensor was almost constant for more than three weeks and 2100 assays. A microbial electrode sensor using immobilized bacteria for methyl alcohol was also described.

  9. Digestate and ash as alternatives to conventional fertilisers: Benefits and threats to soil biota

    Science.gov (United States)

    Marshall, Rachel; Lag-Brotons, Alfonso J.; Herbert, Ben; Hurst, Lois; Ostle, Nick; Dodd, Ian C.; Quinton, John; Surridge, Ben; Aiouache, Farid; Semple, Kirk T.

    2017-04-01

    Recovering energy and nutrients from waste offers opportunities to tackle issues of energy and food security whilst simultaneously improving waste management. Waste materials from the bioenergy industry potentially contain valuable resources for use in agriculture and there is growing evidence to suggest that the use of digestate, from anaerobic digestion, and biomass ash from incineration processes could contribute to improving soil health and nutrition. The work presented here is part of the Adding Value to Ash and Digestate (AVAnD) project which looks at the impacts of digestate and ash blends on soil fertility, crop yields and soil health. Whilst increased crop productivity is one of the essential indicators of the success of these alternative soil amendments; it is important that the impacts on soil biological function is understood. Field and lab experiments were conducted with a number of different fertiliser treatments, including conventional fertiliser (urea and superphosphate), digestate from two contrasting feedstocks, ash material and ash-digestate blends. Looking across different biological scales from soil microbe to soil macro-fauna, this work examines the benefits and threats to soil biota arising from the use of ash-digestate fertilisers in agriculture. Measurements of microbial respiration and biomass (by chloroform fumigation) and community composition (by phospholipid fatty acid analysis) were made at different timescales (days/weeks). Data from these studies demonstrates that none of the soil amendments decreased microbial activity or biomass in the short term (t= 1 month). Additions of both conventional fertilisers and the fertilisers derived from waste stimulated microbial activity with significantly higher respiration observed from the digestate based treatments. Digestate-based treatments also resulted in higher soil microbial biomass and differential effects were observed between digestate amendments with and without ash. These results

  10. Financial and Transactional Bylaw of Universities and Faculties of Medical Sciences: Opportunities and Threats

    Directory of Open Access Journals (Sweden)

    Masoud Abolhallaje

    2013-12-01

    Full Text Available Background and purpose: According to developments related to the relative autonomy of universities and acquired extensive powers by the board of trustees of universities of medical sciences and healthcare services in a twenty-year perspective of country and in the context of the fourth and fifth socio-economic cultural development of country, necessity of developing financial and transactional bylaw of universities of medical sciences has become increasingly clear throughout country. Materials and Methods: Grounded theory is the qualitative methodology used for this study in order to identify the threats and opportunities of new financial tax bylaw of universities and faculties of medical sciences and through the study of documents, surveys of experts and beneficiaries and elites by Delphi method. Results: Releasing potential of public administration in order to control sources and uses, increasing management confidence in documented decision making, establishing organizational concentration on controlling costs, providing conditions of decision-making according to financial reports, independency in firing and hiring manpower by adopting specific provisions and creating independency in method of keeping accounts are among the most important opportunities. While poor organizational structure, lack of knowledge and skills in the existing structure, mental processes caused by reactions and incompatibility of staff, lack of criteria and rules in selection appointment and dismissal of managers and employees, lack of discipline and proper mechanisms in order to pursue the purposes, calculating financial burden and human resources required and finally, passing through traditional thinking and management system are among the most threats. Conclusion: Considering the mentioned threats and opportunities, financial and transactional bylaw of universities and faculties of medical sciences was basically revised and modified in January 2006, and then after

  11. The Independent Payment Advisory Board.

    Science.gov (United States)

    Manchikanti, Laxmaiah; Falco, Frank J E; Singh, Vijay; Benyamin, Ramsin M; Hirsch, Joshua A

    2011-01-01

    The Independent Payment Advisory Board (IPAB) is a vastly powerful component of the president's health care reform law, with authority to issue recommendations to reduce the growth in Medicare spending, providing recommendations to be considered by Congress and implemented by the administration on a fast track basis. Ever since its inception, IPAB has been one of the most controversial issues of the Patient Protection and Affordable Care Act (ACA), even though the powers of IPAB are restricted and multiple sectors of health care have been protected in the law. IPAB works by recommending policies to Congress to help Medicare provide better care at a lower cost, which would include ideas on coordinating care, getting rid of waste in the system, providing incentives for best practices, and prioritizing primary care. Congress then has the power to accept or reject these recommendations. However, Congress faces extreme limitations, either to enact policies that achieve equivalent savings, or let the Secretary of Health and Human Services (HHS) follow IPAB's recommendations. IPAB has strong supporters and opponents, leading to arguments in favor of or against to the extreme of introducing legislation to repeal IPAB. The origins of IPAB are found in the ideology of the National Institute for Health and Clinical Excellence (NICE) and the impetus of exploring health care costs, even though IPAB's authority seems to be limited to Medicare only. The structure and operation of IPAB differs from Medicare and has been called the Medicare Payment Advisory Commission (MedPAC) on steroids. The board membership consists of 15 full-time members appointed by the president and confirmed by the Senate with options for recess appointments. The IPAB statute sets target growth rates for Medicare spending. The applicable percent for maximum savings appears to be 0.5% for year 2015, 1% for 2016, 1.25% for 2017, and 1.5% for 2018 and later. The IPAB Medicare proposal process involves

  12. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  13. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  14. Physical threat and self-evaluative emotions in smoking cessation

    NARCIS (Netherlands)

    Dijkstra, A; Den Dijker, L

    Negative self-evaluative emotions (e.g., feeling dissatisfied with oneself, feeling stupid) are considered to indicate a threat to the self that can be caused by an external physical threat (e.g., smoking). A sample of 363 smokers was tested twice, with an interval of 8 months. Prospective analyses

  15. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    interests. These threats were separate from traditional regional or state-centered threats, and included such diverse issues as terrorism, mass migrations ...organizations as examples of TOC; the Sinaloa Cartel, the Yakuza, the Camorra. This conceptual framework leads to the conclusion that the best way to deal

  16. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  17. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    Science.gov (United States)

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  18. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  19. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  20. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  1. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  2. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  3. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  4. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  5. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  6. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  7. Science priorities for reducing the threat of invasive species

    Science.gov (United States)

    E. A. Chornesky; A. M. Bartuska; G. H. Aplet; J. Cummings-Carlson; F. W. Davis; J. Eskow; D. R. Gordon; K. W. Gottschalk; R. A. Haack; A. J. Hansen; R. N. Mack; F. J. Rahel; M. A. Shannon; L. A. Wainger; T. B. Wigley

    2005-01-01

    Invasive species pose a major, yet poorly addressed, threat to sustainable forestry. Here we set forth an interdisciplinary science strategy of research, development, and applications to reduce this threat. To spur action by public and private entities that too often are slow, reluctant, or unable to act, we recommend (a) better integrating invasive species into...

  8. Prejudice towards Muslims in The Netherlands : Testing integrated threat theory

    NARCIS (Netherlands)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-01-01

    This study uses integrated threat theory to examine Dutch adolescents’ (N ¼ 1; 187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators

  9. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider...

  10. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  11. The microbial ecology of permafrost

    DEFF Research Database (Denmark)

    Jansson, Janet; Tas, Neslihan

    2014-01-01

    Permafrost constitutes a major portion of the terrestrial cryosphere of the Earth and is a unique ecological niche for cold-adapted microorganisms. There is a relatively high microbial diversity in permafrost, although there is some variation in community composition across different permafrost......-gas emissions. This Review describes new data on the microbial ecology of permafrost and provides a platform for understanding microbial life strategies in frozen soil as well as the impact of climate change on permafrost microorganisms and their functional roles....

  12. Defining Disturbance for Microbial Ecology.

    Science.gov (United States)

    Plante, Craig J

    2017-08-01

    Disturbance can profoundly modify the structure of natural communities. However, microbial ecologists' concept of "disturbance" has often deviated from conventional practice. Definitions (or implicit usage) have frequently included climate change and other forms of chronic environmental stress, which contradict the macrobiologist's notion of disturbance as a discrete event that removes biomass. Physical constraints and disparate biological characteristics were compared to ask whether disturbances fundamentally differ in microbial and macroorganismal communities. A definition of "disturbance" for microbial ecologists is proposed that distinguishes from "stress" and other competing terms, and that is in accord with definitions accepted by plant and animal ecologists.

  13. Zika Virus: An Emerging Global Health Threat

    Directory of Open Access Journals (Sweden)

    Rahul Mittal

    2017-12-01

    Full Text Available Zika virus (ZIKV is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV, and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease.

  14. Nuclear weapons: new threats, new challenges

    International Nuclear Information System (INIS)

    Durand, D.

    2005-01-01

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  15. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  16. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    Kikuchi, Masahiro; Nakagome, Yoshihiro

    2005-01-01

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  17. The concept of leakage in threat assessment.

    Science.gov (United States)

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  18. Zika Virus: An Emerging Global Health Threat

    Science.gov (United States)

    Mittal, Rahul; Nguyen, Desiree; Debs, Luca H.; Patel, Amit P.; Liu, George; Jhaveri, Vasanti M.; S. Kay, Sae-In; Mittal, Jeenu; Bandstra, Emmalee S.; Younis, Ramzi T.; Chapagain, Prem; Jayaweera, Dushyantha T.; Liu, Xue Zhong

    2017-01-01

    Zika virus (ZIKV) is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS) and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV), and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease. PMID:29276699

  19. Lab-to-Lab Cooperative Threat Reduction

    Science.gov (United States)

    Hecker, Siegfried S.

    2017-11-01

    It is difficult to imagine today how dramatically global nuclear risks changed 25 years ago as the Soviet Union disintegrated. Instead of the threat of mutual nuclear annihilation, the world became concerned that Russia and the other 14 former Soviet states would lose control of their huge nuclear assets - tens of thousands of nuclear weapons, more than a million kilograms of fissile materials, hundreds of thousands of nuclear workers, and a huge nuclear complex. I will describe how scientists and engineers at the DOE laboratories, with a focus on Los Alamos, Lawrence Livermore and Sandia national laboratories, joined forces with those at the Russian nuclear weapon institutes for more than 20 years to avoid what looked like the perfect nuclear storm - a story told in the two-volume book Doomed to Cooperate1 published in 2016. Due to an internal processing error, an incorrect version of this article was published on 15 November 2017 that omitted the footnotes. AIP Publishing apologizes for this error. An updated version of this article, including the missing footnotes, was published on 21 November 2017.

  20. Informal caregivers in hospitals: Opportunities and threats.

    Science.gov (United States)

    Amiresmaili, Mohammadreza; Emrani, Zahra

    2018-05-20

    High hospital costs are a challenge that health system face. Additionally, studies identified manpower deficiency as a problem in health system. Hospital is a place where patients with different physical and mental conditions come to. Their families and friends' companionship can facilitate this situation for them. This study illustrates the roles of informal caregivers in hospital. This is a phenomenological qualitative study. Data were gathered through semistructured interviews. We interviewed 22 informal caregivers and 9 nurse staffs from different departments of hospital. They were selected through purposeful and snowball sampling approach. The framework method was used for data analysis. We found 3 main themes including (a) roles of informal caregivers, (b) opportunities of presence of the informal caregivers in the hospital, and (c) threats of presence of informal caregivers. This study shows some roles for informal caregivers including mental supports, consultation, decision-making, and care roles. Concerning the shortage of manpower in Iran's hospitals, nurses have less time to take care of each patient; therefore, using informal caregivers as an implicit strategy to overcome nursing shortage and to reduce hospital costs seems to be beneficial. We suggest that an appropriate plan is necessary to make use of them for filling this gap to some extent, as well as providing training sessions and facilities for companions acting as informal caregivers. Copyright © 2018 John Wiley & Sons, Ltd.