WorldWideScience

Sample records for microbial threats board

  1. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  2. Microbial Threats to Health: Emergence, Detection, and Response

    National Research Council Canada - National Science Library

    Smolinski, Mark S; Hamburg, Margaret A; Lederberg, Joshua

    2003-01-01

    .... The recent SARS outbreak is a prime example. Knowing neither geographic nor political borders, often arriving silently and lethally, microbial pathogens constitute a grave threat to the health of humans...

  3. The power of the Brown v. Board of Education decision: theorizing threats to sustainability.

    Science.gov (United States)

    Fine, Michelle

    2004-09-01

    Interviews with African American and White American elders capture the immediate power of the Brown v. Board of Education (1954) decision and the biography of its impact over time. This article reviews the lived experience of the decision and theorizes 3 threats to sustainability that ruthlessly undermined the decision over time: (a) the unacknowledged and enormous sacrifice endured by the African American community in the name of desegregation; b) the violent and relentless resistance to the decision by government officials, educators, and many White community members; and (c) the dramatic shrinkage of the vision of Brown from the dismantling of White supremacy to a technical matter of busing. Implications are drawn for the study of desegregation and for the study of sustainability of social justice more broadly. ((c) 2004 APA, all rights reserved)

  4. The high energy multicharged particle exposure of the microbial ecology evaluation device on board the Apollo 16 spacecraft

    Science.gov (United States)

    Benton, E. V.; Henke, R. P.

    1973-01-01

    The high energy multicharged cosmic-ray-particle exposure of the Microbial Ecology Evaluation Device package on board the Apollo 16 spacecraft was monitored using cellulose nitrate, Lexan polycarbonate, nuclear emulsion, and silver chloride crystal nuclear-track detectors. The results of the analysis of these detectors include the measured particle fluences, the linear energy transfer spectra, and the integral atomic number spectrum of stopping particle density. The linear energy transfer spectrum is used to compute the fractional cell loss in human kidney (T1) cells caused by heavy particles. Because the Microbial Ecology Evaluation Device was better shielded, the high-energy multicharged particle exposure was less than that measured on the crew passive dosimeters.

  5. Making Boards More Effective: The Issue Of Independence | Ajogwu ...

    African Journals Online (AJOL)

    The authors argue that the independence of the board will be put in jeopardy if the board is made up mainly of executive directors, and if the non-executive directors, where they exist, have significant relationships with parties connected to the firm. Other sources of threat to the independence of the board are the combination ...

  6. 76 FR 60473 - Membership of the Performance Review Board

    Science.gov (United States)

    2011-09-29

    ... Services Agency, Defense Logistics Agency, Defense Threat Reduction Agency, Missile Defense Agency, and... DEPARTMENT OF DEFENSE Office of the Secretary Membership of the Performance Review Board AGENCY: Office of the Secretary (OSD), Department of Defense (DoD). ACTION: Notice of board membership. SUMMARY...

  7. 77 FR 49440 - Membership of the Performance Review Board

    Science.gov (United States)

    2012-08-16

    ..., Defense Security Cooperation Agency, Defense Threat Reduction Agency, Missile Defense Agency, and Pentagon... DEPARTMENT OF DEFENSE Office of the Secretary Membership of the Performance Review Board AGENCY: Office of the Secretary of Defense (OSD), DoD. ACTION: Notice of board membership. SUMMARY: This notice...

  8. 78 FR 52517 - Membership of the Performance Review Board

    Science.gov (United States)

    2013-08-23

    ..., Defense Security Cooperation Agency, Defense Threat Reduction Agency, Missile Defense Agency, and Pentagon... DEPARTMENT OF DEFENSE Office of the Secretary Membership of the Performance Review Board AGENCY: Office of the Secretary of Defense (OSD), DoD. ACTION: Notice of board membership. SUMMARY: This notice...

  9. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  10. Toward Understanding, Managing, and Protecting Microbial Ecosystems

    Science.gov (United States)

    Bodelier, Paul L. E.

    2011-01-01

    Microbial communities are at the very basis of life on earth, catalyzing biogeochemical reactions driving global nutrient cycles. However, unlike for plants and animals, microbial diversity is not on the biodiversity–conservation agenda. The latter, however, would imply that microbial diversity is not under any threat by anthropogenic disturbance or climate change. This maybe a misconception caused by the rudimentary knowledge we have concerning microbial diversity and its role in ecosystem functioning. This perspective paper identifies major areas with knowledge gaps within the field of environmental microbiology that preclude a comprehension of microbial ecosystems on the level we have for plants and animals. Opportunities and challenges are pointed out to open the microbial black box and to go from descriptive to predictive microbial ecology. PMID:21747797

  11. Towards understanding, managing and protecting microbial ecosystems

    Directory of Open Access Journals (Sweden)

    Paul eBodelier

    2011-04-01

    Full Text Available Microbial communities are at the very basis of life on earth, catalysing biogeochemical reactions driving global nutrient cycles. However, unlike for plants and animals, microbial diversity is not on the biodiversity conservation agenda. The latter, however, would imply that microbial diversity is not under any threat by anthropogenic disturbance or climate change. This maybe a misconception caused by the rudimentary knowledge we have concerning microbial diversity and its role in ecosystem functioning. This perspective paper indentifies major areas with knowledge gaps within the field of environmental microbiology that preclude a comprehension of microbial ecosystems on the level we have for plants and animals. Opportunities and challenges are pointed out to open the microbial black box and to go from descriptive to predictive microbial ecology.

  12. Toward understanding, managing, and protecting microbial ecosystems.

    Science.gov (United States)

    Bodelier, Paul L E

    2011-01-01

    Microbial communities are at the very basis of life on earth, catalyzing biogeochemical reactions driving global nutrient cycles. However, unlike for plants and animals, microbial diversity is not on the biodiversity-conservation agenda. The latter, however, would imply that microbial diversity is not under any threat by anthropogenic disturbance or climate change. This maybe a misconception caused by the rudimentary knowledge we have concerning microbial diversity and its role in ecosystem functioning. This perspective paper identifies major areas with knowledge gaps within the field of environmental microbiology that preclude a comprehension of microbial ecosystems on the level we have for plants and animals. Opportunities and challenges are pointed out to open the microbial black box and to go from descriptive to predictive microbial ecology.

  13. Microbial Monitoring from the Frontlines to Space: A Successful Validation of a Department of Defense (DoD) Funded Small Business Innovation Research (SBIR) Technology on Board the International Space Station (ISS)

    Science.gov (United States)

    Oubre, Cherie; Khodadad, Christina; Castro, Victoria; Ott, Mark; Pollack, Lawrence; Roman, Monsi

    2017-01-01

    The RAZOR EX (Registered Trademark) PCR unit was initially developed by the DoD as part of an SBIR project to detect and identify biothreats during field deployment. The system was evaluated by NASA as a commercial technology for future microbial monitoring requirements and has been successfully demonstrated in microgravity on-board the International Space Station.

  14. Board-invited review: Rumen microbiology: leading the way in microbial ecology.

    Science.gov (United States)

    Krause, D O; Nagaraja, T G; Wright, A D G; Callaway, T R

    2013-01-01

    Robert Hungate, considered the father of rumen microbiology, was the first to initiate a systematic exploration of the microbial ecosystem of the rumen, but he was not alone. The techniques he developed to isolate and identify cellulose-digesting bacteria from the rumen have had a major impact not only in delineating the complex ecosystem of the rumen but also in clinical microbiology and in the exploration of a number of other anaerobic ecosystems, including the human hindgut. Rumen microbiology has pioneered our understanding of much of microbial ecology and has broadened our knowledge of ecology in general, as well as improved the ability to feed ruminants more efficiently. The discovery of anaerobic fungi as a component of the ruminal flora disproved the central dogma in microbiology that all fungi are aerobic organisms. Further novel interactions between bacterial species such as nutrient cross feeding and interspecies H2 transfer were first described in ruminal microorganisms. The complexity and diversity present in the rumen make it an ideal testing ground for microbial theories (e.g., the effects of nutrient limitation and excess) and techniques (such as 16S rRNA), which have rewarded the investigators that have used this easily accessed ecosystem to understand larger truths. Our understanding of characteristics of the ruminal microbial population has opened new avenues of microbial ecology, such as the existence of hyperammonia-producing bacteria and how they can be used to improve N efficiency in ruminants. In this review, we examine some of the contributions to science that were first made in the rumen, which have not been recognized in a broader sense.

  15. Threats and Violence in the Lead-up to Psychiatric Mechanical Restraint – a Danish Case Law Study

    DEFF Research Database (Denmark)

    Birkeland, Søren

    for instigating MR is dangerous patient behavior and research has suggested that many MR episodes result from experienced violence or threat of violence by staff these aspects attract special attention. This study analyzes the role of threat, violence, and contextual characteristics in MR lawsuits. Methodology......: In Denmark a Psychiatric Complaint Board considers patients’ complaints about compliance with law. The Board annually makes public a selection of case decisions. A case law review was carried out on all publicly available lawsuits concerning MR completed by the Board during the years 2007-2014 with focus.......g. psychological) or aggressive behavior was described (e.g. humiliating remarks). In 52 cases (32%) there was information that belt fixation had been supplemented with arm or leg fixation. MR was concluded illegal in 124 (76%) of cases and in 33 cases (20%) the duration of MR use was concluded illegal. Among...

  16. Microbial Biofilm as a Smart Material

    DEFF Research Database (Denmark)

    Garde, Christian; Welch, Martin; Ferkinghoff-Borg, Jesper

    2015-01-01

    Microbial biofilm colonies will in many cases form a smart material capable of responding to external threats dependent on their size and internal state. The microbial community accordingly switches between passive, protective, or attack modes of action. In order to decide which strategy to employ......, it is essential for the biofilm community to be able to sense its own size. The sensor designed to perform this task is termed a quorum sensor, since it only permits collective behaviour once a sufficiently large assembly of microbes have been established. The generic quorum sensor construct involves two genes...

  17. Microbial ecology and biogeochemistry of continental Antarctic soils.

    Science.gov (United States)

    Cowan, Don A; Makhalanyane, Thulani P; Dennis, Paul G; Hopkins, David W

    2014-01-01

    The Antarctica Dry Valleys are regarded as the coldest hyperarid desert system on Earth. While a wide variety of environmental stressors including very low minimum temperatures, frequent freeze-thaw cycles and low water availability impose severe limitations to life, suitable niches for abundant microbial colonization exist. Antarctic desert soils contain much higher levels of microbial diversity than previously thought. Edaphic niches, including cryptic and refuge habitats, microbial mats and permafrost soils all harbor microbial communities which drive key biogeochemical cycling processes. For example, lithobionts (hypoliths and endoliths) possess a genetic capacity for nitrogen and carbon cycling, polymer degradation, and other system processes. Nitrogen fixation rates of hypoliths, as assessed through acetylene reduction assays, suggest that these communities are a significant input source for nitrogen into these oligotrophic soils. Here we review aspects of microbial diversity in Antarctic soils with an emphasis on functionality and capacity. We assess current knowledge regarding adaptations to Antarctic soil environments and highlight the current threats to Antarctic desert soil communities.

  18. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  19. Microbial resistance to antibiotics | Chinedum | African Journal of ...

    African Journals Online (AJOL)

    Organisms that are normally sensitive to the action of an antibiotic may sometimes develop resistance or insensitivity to it. This, they may do through destroying the antibiotic or by retaining their growth even in the presence of the drug. Microbial resistance to antibiotics is now widespread and poses a serious clinical threat.

  20. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  1. Deep subsurface microbial processes

    Science.gov (United States)

    Lovley, D.R.; Chapelle, F.H.

    1995-01-01

    Information on the microbiology of the deep subsurface is necessary in order to understand the factors controlling the rate and extent of the microbially catalyzed redox reactions that influence the geophysical properties of these environments. Furthermore, there is an increasing threat that deep aquifers, an important drinking water resource, may be contaminated by man's activities, and there is a need to predict the extent to which microbial activity may remediate such contamination. Metabolically active microorganisms can be recovered from a diversity of deep subsurface environments. The available evidence suggests that these microorganisms are responsible for catalyzing the oxidation of organic matter coupled to a variety of electron acceptors just as microorganisms do in surface sediments, but at much slower rates. The technical difficulties in aseptically sampling deep subsurface sediments and the fact that microbial processes in laboratory incubations of deep subsurface material often do not mimic in situ processes frequently necessitate that microbial activity in the deep subsurface be inferred through nonmicrobiological analyses of ground water. These approaches include measurements of dissolved H2, which can predict the predominant microbially catalyzed redox reactions in aquifers, as well as geochemical and groundwater flow modeling, which can be used to estimate the rates of microbial processes. Microorganisms recovered from the deep subsurface have the potential to affect the fate of toxic organics and inorganic contaminants in groundwater. Microbial activity also greatly influences 1 the chemistry of many pristine groundwaters and contributes to such phenomena as porosity development in carbonate aquifers, accumulation of undesirably high concentrations of dissolved iron, and production of methane and hydrogen sulfide. Although the last decade has seen a dramatic increase in interest in deep subsurface microbiology, in comparison with the study of

  2. Microbial ecology and biogeochemistry of continental Antarctic soils

    Directory of Open Access Journals (Sweden)

    Don A Cowan

    2014-04-01

    Full Text Available The Antarctica Dry Valleys are regarded as the coldest hyperarid desert system on Earth. While a wide variety of environmental stressors including very low minimum temperatures, frequent freeze-thaw cycles and low water availability impose severe limitations to life, suitable niches for abundant microbial colonization exist. Antarctic desert soils contain much higher levels of microbial diversity than previously thought. Edaphic niches, including cryptic and refuge habitats, microbial mats and permafrost soils all harbour microbial communities which drive key biogeochemical cycling processes. For example, lithobionts (hypoliths and endoliths possess a genetic capacity for nitrogen and carbon cycling, polymer degradation and other system processes. Nitrogen fixation rates of hypoliths, as assessed through acetylene reduction assays, suggest that these communities are a significant input source for nitrogen into these oligotrophic soils. Here we review aspects of microbial diversity in Antarctic soils with an emphasis on functionality and capacity. We assess current knowledge regarding adaptations to Antarctic soil environments and highlight the current threats to Antarctic desert soil communities.

  3. Microbial contaminants in Pakistan: a review

    Directory of Open Access Journals (Sweden)

    Maida Kanwal

    2016-04-01

    Full Text Available Worldwide contamination of surface waters with microbial pathogens is of substantial health concern. These contaminants are usually transmitted by improper sanitation measures, unsafe waste disposal, excretions from patients, and physical contacts, i.e., sexual and nonsexual. Majority of these microbial pathogens have been categorized into three classes, i.e., bacteria, viruses and protozoa. Pakistan, being a developing country, is facing a noteworthy threat due to microbial contamination. In Pakistan, bacterial contaminants are reported extensively followed by viral and protozoa contaminants. The health issues associated with bacterial population includes dysentery, abdominal pain, headache, diarrhea etc.; and usually includes faecal and total coliforms, E. coli, Salmonella, Shigella and Campylobacter. The cases related to viral contamination are lesser but chronic and evidenced the presence of HCV, HAV, HEV viruses causing hepatitis, and other hepatic disorders. Lastly, the health impacts associated with protozoans are least reported; and a number of diseases such as giardia, cryptosporidium and toxoplasma have been linked with this class of contaminants. The current review compiles information of these biological contaminants along with their health issues in Pakistan. Moreover, potential sources and fate of microbial contaminants are also discussed.

  4. Assessment of the microbial quality of river water sources in rural ...

    African Journals Online (AJOL)

    drinie

    2002-07-03

    Jul 3, 2002 ... Assessment of the microbial quality of river water sources ... These untreated water sources are used for drinking and domestic purposes and pose a serious threat to ... These diseases cause crippling, devastating and debilitating effects ..... gastrointestinal illness, due mainly by enteric viruses in sewage.

  5. Method for the prioritization of areas experiencing microbial pollution of surface water

    CSIR Research Space (South Africa)

    Venter, SN

    1998-01-01

    Full Text Available The increased threat of faecal pollution in recent years and the high priority of protecting human health by the government led to the initiation of a national microbial monitoring programme for surface water in South Africa. According to the design...

  6. Microbial Degradation of Forensic Samples of Biological Origin: Potential Threat to Human DNA Typing.

    Science.gov (United States)

    Dash, Hirak Ranjan; Das, Surajit

    2018-02-01

    Forensic biology is a sub-discipline of biological science with an amalgam of other branches of science used in the criminal justice system. Any nucleated cell/tissue harbouring DNA, either live or dead, can be used as forensic exhibits, a source of investigation through DNA typing. These biological materials of human origin are rich source of proteins, carbohydrates, lipids, trace elements as well as water and, thus, provide a virtuous milieu for the growth of microbes. The obstinate microbial growth augments the degradation process and is amplified with the passage of time and improper storage of the biological materials. Degradation of these biological materials carriages a huge challenge in the downstream processes of forensic DNA typing technique, such as short tandem repeats (STR) DNA typing. Microbial degradation yields improper or no PCR amplification, heterozygous peak imbalance, DNA contamination from non-human sources, degradation of DNA by microbial by-products, etc. Consequently, the most precise STR DNA typing technique is nullified and definite opinion can be hardly given with degraded forensic exhibits. Thus, suitable precautionary measures should be taken for proper storage and processing of the biological exhibits to minimize their decaying process by micro-organisms.

  7. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  8. Board-invited review: Rumen microbiology: Leading the way in microbial ecology

    Science.gov (United States)

    Robert Hungate, considered the father of rumen microbiology, was the first to initiate a systematic exploration of the microbial ecosystem of the rumen, but he was not alone. The techniques he developed to isolate and identify cellulose-digesting bacteria from the rumen have had a major impact not ...

  9. THREATS AND BENEFITS OF EXCHANGE RATE REGIMES FOR UKRAINE IN TERMS OF EUROPEAN INTEGRATION

    Directory of Open Access Journals (Sweden)

    Svitlana Glushchenko

    2016-11-01

    Full Text Available The purpose of the paper is to determine threats and benefits of exchange rate regimes in terms of the integration of Ukraine into the European community. Emphasizing features of the manifestation of currency exchange rate in Ukrainian practice is a precondition for choosing the optimal exchange rate regime for Ukraine, which, in its turn, will provide an opportunity to reduce inflation and implement effective tools of monetary and fiscal policies to promote further economic growth and competitiveness of the country. The uses of free-floating exchange rate and «currency board» regimes have either positive effects for Ukraine or certain threats. Methodology. This research is based on a synthesis of data on the uses of exchange rate regimes in Ukraine as an independent. It is considered angular regimes, which are by far the most suitable for Ukraine in terms of the European vector of its development. Peculiarities of using these regimes are revealed and their major threats to the domestic economy are pointed out. This article analyzes the dynamics of the trade balance of payments of Ukraine, the dynamics of the commodity structure of Ukraine`s exports and imports and the external debt of Ukraine. Results. Taking into account the experience of countries, which were in crisis situations, they show the necessity of the uses of freefloating exchange rate regime and possibilities of «currency board» regime, despite threats that they may have. World experience testifies the implementation of structural reforms, effective monetary policy, fiscal policy and discipline of the government. Thorough preparation of Ukraine’s transition to the «currency board» regime can justify itself in conditions of crisis and provide impetus to Ukrainian economy benefits. The paper defines conditions under which the success of a new model of exchange rate policy will be achieved. Practical implications. The study accents attention on the specifics of the uses of the

  10. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Stienstra, S.

    2007-01-01

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  11. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  12. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. African marketing boards under structural adjustment : the experience of Sub-Saharan Africa during the 1980s

    NARCIS (Netherlands)

    Laan, van der H.L.; Haaren, van W.T.M.

    1990-01-01

    Sum.: The economic policy of structural adjustment, which was initiated in most African countries during the 1980s, posed a serious threat to agricultural marketing boards in sub-Saharan Africa. Two elements of structural adjustment were particularly ominous: 'privatization' threatened the continued

  14. The effect of threat of litigation on forensic pathologist diagnostic decision making.

    Science.gov (United States)

    Oliver, William Russell

    2011-12-01

    Recent litigation involving medical examiners has caused concern over certifying deaths. We administered a survey of 716 medical examiners regarding the effects of the threat of litigation. Two hundred twenty-two medical examiners responded (31%). Of those who responded, approximately 13.5% admitted to having modified their diagnostic findings due to threat of litigation, and approximately 32.5% stated these considerations would affect their decisions in the future. Physicians who indicated they had or would modify their diagnoses expressed more concern over the possibility of litigation. Chiefs of services were less likely than staff members to indicate changing diagnoses. Practitioners whose jurisdictions included rural areas were significantly more likely to indicate that litigation considerations would affect their diagnoses in the future, although this was not true with those who had already modified their diagnoses. No correlation was found with elected versus appointed positions, accreditation status, sex, race, geographic location, or board certification. Although very few medical examiners have actually been sued because of their diagnoses, a demonstrated threat of litigation has a substantial effect on diagnostic decision making.

  15. The Atomic Safety and Licensing Board Panel

    International Nuclear Information System (INIS)

    1998-01-01

    Through the Atomic Energy Act, Congress made is possible for the public to get a full and fair hearing on civilian nuclear matters. Individuals who are directly affected by any licensing action involving a facility producing or utilizing nuclear materials may participate in a formal hearing, on the record, before independent judges on the Atomic Safety and Licensing Board Panel (ASLBP or Panel). Frequently, in deciding whether a license, permit, amendment, or extension should be granted to a particular applicant, the Panel members must be more than mere umpires. If appropriate, they are authorized to go beyond the issues the parties place before them in order to identify, explore, and resolve significant questions involving threats to the public health and safety that come to a board's attention during the proceedings. This brochure explains the purpose of the panel. Also addressed are: type of hearing handled; method of public participation; formality of hearings; high-level waste; other panel responsibilities and litigation technology

  16. Response of soil microbial communities and microbial interactions to long-term heavy metal contamination.

    Science.gov (United States)

    Li, Xiaoqi; Meng, Delong; Li, Juan; Yin, Huaqun; Liu, Hongwei; Liu, Xueduan; Cheng, Cheng; Xiao, Yunhua; Liu, Zhenghua; Yan, Mingli

    2017-12-01

    Due to the persistence of metals in the ecosystem and their threat to all living organisms, effects of heavy metal on soil microbial communities were widely studied. However, little was known about the interactions among microorganisms in heavy metal-contaminated soils. In the present study, microbial communities in Non (CON), moderately (CL) and severely (CH) contaminated soils were investigated through high-throughput Illumina sequencing of 16s rRNA gene amplicons, and networks were constructed to show the interactions among microbes. Results showed that the microbial community composition was significantly, while the microbial diversity was not significantly affected by heavy metal contamination. Bacteria showed various response to heavy metals. Bacteria that positively correlated with Cd, e.g. Acidobacteria_Gp and Proteobacteria_thiobacillus, had more links between nodes and more positive interactions among microbes in CL- and CH-networks, while bacteria that negatively correlated with Cd, e.g. Longilinea, Gp2 and Gp4 had fewer network links and more negative interactions in CL and CH-networks. Unlike bacteria, members of the archaeal domain, i.e. phyla Crenarchaeota and Euryarchaeota, class Thermoprotei and order Thermoplasmatales showed only positive correlation with Cd and had more network interactions in CH-networks. The present study indicated that (i) the microbial community composition, as well as network interactions was shift to strengthen adaptability of microorganisms to heavy metal contamination, (ii) archaea were resistant to heavy metal contamination and may contribute to the adaption to heavy metals. It was proposed that the contribution might be achieved either by improving environment conditions or by cooperative interactions. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Protection of Antarctic microbial communities – ‘out of sight, out of mind’

    Science.gov (United States)

    Hughes, Kevin A.; Cowan, Don A.; Wilmotte, Annick

    2015-01-01

    Recent advances in molecular biology techniques have shown the presence of diverse microbial communities and endemic species in Antarctica. Endemic microbes may be a potential source of novel biotechnologically important compounds, including, for example, new antibiotics. Thus, the scientific and biotechnological value of Antarctic terrestrial microbial habitats can be compromised by human visitation to a greater extent than previously realized. The ever-increasing human footprint in Antarctica makes consideration of this topic more pressing, as the number of locations known to be pristine habitats, where increasingly sophisticated cutting-edge research techniques may be used to their full potential, declines. Examination of the Protected Areas system of the Antarctic Treaty shows that microbial habitats are generally poorly protected. No other continent on Earth is dominated to the same degree by microbial species, and real opportunities exist to develop new ways of conceptualizing and implementing conservation of microbial biogeography on a continental scale. Here we highlight potential threats both to the conservation of terrestrial microbial ecosystems, and to future scientific research requiring their study. PMID:25762992

  18. Microbial Communities Shaped by Treatment Processes in a Drinking Water Treatment Plant and Their Contribution and Threat to Drinking Water Safety

    Science.gov (United States)

    Li, Qi; Yu, Shuili; Li, Lei; Liu, Guicai; Gu, Zhengyang; Liu, Minmin; Liu, Zhiyuan; Ye, Yubing; Xia, Qing; Ren, Liumo

    2017-01-01

    Bacteria play an important role in water purification in drinking water treatment systems. On one hand, bacteria present in the untreated water may help in its purification through biodegradation of the contaminants. On the other hand, some bacteria may be human pathogens and pose a threat to consumers. The present study investigated bacterial communities using Illumina MiSeq sequencing of 16S rRNA genes and their functions were predicted using PICRUSt in a treatment system, including the biofilms on sand filters and biological activated carbon (BAC) filters, in 4 months. In addition, quantitative analyses of specific bacterial populations were performed by real-time quantitative polymerase chain reaction (qPCR). The bacterial community composition of post-ozonation effluent, BAC effluent and disinfected water varied with sampling time. However, the bacterial community structures at other treatment steps were relatively stable, despite great variations of source water quality, resulting in stable treatment performance. Illumina MiSeq sequencing illustrated that Proteobacteria was dominant bacterial phylum. Chlorine disinfection significantly influenced the microbial community structure, while other treatment processes were synergetic. Bacterial communities in water and biofilms were distinct, and distinctions of bacterial communities also existed between different biofilms. By contrast, the functional composition of biofilms on different filters were similar. Some functional genes related to pollutant degradation were found widely distributed throughout the treatment processes. The distributions of Mycobacterium spp. and Legionella spp. in water and biofilms were revealed by real-time quantitative polymerase chain reaction (qPCR). Most bacteria, including potential pathogens, could be effectively removed by chlorine disinfection. However, some bacteria presented great resistance to chlorine. qPCRs showed that Mycobacterium spp. could not be effectively removed by

  19. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  20. Bioactive natural products from novel microbial sources.

    Science.gov (United States)

    Challinor, Victoria L; Bode, Helge B

    2015-09-01

    Despite the importance of microbial natural products for human health, only a few bacterial genera have been mined for the new natural products needed to overcome the urgent threat of antibiotic resistance. This is surprising, given that genome sequencing projects have revealed that the capability to produce natural products is not a rare feature among bacteria. Even the bacteria occurring in the human microbiome produce potent antibiotics, and thus potentially are an untapped resource for novel compounds, potentially with new activities. This review highlights examples of bacteria that should be considered new sources of natural products, including anaerobes, pathogens, and symbionts of humans, insects, and nematodes. Exploitation of these producer strains, combined with advances in modern natural product research methodology, has the potential to open the way for a new golden age of microbial therapeutics. © 2015 New York Academy of Sciences.

  1. Approaches on Correlation between Board of Directors and Risk Management in Resilient Economies

    Directory of Open Access Journals (Sweden)

    Daniel Ştefan Armeanu

    2017-01-01

    Full Text Available The recent financial crisis highlighted the need for a strong emphasis on the effectiveness of board risk oversight practices. Good corporate governance upholds effective risk management, which in turn ensures the flexibility to reply to unpredicted threats and take benefit of opportunities. Thus, risk management affords corporate resilience that engenders competitive advantage due to the capacity to circumvent, deter, defend, react, and adjust to any kind of disturbance, besides recovering quickly. Guaranteeing that the board is prepared and adequately resilient to deal with a crisis circumstance is a crucial part of good governance. By employing a data set of companies listed in Romania, this paper analyzes whether boards of directors influence risk management. We measure boards by means of size, independence, diversity, establishment of Consultative Committees, as well as CEO duality, gender, age, and tenure. Based on ten financial ratios, we develop two risk indicators regarding shareholders’ wealth and short-term risk, alongside a global business failure risk tool, by means of principal component analysis. Furthermore, the output of the multivariate regression analysis show that CEO gender, the size of the board, and Audit Committee negatively influence business failure risk.

  2. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  3. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  4. Why board of nursing disciplinary actions do not always yield the expected results.

    Science.gov (United States)

    Raper, James Luther; Hudspeth, Randall

    2008-01-01

    One of the ways boards of nursing serve to protect the public health, safety, and welfare is by removing from practice those nurses who fail to meet recognized standards of care or otherwise pose a public threat. Self-reporting and discovery through criminal background checks and reports from the court system or other regulatory bodies represent only small numbers of those disciplined. Most complaints investigated by a board are reported by nursing administrators, either chief nursing officers or nurse managers. Frequently, the reporting nurses provide the board with information from their own investigation that identifies the problem and the cause and includes supporting evidence. Based on their own independent investigation, the reporting nurses often assume that the outcome of board action is a foregone conclusion. Without understanding all of the ramifications of disciplinary processes and the requirements to protect the rights of the nurse that are guaranteed under the US Constitution, the final outcome decision can be totally different than anticipated and thus disappointing to the reporting nurse administrator. They could perceive the decision as wrong, nonsupportive, and discounting the efforts made by the reporting nurse. This unhappiness with the outcome causes vulnerability in the major reporting source to a board, namely, the relationship between the board and the nurse administrator. An initial step in mitigating this vulnerability is a better understanding by nursing administrators of the legal procedures that guide disciplinary processes and boards providing timely feedback to reporting nurses on the disposition of cases.

  5. Bioleaching of metals from printed circuit boards supported with surfactant-producing bacteria

    International Nuclear Information System (INIS)

    Karwowska, Ewa; Andrzejewska-Morzuch, Dorota; Łebkowska, Maria; Tabernacka, Agnieszka; Wojtkowska, Małgorzata; Telepko, Alicja; Konarzewska, Agnieszka

    2014-01-01

    Highlights: • Bioleaching of metals from printed circuit boards by BSAC-producing bacteria was estimated. • Aeration increased the release of all metals in medium with sulphur and biosurfactant. • Increase in Cu, Pb, Ni and Cr removal rate was observed at 37 °C in acidic medium. -- Abstract: This study has evaluated the possibility of bioleaching zinc, copper, lead, nickel, cadmium and chromium from printed circuit boards by applying a culture of sulphur-oxidising bacteria and a mixed culture of biosurfactant-producing bacteria and sulphur-oxidising bacteria. It was revealed that zinc was removed effectively both in a traditional solution acidified by a way of microbial oxidation of sulphur and when using a microbial culture containing sulphur-oxidising and biosurfactant-producing bacteria. The average process efficiency was 48% for Zn dissolution. Cadmium removal was similar in both media, with a highest metal release of 93%. For nickel and copper, a better effect was obtained in the acidic medium, with a process effectiveness of 48.5% and 53%, respectively. Chromium was the only metal that was removed more effectively in the bioleaching medium containing both sulphur-oxidising and biosurfactant-producing bacteria. Lead was removed from the printed circuit boards with very low effectiveness (below 0.5%). Aerating the culture medium with compressed air increased the release of all metals in the medium with sulphur and biosurfactant, and of Ni, Cu, Zn and Cr in the acidic medium. Increasing the temperature of the medium (to 37 °C) had a more significant impact in the acidic environment than in the neutral environment

  6. Bioleaching of metals from printed circuit boards supported with surfactant-producing bacteria

    Energy Technology Data Exchange (ETDEWEB)

    Karwowska, Ewa, E-mail: ewa.karwowska@is.pw.edu.pl [Warsaw University of Technology, Faculty of Environmental Engineering, Biology Division, Nowowiejska 20, 00-653 Warsaw (Poland); Andrzejewska-Morzuch, Dorota; Łebkowska, Maria [Warsaw University of Technology, Faculty of Environmental Engineering, Biology Division, Nowowiejska 20, 00-653 Warsaw (Poland); Tabernacka, Agnieszka, E-mail: agnieszka.tabernacka@is.pw.edu.pl [Warsaw University of Technology, Faculty of Environmental Engineering, Biology Division, Nowowiejska 20, 00-653 Warsaw (Poland); Wojtkowska, Małgorzata; Telepko, Alicja; Konarzewska, Agnieszka [Warsaw University of Technology, Faculty of Environmental Engineering, Nowowiejska 20, 00-653 Warsaw (Poland)

    2014-01-15

    Highlights: • Bioleaching of metals from printed circuit boards by BSAC-producing bacteria was estimated. • Aeration increased the release of all metals in medium with sulphur and biosurfactant. • Increase in Cu, Pb, Ni and Cr removal rate was observed at 37 °C in acidic medium. -- Abstract: This study has evaluated the possibility of bioleaching zinc, copper, lead, nickel, cadmium and chromium from printed circuit boards by applying a culture of sulphur-oxidising bacteria and a mixed culture of biosurfactant-producing bacteria and sulphur-oxidising bacteria. It was revealed that zinc was removed effectively both in a traditional solution acidified by a way of microbial oxidation of sulphur and when using a microbial culture containing sulphur-oxidising and biosurfactant-producing bacteria. The average process efficiency was 48% for Zn dissolution. Cadmium removal was similar in both media, with a highest metal release of 93%. For nickel and copper, a better effect was obtained in the acidic medium, with a process effectiveness of 48.5% and 53%, respectively. Chromium was the only metal that was removed more effectively in the bioleaching medium containing both sulphur-oxidising and biosurfactant-producing bacteria. Lead was removed from the printed circuit boards with very low effectiveness (below 0.5%). Aerating the culture medium with compressed air increased the release of all metals in the medium with sulphur and biosurfactant, and of Ni, Cu, Zn and Cr in the acidic medium. Increasing the temperature of the medium (to 37 °C) had a more significant impact in the acidic environment than in the neutral environment.

  7. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  8. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  9. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  10. DEVELOPMENT OF RESISTANCE IN BACTERIA AGAINST ANTI - MICROBIAL AGENTS: REASONS, THREATS AND ONGOING ENCOUNTER

    OpenAIRE

    Shibabrata Pattanayak

    2011-01-01

    Development of Multi Druug Resistant bacteria is creating a very severe problem in anti-microbial chemotherapy. Many recently developed antibiotics are found incapable to control resistant organisms.The reasons of development of resistance gene in the bacterial plasmid and their quick spread among various related and unrelated bacteria are analysed in this article along with discussion of world wide ongoing research to combat the problem.

  11. Intestinal Microbial Community Differs between Acute Pancreatitis Patients and Healthy Volunteers.

    Science.gov (United States)

    Zhang, Xi Mei; Zhang, Zheng Yu; Zhang, Chen Huan; Wu, Jing; Wang, You Xin; Zhang, Guo Xin

    2018-01-01

    A case control study including 45 acute pancreatitis and 44 healthy volunteers was performed to investigate the association between intestinal microbial community and acute pancreatitis. High-throughput 16S rRNA gene amplicon sequencing was used to profile the microbiological composition of the samples. In total, 27 microbial phyla were detected and the samples of pancreatitis patients contained fewer phyla. Samples from acute pancreatitis patients contained more Bacteroidetes and Proteobacteria and fewer Firmicutes and Actinobacteria than those from healthy volunteers. PCoA analyses distinguished the fecal microbial communities of acute pancreatitis patients from those of healthy volunteers. The intestinal microbes of acute pancreatitis patients are different from those of healthy volunteers. Modulation of the intestinal microbiome may serve as an alternative strategy for treating acute pancreatitis. Copyright © 2018 The Editorial Board of Biomedical and Environmental Sciences. Published by China CDC. All rights reserved.

  12. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  13. Integrated Field, Laboratory, and Modeling Studies to Determine the Effects of Linked Microbial and Physical Spatial Heterogeneity on Engineered Vadose Zone Bioremediation

    Energy Technology Data Exchange (ETDEWEB)

    Fred Brokman; John Selker; Mark Rockhold

    2004-01-26

    While numerous techniques exist for remediation of contaminant plumes in groundwater or near the soil surface, remediation methods in the deep vadose zone are less established due to complex transport dynamics and sparse microbial populations. There is a lack of knowledge on how physical and hydrologic features of the vadose zone control microbial growth and colonization in response to nutrient delivery during bioremediation. Yet pollution in the vadose zone poses a serious threat to the groundwater resources lying deeper in the sediment. While the contaminants may be slowly degraded by native microbial communities, microbial degradation rates rarely keep pace with the spread of the pollutant. It is crucial to increase indigenous microbial degradation in the vadose zone to combat groundwater contamination.

  14. Integrated Field, Laboratory, and Modeling Studies to Determine the Effects of Linked Microbial and Physical Spatial Heterogeneity on Engineered Vadose Zone Bioremediation

    Energy Technology Data Exchange (ETDEWEB)

    Brockman, Fred J.; Selker, John S.; Rockhold, Mark L.

    2004-10-31

    Executive Summary - While numerous techniques exist for remediation of contaminant plumes in groundwater or near the soil surface, remediation methods in the deep vadose zone are less established due to complex transport dynamics and sparse microbial populations. There is a lack of knowledge on how physical and hydrologic features of the vadose zone control microbial growth and colonization in response to nutrient delivery during bioremediation. Yet pollution in the vadose zone poses a serious threat to the groundwater resources lying deeper in the sediment. While the contaminants may be slowly degraded by native microbial communities, microbial degradation rates rarely keep pace with the spread of the pollutant. It is crucial to increase indigenous microbial degradation in the vadose zone to combat groundwater contamination...

  15. DEVELOPMENT OF RESISTANCE IN BACTERIA AGAINST ANTI - MICROBIAL AGENTS: REASONS, THREATS AND ONGOING ENCOUNTER

    Directory of Open Access Journals (Sweden)

    Shibabrata Pattanayak

    2011-07-01

    Full Text Available Development of Multi Druug Resistant bacteria is creating a very severe problem in anti-microbial chemotherapy. Many recently developed antibiotics are found incapable to control resistant organisms.The reasons of development of resistance gene in the bacterial plasmid and their quick spread among various related and unrelated bacteria are analysed in this article along with discussion of world wide ongoing research to combat the problem.

  16. The Impact of Microbially Influenced Corrosion on Spent Nuclear Fuel and Storage Life

    International Nuclear Information System (INIS)

    Wolfram, J. H.; Mizia, R. E.; Jex, R.; Nelson, L.; Garcia, K. M.

    1996-01-01

    A study was performed to evaluate if microbial activity could be considered a threat to spent nuclear fuel integrity. The existing data regarding the impact of microbial influenced corrosion (MIC) on spent nuclear fuel storage does not allow a clear assessment to be made. In order to identify what further data are needed, a literature survey on MIC was accomplished with emphasis on materials used in nuclear fuel fabrication, e.g., A1, 304 SS, and zirconium. In addition, a survey was done at Savannah River, Oak Ridge, Hanford, and the INEL on the condition of their wet storage facilities. The topics discussed were the SNF path forward, the types of fuel, ramifications of damaged fuel, involvement of microbial processes, dry storage scenarios, ability to identify microbial activity, definitions of water quality, and the use of biocides. Information was also obtained at international meetings in the area of biological mediated problems in spent fuel and high level wastes. Topics dis cussed included receiving foreign reactor research fuels into existing pools, synergism between different microbes and other forms of corrosion, and cross contamination

  17. The Impact of Microbially Influenced Corrosion on Spent Nuclear Fuel and Storage Life

    Energy Technology Data Exchange (ETDEWEB)

    J. H. Wolfram; R. E. Mizia; R. Jex; L. Nelson; K. M. Garcia

    1996-10-01

    A study was performed to evaluate if microbial activity could be considered a threat to spent nuclear fuel integrity. The existing data regarding the impact of microbial influenced corrosion (MIC) on spent nuclear fuel storage does not allow a clear assessment to be made. In order to identify what further data are needed, a literature survey on MIC was accomplished with emphasis on materials used in nuclear fuel fabrication, e.g., A1, 304 SS, and zirconium. In addition, a survey was done at Savannah River, Oak Ridge, Hanford, and the INEL on the condition of their wet storage facilities. The topics discussed were the SNF path forward, the types of fuel, ramifications of damaged fuel, involvement of microbial processes, dry storage scenarios, ability to identify microbial activity, definitions of water quality, and the use of biocides. Information was also obtained at international meetings in the area of biological mediated problems in spent fuel and high level wastes. Topics dis cussed included receiving foreign reactor research fuels into existing pools, synergism between different microbes and other forms of corrosion, and cross contamination.

  18. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  19. Microbial Biofilm as a Smart Material

    Directory of Open Access Journals (Sweden)

    Christian Garde

    2015-02-01

    Full Text Available Microbial biofilm colonies will in many cases form a smart material capable of responding to external threats dependent on their size and internal state. The microbial community accordingly switches between passive, protective, or attack modes of action. In order to decide which strategy to employ, it is essential for the biofilm community to be able to sense its own size. The sensor designed to perform this task is termed a quorum sensor, since it only permits collective behaviour once a sufficiently large assembly of microbes have been established. The generic quorum sensor construct involves two genes, one coding for the production of a diffusible signal molecule and one coding for a regulator protein dedicated to sensing the signal molecules. A positive feedback in the signal molecule production sets a well-defined condition for switching into the collective mode. The activation of the regulator involves a slow dimerization, which allows low-pass filtering of the activation of the collective mode. Here, we review and combine the model components that form the basic quorum sensor in a number of Gram-negative bacteria, e.g., Pseudomonas aeruginosa.

  20. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  1. Board Task Performance

    DEFF Research Database (Denmark)

    Minichilli, Alessandro; Zattoni, Alessandro; Nielsen, Sabina

    2012-01-01

    identify three board processes as micro-level determinants of board effectiveness. Specifically, we focus on effort norms, cognitive conflicts and the use of knowledge and skills as determinants of board control and advisory task performance. Further, we consider how two different institutional settings....... The findings show that: (i) Board processes have a larger potential than demographic variables to explain board task performance; (ii) board task performance differs significantly between boards operating in different contexts; and (iii) national context moderates the relationships between board processes...... and board task performance....

  2. A review of the impacts of degradation threats on soil properties in the UK.

    Science.gov (United States)

    Gregory, A S; Ritz, K; McGrath, S P; Quinton, J N; Goulding, K W T; Jones, R J A; Harris, J A; Bol, R; Wallace, P; Pilgrim, E S; Whitmore, A P

    2015-10-01

    National governments are becoming increasingly aware of the importance of their soil resources and are shaping strategies accordingly. Implicit in any such strategy is that degradation threats and their potential effect on important soil properties and functions are defined and understood. In this paper, we aimed to review the principal degradation threats on important soil properties in the UK, seeking quantitative data where possible. Soil erosion results in the removal of important topsoil and, with it, nutrients, C and porosity. A decline in soil organic matter principally affects soil biological and microbiological properties, but also impacts on soil physical properties because of the link with soil structure. Soil contamination affects soil chemical properties, affecting nutrient availability and degrading microbial properties, whilst soil compaction degrades the soil pore network. Soil sealing removes the link between the soil and most of the 'spheres', significantly affecting hydrological and microbial functions, and soils on re-developed brownfield sites are typically degraded in most soil properties. Having synthesized the literature on the impact on soil properties, we discuss potential subsequent impacts on the important soil functions, including food and fibre production, storage of water and C, support for biodiversity, and protection of cultural and archaeological heritage. Looking forward, we suggest a twin approach of field-based monitoring supported by controlled laboratory experimentation to improve our mechanistic understanding of soils. This would enable us to better predict future impacts of degradation processes, including climate change, on soil properties and functions so that we may manage soil resources sustainably.

  3. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  4. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  5. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  6. Board effectiveness: Investigating payment asymmetry between board members and shareholders

    Directory of Open Access Journals (Sweden)

    Wuchun Chi

    2008-01-01

    Full Text Available Board members may well be responsible for dissension between themselves and shareholders since they are simultaneously the setters and receivers of both board remuneration and dividends. They may act out of their own personal interests at the expense of external shareholders. We investigate the impact of ownership structure, board structure and control deviation on payment asymmetry, where excessively high remuneration is paid to board members but considerably lower dividends are distributed to shareholders. We find strong evidence confirming that the smaller the shareholdings of board members and outside blockholders are, the more asymmetric the payments are. With controlling family members on the board and a higher percentage of seats held by independent board members, there is a slight reduction in the likelihood and severity of payment asymmetry. In addition, it is abundantly clear that the larger the board seat-control deviation is, the greater is the likelihood and severity of payment asymmetry. While prior research has primarily focused on board-manager agency issues, the board-shareholder perspective could be even more important in that it is the board that is the most directly delegated agent of shareholders, not the managers

  7. Board of Directors or Supervisory Board

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2009-01-01

    The article analyses the legal consequences of the choice now available to Danish public limited companies, which can now opt for a two-tier management structure, in which the management board undertakes both the day-to-day and the overall management, while a supervisory board exercises control...... over the management board, including its appointment and dismissal. The article considers which companies a two-tier structure may be relevant for, and reviews the consequences for the composition, election and functioning of the company organs....

  8. Assessing the Consequences of Microbial Infection in Field Trials: Seen, Unseen, Beneficial, Parasitic and Pathogenic

    Directory of Open Access Journals (Sweden)

    Mark E. Looseley

    2014-06-01

    Full Text Available Microbial infections of crop plants present an ongoing threat to agricultural production. However, in recent years, we have developed a more nuanced understanding of the ecological role of microbes and how they interact with plants. This includes an appreciation of the influence of crop physiology and environmental conditions on the expression of disease symptoms, the importance of non-pathogenic microbes on host plants and pathogens, and the capacity for plants to act as hosts for human pathogens. Alongside this we now have a variety of tools available for the identification and quantification of microbial infections on crops grown under field conditions. This review summarises some of the consequences of microbial infections in crop plants, and discusses how new and established assessment tools can be used to understand these processes. It challenges our current assumptions in yield loss relationships and offers understanding of the potential for more resilient crops.

  9. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  10. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  11. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  12. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  13. Patients overwhelmingly prefer inpatient boarding to emergency department boarding.

    Science.gov (United States)

    Viccellio, Peter; Zito, Joseph A; Sayage, Valerie; Chohan, Jasmine; Garra, Gregory; Santora, Carolyn; Singer, Adam J

    2013-12-01

    Boarding of admitted patients in the emergency department (ED) is a major cause of crowding. One alternative to boarding in the ED, a full-capacity protocol where boarded patients are redeployed to inpatient units, can reduce crowding and improve overall flow. Our aim was to compare patient satisfaction with boarding in the ED vs. inpatient hallways. We performed a structured telephone survey regarding patient experiences and preferences for boarding among admitted ED patients who experienced boarding in the ED hallway and then were subsequently transferred to inpatient hallways. Demographic and clinical characteristics, as well as patient preferences, including items related to patient comfort and safety using a 5-point scale, were recorded and descriptive statistics were used to summarize the data. Of 110 patients contacted, 105 consented to participate. Mean age was 57 ± 16 years and 52% were female. All patients were initially boarded in the ED in a hallway before their transfer to an inpatient hallway bed. The overall preferred location after admission was the inpatient hallway in 85% (95% confidence interval 75-90) of respondents. In comparing ED vs. inpatient hallway boarding, the following percentages of respondents preferred inpatient boarding with regard to the following 8 items: rest, 85%; safety, 83%; confidentiality, 82%; treatment, 78%; comfort, 79%; quiet, 84%; staff availability, 84%; and privacy, 84%. For no item was there a preference for boarding in the ED. Patients overwhelmingly preferred the inpatient hallway rather than the ED hallway when admitted to the hospital. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  15. Designing the Microbial Research Commons

    Energy Technology Data Exchange (ETDEWEB)

    Uhlir, Paul F. [Board on Research Data and Information Policy and Global Affairs, Washington, DC (United States)

    2011-10-01

    Recent decades have witnessed an ever-increasing range and volume of digital data. All elements of the pillars of science--whether observation, experiment, or theory and modeling--are being transformed by the continuous cycle of generation, dissemination, and use of factual information. This is even more so in terms of the re-using and re-purposing of digital scientific data beyond the original intent of the data collectors, often with dramatic results. We all know about the potential benefits and impacts of digital data, but we are also aware of the barriers, the challenges in maximizing the access, and use of such data. There is thus a need to think about how a data infrastructure can enhance capabilities for finding, using, and integrating information to accelerate discovery and innovation. How can we best implement an accessible, interoperable digital environment so that the data can be repeatedly used by a wide variety of users in different settings and with different applications? With this objective: to use the microbial communities and microbial data, literature, and the research materials themselves as a test case, the Board on Research Data and Information held an International Symposium on Designing the Microbial Research Commons at the National Academy of Sciences in Washington, DC on 8-9 October 2009. The symposium addressed topics such as models to lower the transaction costs and support access to and use of microbiological materials and digital resources from the perspective of publicly funded research, public-private interactions, and developing country concerns. The overall goal of the symposium was to stimulate more research and implementation of improved legal and institutional models for publicly funded research in microbiology.

  16. Board members’ contribution to strategy: The mediating role of board internal processes

    Directory of Open Access Journals (Sweden)

    Carmen Barroso-Castro

    2017-05-01

    Full Text Available This study aims to explore what directors do on the board, to what extent the processes occurring in the board allow the sharing and integrating of the existing knowledge, thus facilitating the board members’ contributions to strategy. We adopt the view that the internal board processes increase the impact of the cognitive resources on board performance. Using survey data from 200 large Spanish companies we demonstrate that directors’ level of knowledge of the firm and board job-related diversity positively influence the degree of the board's strategic involvement. Additionally, the internal processes that take place within the board – particularly Cognitive Conflict, the Critical and Independent Approach and the Comprehensive Discussion Process – influence the board's strategic involvement and play a partial mediating role on the aforementioned relationships. However, our results show no evidence for a positive relationship between Board Meeting Dynamics and the board's strategic involvement.

  17. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  18. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  19. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  20. 78 FR 66384 - Membership of the Merit Systems Protection Board's Performance Review Board

    Science.gov (United States)

    2013-11-05

    ... MERIT SYSTEMS PROTECTION BOARD Membership of the Merit Systems Protection Board's Performance Review Board AGENCY: Merit Systems Protection Board. ACTION: Notice. SUMMARY: Notice is hereby given of the members of the Merit Systems Protection Board's Performance Review Board. DATES: November 5, 2013...

  1. Microbial water quality communication: public and practitioner insights from British Columbia, Canada.

    Science.gov (United States)

    Dunn, G; Henrich, N; Holmes, B; Harris, L; Prystajecky, N

    2014-09-01

    This work examines the communication interactions of water suppliers and health authorities with the general public regarding microbial source water quality for recreational and drinking water. We compare current approaches to risk communication observable in British Columbia (BC), Canada, with best practices derived from the communications literature, finding significant gaps between theory and practice. By considering public views and government practices together, we identify key disconnects, leading to the conclusion that at present, neither the public's needs nor public health officials' goals are being met. We find: (1) there is a general lack of awareness and poor understanding by the public of microbial threats to water and the associated health implications; (2) the public often does not know where to find water quality information; (3) public information needs are not identified or met; (4) information sharing by authorities is predominantly one-way and reactive (crisis-oriented); and (5) the effectiveness of communications is not evaluated. There is a need for both improved public understanding of water quality-related risks, and new approaches to ensure information related to water quality reaches audiences. Overall, greater attention should be given to planning and goal setting related to microbial water risk communication.

  2. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  3. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  4. Hospital board effectiveness: relationships between board training and hospital financial viability.

    Science.gov (United States)

    Molinari, C; Morlock, L; Alexander, J; Lyles, C A

    1992-01-01

    This study examined whether hospital governing boards that invest in board education and training are more informed and effective decision-making bodies. Measures of hospital financial viability (i.e., selected financial ratios and outcomes) are used as indicators of hospital board effectiveness. Board participation in educational programs was significantly associated with improved profitability, liquidity, and occupancy levels, suggesting that investment in the education of directors is likely to enhance hospital viability and thus increase board effectiveness.

  5. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  6. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  7. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  8. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. The dBoard: a Digital Scrum Board for Distributed Software Development

    DEFF Research Database (Denmark)

    Esbensen, Morten; Tell, Paolo; Cholewa, Jacob Benjamin

    2015-01-01

    In this paper we present the dBoard - a digital Scrum Board for distributed Agile software development teams. The dBoard is designed as a 'virtual window' between two Scrum team spaces. It connects two locations with live video and audio, which is overlaid with a synchronized and interactive...... digital Scrum board, and it adapts the fidelity of the video/audio to the presence of people in front of it. The dBoard is designed to work (i) as a passive information radiator from which it is easy to get an overview of the status of work, (ii) as a media space providing awareness about the presence...... of remote co-workers, and (iii) as an active meeting support tool. The paper presents a case study of distributed Scrum in a large software company that motivates the design of the dBoard, and details the design and technical implementation of the dBoard. The paper also reports on an initial user study...

  11. One cell, one love: a journal for microbial research

    Directory of Open Access Journals (Sweden)

    Didac Carmona-Gutierrez

    2014-01-01

    Full Text Available With their broad utility for biotechnology, their continuous menace as infectious pathogens, and as an integral part of our bodies (intestinal flora, unicellular organisms remain in the focus of global research. This interest has been further stimulated by the challenge to counteract the emergence of multi-resistant microbes, as well as by the recent advances in establishing unicellular organisms as valid models for human diseases. It is our great pleasure to launch the inaugural issue of Microbial Cell (MIC, an international, open-access, peer-reviewed journal dedicated to microbial research. MIC is committed to the publication of articles that deal with the characterization of unicellular organisms (or multicellular microorganisms in their response to internal and external stimuli and/or in the context of human health and disease. Thus, MIC covers heterogeneous topics in diverse areas ranging from microbial and general cell biology to molecular signaling, disease modeling and pathogen targeting. MIC’s Editorial Board counts with world-class leaders in a wide variety of fields, including microbiology, aging, evolution, biotechnology, ecology, biochemistry, infection biology, and human pathophysiology. We are convinced that MIC will appeal to readers from a broad scientific and medical background, including basic researchers, microbiologists, clinicians, educators and – we hope – policy makers as well as to any interested individual.

  12. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Active microbial community structure of deep subsurface sediments within Baltic Sea Basin

    Science.gov (United States)

    Reese, B. K.; Zinke, L.; Carvalho, G.; Lloyd, K. G.; Marshall, I.; Shumaker, A.; Amend, J.

    2014-12-01

    The Baltic Sea Basin (BSB) is a unique depositional setting that has experienced periods of glaciation and deglaciation as a result of climatic fluctuations over past tens of thousands of years. This has resulted in laminated sediments formed during periods with strong permanent salinity stratification. The high sedimentation rates make this an ideal setting to understand the microbial structure of a deep biosphere community in a relatively high carbon, and thus high-energy environment, compared to other deep subsurface sites. Samples were collected through scientific drilling during the International Ocean Discovery Program (IODP) Expedition 347 on board the Greatship Manisha, September-November 2013. We examined the active microbial community structure using the 16S rRNA gene transcript and active functional genes through metatranscriptome sequencing. Major biogeochemical shifts have been observed in response to the depositional history between the limnic, brackish, and marine phases. The active microbial community structure in the BSB is diverse and reflective of the unique changes in the geochemical profile. These data further refine our understanding of the existence life in the deep subsurface and the survival mechanisms required for this extreme environment.

  14. Habitat Fragmentation can Modulate Drought Effects on the Plant-soil-microbial System in Mediterranean Holm Oak (Quercus ilex) Forests.

    Science.gov (United States)

    Flores-Rentería, Dulce; Curiel Yuste, Jorge; Rincón, Ana; Brearley, Francis Q; García-Gil, Juan Carlos; Valladares, Fernando

    2015-05-01

    Ecological transformations derived from habitat fragmentation have led to increased threats to above-ground biodiversity. However, the impacts of forest fragmentation on soils and their microbial communities are not well understood. We examined the effects of contrasting fragment sizes on the structure and functioning of soil microbial communities from holm oak forest patches in two bioclimatically different regions of Spain. We used a microcosm approach to simulate the annual summer drought cycle and first autumn rainfall (rewetting), evaluating the functional response of a plant-soil-microbial system. Forest fragment size had a significant effect on physicochemical characteristics and microbial functioning of soils, although the diversity and structure of microbial communities were not affected. The response of our plant-soil-microbial systems to drought was strongly modulated by the bioclimatic conditions and the fragment size from where the soils were obtained. Decreasing fragment size modulated the effects of drought by improving local environmental conditions with higher water and nutrient availability. However, this modulation was stronger for plant-soil-microbial systems built with soils from the northern region (colder and wetter) than for those built with soils from the southern region (warmer and drier) suggesting that the responsiveness of the soil-plant-microbial system to habitat fragmentation was strongly dependent on both the physicochemical characteristics of soils and the historical adaptation of soil microbial communities to specific bioclimatic conditions. This interaction challenges our understanding of future global change scenarios in Mediterranean ecosystems involving drier conditions and increased frequency of forest fragmentation.

  15. Submission to the Ontario Energy Board regarding the review of further efficiencies in the electricity distribution sector

    International Nuclear Information System (INIS)

    Silano, B.E.; Boodhoo, D.; Shelton, A.

    2004-02-01

    This report presents the views of the Ontario Division of the Canadian Union of Public Employees (CUPE) on the Ontario Energy Board's consideration to promote further efficiencies in the power distribution sector. CUPE claims that efficiencies aimed at lowering costs through amalgamations often lead to increased costs, degradation in services and decreased reliability of power distribution. CUPE also argues that the main concerns of Ontario ratepayers is reliability and the threat of increased prices. CUPE recommends that the Ontario Energy Board hold open consultations with ratepayers, who are in fact shareholders in their local utilities. This report reviewed the current regulatory regime known as Performance Based Regulation and its effect on local distribution utilities. It also reviewed the impacts of mergers, amalgamations, acquisitions and divestitures (MAAD), with particular reference to rates, privatization of utility services, service degradation and job losses

  16. Board game

    International Nuclear Information System (INIS)

    Brennan, N.S.

    1982-01-01

    A board game comprises a board, a number of counters and two dice. The board is marked to provide a central area, representing the nucleus of an atom, and six or more annular rings extending concentrically around the central area, the rings being divided into 2,8,18,32,48 and 72 squares. Each ring represents an electron shell, and some of the squares are numbered, the number representing the atomic number of different elements. (author)

  17. Development of an Adjustable board and a Rotational Board for Scaffold

    Science.gov (United States)

    Jang, Myunghoun

    2017-06-01

    Scaffold is widely used in high work-places inside and outside of a building construction site. It is inexpensive and is installed and dismantled easily. Although standards and ledgers of a steel tube and coupler scaffold are installed in a regular distance, the distances of transoms are not equal in some places. Sometimes a working platform or a board is absent in the corner of scaffold. This may cause safety accidents because a foothold is not stable on the transoms. An adjustable safety board and a rotational safety board are suggested in this paper. The adjustable board consists of two footholds. The small one is inserted into the large one. The rotational board covers not only right angle but also acute or obtuse angles. These safety boards for scaffold help to decrease safety accidents in construction sites.

  18. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  19. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  20. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  1. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  2. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  3. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  4. Visualizing the Microdistribution of Zinc Borate in Oriented Strand Board Using X-Ray Microcomputed Tomography and SEM-EDX

    OpenAIRE

    Philip D. Evans; Vinicius Lube; Holger Averdunk; Ajay Limaye; Michael Turner; Andrew Kingston; Timothy J. Senden

    2015-01-01

    Oriented strand board (OSB) is an important wood composite used in situations where fungal decay and termite attack can occur. To counter these threats, powdered zinc borate biocide is commonly added to OSB. The effectiveness of biocides depends on their even distribution within composites and resistance to leaching, but little is known about the distribution of zinc borate in OSB. Zinc is denser than wood and it should be possible to map its distribution in OSB using X-ray micro-CT. We test ...

  5. Forum of Microbial Threats

    Science.gov (United States)

    2011-06-01

    March and early April 2009, a new influenza A (H1N1) virus (S-OIV) emerged in Mexico and the United States. During the first few weeks of surveillance...this new influenza virus spread out of Mexico to other parts of North America and then on to Europe, the Far East, and now Australia and the Pacific...geographic origins of several historical plague (Y. pestis) epidemics and the recent cholera epidemic in Haiti. June 28th – Afternoon Session

  6. 7 CFR 1160.105 - Board.

    Science.gov (United States)

    2010-01-01

    ... and Orders; Milk), DEPARTMENT OF AGRICULTURE FLUID MILK PROMOTION PROGRAM Fluid Milk Promotion Order Definitions § 1160.105 Board. Board means the National Processor Advertising and Promotion Board established... Promotion Board or Board). ...

  7. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  8. A New Strategy for Heavy Metal Polluted Environments: A Review of Microbial Biosorbents

    Science.gov (United States)

    Ayangbenro, Ayansina Segun; Babalola, Olubukola Oluranti

    2017-01-01

    Persistent heavy metal pollution poses a major threat to all life forms in the environment due to its toxic effects. These metals are very reactive at low concentrations and can accumulate in the food web, causing severe public health concerns. Remediation using conventional physical and chemical methods is uneconomical and generates large volumes of chemical waste. Bioremediation of hazardous metals has received considerable and growing interest over the years. The use of microbial biosorbents is eco-friendly and cost effective; hence, it is an efficient alternative for the remediation of heavy metal contaminated environments. Microbes have various mechanisms of metal sequestration that hold greater metal biosorption capacities. The goal of microbial biosorption is to remove and/or recover metals and metalloids from solutions, using living or dead biomass and their components. This review discusses the sources of toxic heavy metals and describes the groups of microorganisms with biosorbent potential for heavy metal removal. PMID:28106848

  9. A New Strategy for Heavy Metal Polluted Environments: A Review of Microbial Biosorbents

    Directory of Open Access Journals (Sweden)

    Ayansina Segun Ayangbenro

    2017-01-01

    Full Text Available Persistent heavy metal pollution poses a major threat to all life forms in the environment due to its toxic effects. These metals are very reactive at low concentrations and can accumulate in the food web, causing severe public health concerns. Remediation using conventional physical and chemical methods is uneconomical and generates large volumes of chemical waste. Bioremediation of hazardous metals has received considerable and growing interest over the years. The use of microbial biosorbents is eco-friendly and cost effective; hence, it is an efficient alternative for the remediation of heavy metal contaminated environments. Microbes have various mechanisms of metal sequestration that hold greater metal biosorption capacities. The goal of microbial biosorption is to remove and/or recover metals and metalloids from solutions, using living or dead biomass and their components. This review discusses the sources of toxic heavy metals and describes the groups of microorganisms with biosorbent potential for heavy metal removal.

  10. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  11. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  12. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  13. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  14. The impact of the board's strategy-setting role on board-management relations and hospital performance.

    Science.gov (United States)

    Büchner, Vera Antonia; Schreyögg, Jonas; Schultz, Carsten

    2014-01-01

    The appropriate governance of hospitals largely depends on effective cooperation between governing boards and hospital management. Governing boards play an important role in strategy-setting as part of their support for hospital management. However, in certain situations, this active strategic role may also generate discord within this relationship. The objective of this study is to investigate the impact of the roles, attributes, and processes of governing boards on hospital performance. We examine the impact of the governing board's strategy-setting role on board-management collaboration quality and on financial performance while also analyzing the interaction effects of board diversity and board activity level. The data are derived from a survey that was sent simultaneously to German hospitals and their associated governing board, combined with objective performance information from annual financial statements and quality reports. We use a structural equation modeling approach to test the model. The results indicate that different board characteristics have a significant impact on hospital performance (R = .37). The strategy-setting role and board-management collaboration quality have a positive effect on hospital performance, whereas the impact of strategy-setting on collaboration quality is negative. We find that the positive effect of strategy-setting on performance increases with decreasing board diversity. When board members have more homogeneous backgrounds and exhibit higher board activity levels, the negative effect of the strategy-setting on collaboration quality also increases. Active strategy-setting by a governing board may generally improve hospital performance. Diverse members of governing boards should be involved in strategy-setting for hospitals. However, high board-management collaboration quality may be compromised if managerial autonomy is too highly restricted. Consequently, hospitals should support board-management collaboration about

  15. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  16. Synthetic microbial ecology and the dynamic interplay between microbial genotypes.

    Science.gov (United States)

    Dolinšek, Jan; Goldschmidt, Felix; Johnson, David R

    2016-11-01

    Assemblages of microbial genotypes growing together can display surprisingly complex and unexpected dynamics and result in community-level functions and behaviors that are not readily expected from analyzing each genotype in isolation. This complexity has, at least in part, inspired a discipline of synthetic microbial ecology. Synthetic microbial ecology focuses on designing, building and analyzing the dynamic behavior of ‘ecological circuits’ (i.e. a set of interacting microbial genotypes) and understanding how community-level properties emerge as a consequence of those interactions. In this review, we discuss typical objectives of synthetic microbial ecology and the main advantages and rationales of using synthetic microbial assemblages. We then summarize recent findings of current synthetic microbial ecology investigations. In particular, we focus on the causes and consequences of the interplay between different microbial genotypes and illustrate how simple interactions can create complex dynamics and promote unexpected community-level properties. We finally propose that distinguishing between active and passive interactions and accounting for the pervasiveness of competition can improve existing frameworks for designing and predicting the dynamics of microbial assemblages.

  17. Motives and Power of School Board Members: Implications for School Board-Superintendent Relationships

    Science.gov (United States)

    Mountford, Meredith

    2004-01-01

    The qualitative study presented in this article explores motivations for school board membership and conceptions of power held by school board members. The findings of the study suggest a relationship exists between the way board members define power and the type of motivation board members have for service. The implications of these findings for…

  18. 77 FR 2541 - Board Meeting

    Science.gov (United States)

    2012-01-18

    ... FARM CREDIT SYSTEM INSURANCE CORPORATION Board Meeting AGENCY: Farm Credit System Insurance Corporation Board; Regular Meeting. SUMMARY: Notice is hereby given of the regular meeting of the Farm Credit System Insurance Corporation Board (Board). DATE AND TIME: The meeting of the Board will be held at the...

  19. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  20. Legal immigrants: invasion of alien microbial communities during winter occurring desert dust storms.

    Science.gov (United States)

    Weil, Tobias; De Filippo, Carlotta; Albanese, Davide; Donati, Claudio; Pindo, Massimo; Pavarini, Lorenzo; Carotenuto, Federico; Pasqui, Massimiliano; Poto, Luisa; Gabrieli, Jacopo; Barbante, Carlo; Sattler, Birgit; Cavalieri, Duccio; Miglietta, Franco

    2017-03-10

    A critical aspect regarding the global dispersion of pathogenic microorganisms is associated with atmospheric movement of soil particles. Especially, desert dust storms can transport alien microorganisms over continental scales and can deposit them in sensitive sink habitats. In winter 2014, the largest ever recorded Saharan dust event in Italy was efficiently deposited on the Dolomite Alps and was sealed between dust-free snow. This provided us the unique opportunity to overcome difficulties in separating dust associated from "domestic" microbes and thus, to determine with high precision microorganisms transported exclusively by desert dust. Our metagenomic analysis revealed that sandstorms can move not only fractions but rather large parts of entire microbial communities far away from their area of origin and that this microbiota contains several of the most stress-resistant organisms on Earth, including highly destructive fungal and bacterial pathogens. In particular, we provide first evidence that winter-occurring dust depositions can favor a rapid microbial contamination of sensitive sink habitats after snowmelt. Airborne microbial depositions accompanying extreme meteorological events represent a realistic threat for ecosystem and public health. Therefore, monitoring the spread and persistence of storm-travelling alien microbes is a priority while considering future trajectories of climatic anomalies as well as anthropogenically driven changes in land use in the source regions.

  1. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  2. Processor breadboard for on-board RFI detection and mitigation in MetOp-SG radiometers

    DEFF Research Database (Denmark)

    Skou, Niels; Kristensen, Steen S.; Kovanen, Arhippa

    2015-01-01

    Radio Frequency Interference (RFI) is an increasing threat to proper operation of space-borne Earth viewing microwave radiometer systems. There is a steady growth in active services, and tougher requirements to sensitivity and fidelity of future radiometer systems. Thus it has been decided...... that the next generation MetOp satellites must include some kind of RFI detection and mitigation system at Ku band. This paper describes a breadboard processor that detects and mitigates RFI on-board the satellite. Thus cleaned data can be generated in real time, and following suitable integration, downloaded...... to ground at the modest data rate usually associated with radiometer systems....

  3. Does Board Diversity Really Matter?

    DEFF Research Database (Denmark)

    Rose, Caspar; Munch-Madsen, Peter; Funch, Maja

    2013-01-01

    We study the impact of female board representation as well as citizenship on corporate performance based on a sample of the largest listed firms in the Nordic countries as well as Germany. We also seek to determine the variation of board structures using factor analysis. We find no support for any...... performance impact relating to female board representation. However, we find an impact of board citizenship on performance showing that board members with a background from common law have a significant positive influence on corporate performance measured as ROA, ROE and ROCE. Consistent with other studies we...... also document that large boards impact corporate performance negatively. Moreover we also show that data set on boards can be explained by four underlying factors. This article adds insight to board determinants of corporate performance as well as the classification of board variation. Specifically...

  4. Detection of microbial biofilms on food processing surfaces: hyperspectral fluorescence imaging study

    Science.gov (United States)

    Jun, Won; Kim, Moon S.; Chao, Kaunglin; Lefcourt, Alan M.; Roberts, Michael S.; McNaughton, James L.

    2009-05-01

    We used a portable hyperspectral fluorescence imaging system to evaluate biofilm formations on four types of food processing surface materials including stainless steel, polypropylene used for cutting boards, and household counter top materials such as formica and granite. The objective of this investigation was to determine a minimal number of spectral bands suitable to differentiate microbial biofilm formation from the four background materials typically used during food processing. Ultimately, the resultant spectral information will be used in development of handheld portable imaging devices that can be used as visual aid tools for sanitation and safety inspection (microbial contamination) of the food processing surfaces. Pathogenic E. coli O157:H7 and Salmonella cells were grown in low strength M9 minimal medium on various surfaces at 22 +/- 2 °C for 2 days for biofilm formation. Biofilm autofluorescence under UV excitation (320 to 400 nm) obtained by hyperspectral fluorescence imaging system showed broad emissions in the blue-green regions of the spectrum with emission maxima at approximately 480 nm for both E. coli O157:H7 and Salmonella biofilms. Fluorescence images at 480 nm revealed that for background materials with near-uniform fluorescence responses such as stainless steel and formica cutting board, regardless of the background intensity, biofilm formation can be distinguished. This suggested that a broad spectral band in the blue-green regions can be used for handheld imaging devices for sanitation inspection of stainless, cutting board, and formica surfaces. The non-uniform fluorescence responses of granite make distinctions between biofilm and background difficult. To further investigate potential detection of the biofilm formations on granite surfaces with multispectral approaches, principal component analysis (PCA) was performed using the hyperspectral fluorescence image data. The resultant PCA score images revealed distinct contrast between

  5. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  6. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  7. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  8. Hospital boards and hospital strategic focus: the impact of board involvement in strategic decision making.

    Science.gov (United States)

    Ford-Eickhoff, Karen; Plowman, Donde Ashmos; McDaniel, Reuben R

    2011-01-01

    Despite pressures to change the role of hospital boards, hospitals have made few changes in board composition or director selection criteria. Hospital boards have often continued to operate in their traditional roles as either "monitors" or "advisors." More attention to the direct involvement of hospital boards in the strategic decision-making process of the organizations they serve, the timing and circumstances under which board involvement occurs, and the board composition that enhances their abilities to participate fully is needed. We investigated the relationship between broader expertise among hospital board members, board involvement in the stages of strategic decision making, and the hospital's strategic focus. We surveyed top management team members of 72 nonacademic hospitals to explore the participation of critical stakeholder groups such as the board of directors in the strategic decision-making process. We used hierarchical regression analysis to explore our hypotheses that there is a relationship between both the nature and involvement of the board and the hospital's strategic orientation. Hospitals with broader expertise on their boards reported an external focus. For some of their externally-oriented goals, hospitals also reported that their boards were involved earlier in the stages of decision making. In light of the complex and dynamic environment of hospitals today, those charged with developing hospital boards should match the variety in the external issues that the hospital faces with more variety in board makeup. By developing a board with greater breadth of expertise, the hospital responds to its complex environment by absorbing that complexity, enabling a greater potential for sensemaking and learning. Rather than acting only as monitors and advisors, boards impact their hospitals' strategic focus through their participation in the strategic decision-making process.

  9. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  10. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  11. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  12. Particle Board and Oriented Strand Board Prepared with Nanocellulose-Reinforced Adhesive

    Directory of Open Access Journals (Sweden)

    Stefan Veigel

    2012-01-01

    Full Text Available Adhesives on the basis of urea-formaldehyde (UF and melamine-urea-formaldehyde (MUF are extensively used in the production of wood-based panels. In the present study, the attempt was made to improve the mechanical board properties by reinforcing these adhesives with cellulose nanofibers (CNFs. The latter were produced from dissolving grade beech pulp by a mechanical homogenization process. Adhesive mixtures with a CNF content of 0, 1, and 3 wt% based on solid resin were prepared by mixing an aqueous CNF suspension with UF and MUF adhesives. Laboratory-scale particle boards and oriented strand boards (OSBs were produced, and the mechanical and fracture mechanical properties were investigated. Particle boards prepared with UF containing 1 wt% CNF showed a reduced thickness swelling and better internal bond and bending strength than boards produced with pure UF. The reinforcing effect of CNF was even more obvious for OSB where a significant improvement of strength properties of 16% was found. For both, particle board and OSB, mode I fracture energy and fracture toughness were the parameters with the greatest improvement indicating that the adhesive bonds were markedly toughened by the CNF addition.

  13. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  14. 14 CFR 250.5 - Amount of denied boarding compensation for passengers denied boarding involuntarily.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Amount of denied boarding compensation for passengers denied boarding involuntarily. 250.5 Section 250.5 Aeronautics and Space OFFICE OF THE SECRETARY... boarding compensation for passengers denied boarding involuntarily. (a) Subject to the exceptions provided...

  15. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  16. Refinement of boards' role required.

    Science.gov (United States)

    Umbdenstock, R J

    1987-01-01

    The governing board's role in health care is not changing, but new competitive forces necessitate a refinement of the board's approach to fulfilling its role. In a free-standing, community, not-for-profit hospital, the board functions as though it were the "owner." Although it does not truly own the facility in the legal sense, the board does have legal, fiduciary, and financial responsibilities conferred on it by the state. In a religious-sponsored facility, the board fulfills these same obligations on behalf of the sponsoring institute, subject to the institute's reserved powers. In multi-institutional systems, the hospital board's power and authority depend on the role granted it by the system. Boards in all types of facilities are currently faced with the following challenges: Fulfilling their basic responsibilities, such as legal requirements, financial duties, and obligations for the quality of care. Encouraging management and the board itself to "think strategically" in attacking new competitive market forces while protecting the organization's traditional mission and values. Assessing recommended strategies in light of consequences if constituencies think the organization is abandoning its commitments. Boards can take several steps to match their mode of operation with the challenges of the new environment. Boards must rededicate themselves to the hospital's mission. Trustees must expand their understanding of health care trends and issues and their effect on the organization. Boards must evaluate and help strengthen management's performance, rather than acting as a "watchdog" in an adversarial position. Boards must think strategically, rather than focusing solely on operational details. Boards must evaluate the methods they use for conducting business.

  17. Decamp Clock Board Firmware

    Energy Technology Data Exchange (ETDEWEB)

    Vicente, J. de; Castilla, J.; Martinez, G.

    2007-09-27

    Decamp (Dark Energy Survey Camera) is a new instrument designed to explore the universe aiming to reveal the nature of Dark Energy. The camera consists of 72 CCDs and 520 Mpixels. The readout electronics of DECam is based on the Monsoon system. Monsoon is a new image acquisition system developed by the NOAO (National Optical Astronomical Observatory) for the new generation of astronomical cameras. The Monsoon system uses three types of boards inserted in a Eurocard format based crate: master control board, acquisition board and clock board. The direct use of the Monsoon system for DECam readout electronics requires nine crates mainly due to the high number of clock boards needed. Unfortunately, the available space for DECam electronics is constrained to four crates at maximum. The major drawback to achieve such desired compaction degree resides in the clock board signal density. This document describes the changes performed at CIEMAT on the programmable logic of the Monsoon clock board aiming to meet such restricted space constraints. (Author) 5 refs.

  18. Decamp Clock Board Firmware

    International Nuclear Information System (INIS)

    Vicente, J. de; Castilla, J.; Martinez, G.

    2007-01-01

    Decamp (Dark Energy Survey Camera) is a new instrument designed to explore the universe aiming to reveal the nature of Dark Energy. The camera consists of 72 CCDs and 520 Mpixels. The readout electronics of DECam is based on the Monsoon system. Monsoon is a new image acquisition system developed by the NOAO (National Optical Astronomical Observatory) for the new generation of astronomical cameras. The Monsoon system uses three types of boards inserted in a Eurocard format based crate: master control board, acquisition board and clock board. The direct use of the Monsoon system for DECam readout electronics requires nine crates mainly due to the high number of clock boards needed. Unfortunately, the available space for DECam electronics is constrained to four crates at maximum. The major drawback to achieve such desired compaction degree resides in the clock board signal density. This document describes the changes performed at CIEMAT on the programmable logic of the Monsoon clock board aiming to meet such restricted space constraints. (Author) 5 refs

  19. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  20. Structural and metabolic responses of microbial community to sewage-borne chlorpyrifos in constructed wetlands.

    Science.gov (United States)

    Zhang, Dan; Wang, Chuan; Zhang, Liping; Xu, Dong; Liu, Biyun; Zhou, Qiaohong; Wu, Zhenbin

    2016-06-01

    Long-term use of chlorpyrifos poses a potential threat to the environment that cannot be ignored, yet little is known about the succession of substrate microbial communities in constructed wetlands (CWs) under chlorpyrifos stress. Six pilot-scale CW systems receiving artificial wastewater containing 1mg/L chlorpyrifos were established to investigate the effects of chlorpyrifos and wetland vegetation on the microbial metabolism pattern of carbon sources and community structure, using BIOLOG and denaturing gradient gel electrophoresis (DGGE) approaches. Based on our samples, BIOLOG showed that Shannon diversity (H') and richness (S) values distinctly increased after 30days when chlorpyrifos was added. At the same time, differences between the vegetated and the non-vegetated systems disappeared. DGGE profiles indicated that H' and S had no significant differences among four different treatments. The effect of chlorpyrifos on the microbial community was mainly reflected at the physiological level. Principal component analysis (PCA) of both BIOLOG and DGGE showed that added chlorpyrifos made a difference on test results. Meanwhile, there was no difference between the vegetation and no-vegetation treatments after addition of chlorpyrifos at the physiological level. Moreover, the vegetation had no significant effect on the microbial community at the genetic level. Comparisons were made between bacteria in this experiment and other known chlorpyrifos-degrading bacteria. The potential chlorpyrifos-degrading ability of bacteria in situ may be considerable. Copyright © 2016. Published by Elsevier B.V.

  1. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  2. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  3. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  4. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  5. What makes great boards great.

    Science.gov (United States)

    Sonnenfeld, Jeffrey A

    2002-09-01

    In the wake of meltdowns at WorldCom, Tyco, and Enron, enormous attention has been focused on the companies' boards. It seems inconceivable that business disasters of such magnitude could happen without gross or even criminal negligence on the part of board members. And yet a close examination of those boards reveals no broad pattern of incompetence or corruption. In fact, they followed most of the accepted standards for board operations: Members showed up for meetings; they had money invested in the company; audit committees, compensation committees, and codes of ethics were in place; the boards weren't too small or too big, nor were they dominated by insiders. In other words, they passed the tests that would normally be applied to determine whether a board of directors was likely to do a good job. And that's precisely what's so scary, according to corporate governance expert Jeffrey Sonnenfeld, who suggests that it's time for some new thinking about how corporate boards operate and are evaluated. He proposes thinking not only about how to structure the board's work but also about how to manage it as a social system. Good boards are, very simply, high-functioning work groups. They're distinguished by a climate of respect, trust, and candor among board members and between the board and management. Information is shared openly and on time; emergent political factions are quickly eliminated. Members feel free to challenge one another's assumptions and conclusions, and management encourages lively discussion of strategic issues. Directors feel a responsibility to contribute meaningfully to the board's performance. In addition, good boards assess their own performance, both collectively and individually.

  6. International forum on nuclear and biological decommissioning: Management of global security threats

    International Nuclear Information System (INIS)

    Aslanian, G.; Kouzminov, V.; Martellini, M.; Santesso, R.

    1998-01-01

    The Forum on Nuclear and Biological Decommissioning: Management of Global Security Threats was organized by the Landau Network-Centro Volta (LNCV) with the support of the UNESCO Venice Office, the Italian Ministry of Foreign Affairs, the Italian National Board for Alternative Energy Sources (ENEA), the Lombardy Region and the Municipality of Como. Subjects dealt with at the conference included the reconversion of nuclear and biological military equipment produced in the 50 years of the Cold War period and the effects of radio contamination on the environment and on human life. This conference was the most recent of a number of initiatives on reconversion organized in collaboration with the UNESCO Venice Office. The issues dealt with at the conference will be among the subjects for discussion at the UNESCO International School Science for Peace, which will be set up at the 'A. Volta' Center for Scientific Culture

  7. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  8. Threatened corals provide underexplored microbial habitats.

    Directory of Open Access Journals (Sweden)

    Shinichi Sunagawa

    2010-03-01

    Full Text Available Contemporary in-depth sequencing of environmental samples has provided novel insights into microbial community structures, revealing that their diversity had been previously underestimated. Communities in marine environments are commonly composed of a few dominant taxa and a high number of taxonomically diverse, low-abundance organisms. However, studying the roles and genomic information of these "rare" organisms remains challenging, because little is known about their ecological niches and the environmental conditions to which they respond. Given the current threat to coral reef ecosystems, we investigated the potential of corals to provide highly specialized habitats for bacterial taxa including those that are rarely detected or absent in surrounding reef waters. The analysis of more than 350,000 small subunit ribosomal RNA (16S rRNA sequence tags and almost 2,000 nearly full-length 16S rRNA gene sequences revealed that rare seawater biosphere members are highly abundant or even dominant in diverse Caribbean corals. Closely related corals (in the same genus/family harbored similar bacterial communities. At higher taxonomic levels, however, the similarities of these communities did not correlate with the phylogenetic relationships among corals, opening novel questions about the evolutionary stability of coral-microbial associations. Large proportions of OTUs (28.7-49.1% were unique to the coral species of origin. Analysis of the most dominant ribotypes suggests that many uncovered bacterial taxa exist in coral habitats and await future exploration. Our results indicate that coral species, and by extension other animal hosts, act as specialized habitats of otherwise rare microbes in marine ecosystems. Here, deep sequencing provided insights into coral microbiota at an unparalleled resolution and revealed that corals harbor many bacterial taxa previously not known. Given that two of the coral species investigated are listed as threatened under

  9. Microbial ecology-based engineering of Microbial Electrochemical Technologies.

    Science.gov (United States)

    Koch, Christin; Korth, Benjamin; Harnisch, Falk

    2018-01-01

    Microbial ecology is devoted to the understanding of dynamics, activity and interaction of microorganisms in natural and technical ecosystems. Bioelectrochemical systems represent important technical ecosystems, where microbial ecology is of highest importance for their function. However, whereas aspects of, for example, materials and reactor engineering are commonly perceived as highly relevant, the study and engineering of microbial ecology are significantly underrepresented in bioelectrochemical systems. This shortfall may be assigned to a deficit on knowledge and power of these methods as well as the prerequisites for their thorough application. This article discusses not only the importance of microbial ecology for microbial electrochemical technologies but also shows which information can be derived for a knowledge-driven engineering. Instead of providing a comprehensive list of techniques from which it is hard to judge the applicability and value of information for a respective one, this review illustrates the suitability of selected techniques on a case study. Thereby, best practice for different research questions is provided and a set of key questions for experimental design, data acquisition and analysis is suggested. © 2017 The Authors. Microbial Biotechnology published by John Wiley & Sons Ltd and Society for Applied Microbiology.

  10. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  11. Microbial bebop: creating music from complex dynamics in microbial ecology.

    Science.gov (United States)

    Larsen, Peter; Gilbert, Jack

    2013-01-01

    In order for society to make effective policy decisions on complex and far-reaching subjects, such as appropriate responses to global climate change, scientists must effectively communicate complex results to the non-scientifically specialized public. However, there are few ways however to transform highly complicated scientific data into formats that are engaging to the general community. Taking inspiration from patterns observed in nature and from some of the principles of jazz bebop improvisation, we have generated Microbial Bebop, a method by which microbial environmental data are transformed into music. Microbial Bebop uses meter, pitch, duration, and harmony to highlight the relationships between multiple data types in complex biological datasets. We use a comprehensive microbial ecology, time course dataset collected at the L4 marine monitoring station in the Western English Channel as an example of microbial ecological data that can be transformed into music. Four compositions were generated (www.bio.anl.gov/MicrobialBebop.htm.) from L4 Station data using Microbial Bebop. Each composition, though deriving from the same dataset, is created to highlight different relationships between environmental conditions and microbial community structure. The approach presented here can be applied to a wide variety of complex biological datasets.

  12. The Perceptions of Georgia School Board Members' Need for Training on School Board Governance

    Science.gov (United States)

    Nutt, Pamela Studdard

    2010-01-01

    This study explored the perceptions of training needs of school board members in Georgia. The study examined perceptions of school board chairs, board members with 1 to 5 years experience, members with 6 to 10 years experience, members with 11 to 15 years experience and board members with 16 plus years experience in the areas of school board…

  13. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  14. 77 FR 55837 - Board Meeting

    Science.gov (United States)

    2012-09-11

    ... FARM CREDIT SYSTEM INSURANCE CORPORATION Board Meeting AGENCY: Farm Credit System Insurance Corporation. ACTION: Regular meeting. SUMMARY: Notice is hereby given of the regular meeting of the Farm Credit System Insurance Corporation Board (Board). Date and Time: The meeting of the Board will be held...

  15. 75 FR 9196 - Letter From Secretary of Energy Accepting Defense Nuclear Facilities Safety Board (Board...

    Science.gov (United States)

    2010-03-01

    ... DEPARTMENT OF ENERGY Letter From Secretary of Energy Accepting Defense Nuclear Facilities Safety Board (Board) Recommendation 2009-2 AGENCY: Department of Energy. ACTION: Notice. SUMMARY: The...: The Department of Energy (DOE) acknowledges receipt of Defense Nuclear Facilities Safety Board (Board...

  16. Board affiliation and pay gap

    Directory of Open Access Journals (Sweden)

    Shenglan Chen

    2014-06-01

    Full Text Available This paper examines the effects of board affiliation on the corporate pay gap. Using a sample of Chinese listed firms from 2005 to 2011, we find that boards with a greater presence of directors appointed by block shareholders have lower pay gaps. Furthermore, the governance effects of board affiliation with and without pay are distinguished. The empirical results show that board affiliation without pay is negatively related to the pay gap, while board affiliation with pay is positively related to the pay gap. Overall, the results shed light on how block shareholders affect their companies’ pay gaps through board affiliation.

  17. Spatial and seasonal variation in diversity and structure of microbial biofilms on marine plastics in Northern European waters.

    Science.gov (United States)

    Oberbeckmann, Sonja; Loeder, Martin G J; Gerdts, Gunnar; Osborn, A Mark

    2014-11-01

    Plastic pollution is now recognised as a major threat to marine environments and marine biota. Recent research highlights that diverse microbial species are found to colonise plastic surfaces (the plastisphere) within marine waters. Here, we investigate how the structure and diversity of marine plastisphere microbial community vary with respect to season, location and plastic substrate type. We performed a 6-week exposure experiment with polyethylene terephthalate (PET) bottles in the North Sea (UK) as well as sea surface sampling of plastic polymers in Northern European waters. Scanning electron microscopy revealed diverse plastisphere communities comprising prokaryotic and eukaryotic microorganisms. Denaturing gradient gel electrophoresis (DGGE) and sequencing analysis revealed that plastisphere microbial communities on PET fragments varied both with season and location and comprised of bacteria belonging to Bacteroidetes, Proteobacteria, Cyanobacteria and members of the eukaryotes Bacillariophyceae and Phaeophyceae. Polymers sampled from the sea surface mainly comprised polyethylene, polystyrene and polypropylene particles. Variation within plastisphere communities on different polymer types was observed, but communities were primarily dominated by Cyanobacteria. This research reveals that the composition of plastisphere microbial communities in marine waters varies with season, geographical location and plastic substrate type. © 2014 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.

  18. 49 CFR 1011.2 - The Board.

    Science.gov (United States)

    2010-10-01

    ... TRANSPORTATION GENERAL RULES AND REGULATIONS BOARD ORGANIZATION; DELEGATIONS OF AUTHORITY § 1011.2 The Board. (a... submitted for decision except those assigned to an individual Board Member or employee or an employee board...) The Board may bring before it any matter assigned to an individual Board Member or employee or...

  19. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  20. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  1. 78 FR 4847 - Board Meeting

    Science.gov (United States)

    2013-01-23

    ... FARM CREDIT SYSTEM INSURANCE CORPORATION Board Meeting AGENCY: Farm Credit System Insurance Corporation. SUMMARY: Notice is hereby given of the regular meeting of the Farm Credit System Insurance Corporation Board (Board). DATE AND TIME: The meeting of the Board will be held at the offices of the Farm...

  2. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  3. Pilot Boarding Areas

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Pilot boarding areas are locations at sea where pilots familiar with local waters board incoming vessels to navigate their passage to a destination port. Pilotage is...

  4. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  5. Microbial bebop: creating music from complex dynamics in microbial ecology.

    Directory of Open Access Journals (Sweden)

    Peter Larsen

    Full Text Available In order for society to make effective policy decisions on complex and far-reaching subjects, such as appropriate responses to global climate change, scientists must effectively communicate complex results to the non-scientifically specialized public. However, there are few ways however to transform highly complicated scientific data into formats that are engaging to the general community. Taking inspiration from patterns observed in nature and from some of the principles of jazz bebop improvisation, we have generated Microbial Bebop, a method by which microbial environmental data are transformed into music. Microbial Bebop uses meter, pitch, duration, and harmony to highlight the relationships between multiple data types in complex biological datasets. We use a comprehensive microbial ecology, time course dataset collected at the L4 marine monitoring station in the Western English Channel as an example of microbial ecological data that can be transformed into music. Four compositions were generated (www.bio.anl.gov/MicrobialBebop.htm. from L4 Station data using Microbial Bebop. Each composition, though deriving from the same dataset, is created to highlight different relationships between environmental conditions and microbial community structure. The approach presented here can be applied to a wide variety of complex biological datasets.

  6. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  7. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  8. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  9. Board-to-Board Free-Space Optical Interconnections Passing through Boards for a Bookshelf-Assembled Terabit-Per-Second-Class ATM Switch.

    Science.gov (United States)

    Hirabayashi, K; Yamamoto, T; Matsuo, S; Hino, S

    1998-05-10

    We propose free-space optical interconnections for a bookshelf-assembled terabit-per-second-class ATM switch. Thousands of arrayed optical beams, each having a rate of a few gigabits per second, propagate vertically to printed circuit boards, passing through some boards, and are connected to arbitrary transmitters and receivers on boards by polarization controllers and prism arrays. We describe a preliminary experiment using a 1-mm-pitch 2 x 2 beam-collimator array that uses vertical-cavity surface-emitting laser diodes. These optical interconnections can be made quite stable in terms of mechanical shock and temperature fluctuation by the attachment of reinforcing frames to the boards and use of an autoalignment system.

  10. In Defense of Boards

    NARCIS (Netherlands)

    B. Visser (Bauke); S. Dominguez Martinez (Silvia); O.H. Swank (Otto)

    2007-01-01

    textabstractIt is often assumed that bad corporate performance means a bad CEO. The task of a board of directors is then simple: dismiss the executive. If it fails to do so, the board is said to be indolent. We take a kinder approach to observed board behaviour and point to the problems even

  11. Microbial Forensics: A Scientific Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Keim, Paul

    2003-02-17

    procedures and training to meet these initial challenges so as minimize disturbance of the evidence. While epidemiology and forensics are similar sciences with similar goals when applied to biocrimes, forensics has additional and more stringent requirements. Maintaining a chain of custody on evidentiary samples is one example of an extra requirement imposed on an investigation of a biocrime. Another issue is the intent in microbial forensics to identify a bioattack organism in greatest detail. If possible, forensic investigations will strive to identify the precise strain and substrain, rather than just to the species level, which might be sufficient in an epidemiological investigation. Although multiple groups have developed lists of bioterrorism target pathogens, these lists are too narrow. An expansion of microorganisms relevant to food and water threats should be considered. Computerized networks should be established to track infectious disease outbreaks in real time. These systems could alert public health and agricultural officials to the existence of a potential bioattack earlier than simply waiting for a report of a suspicious cluster of similar patients. Once a biocrime is suspected, a wide variety of methods are available to identify the microorganism used in the bioattack and to analyze features that might lead to the source of the event. A multi-pronged approach to such an investigation may be preferable, using many available methods-ranging from genomics to sequencing to physiology to analysis of substances in the sample. Microbial forensics will be most effective if there is sufficient basic scientific information concerning microbial genetics, evolution, physiology, and ecology. Strain subtyping analysis will be difficult to interpret if we do not understand some of the basic evolutionary mechanisms and population diversity of pathogens. Phenotypic features associated with evidentiary pathogens also may provide investigative leads, but full exploitation of

  12. COLLABORATION BOARD (CB55)

    CERN Multimedia

    B. Cousins

    Open Access Publication Policy ATLAS had recently issued a short statement in support of open access publishing. The mood of the discussions in the December CMS Collaboration Board had appeared to be in favour and so it was being proposed that CMS issue the same statement as that made by ATLAS (the statement is attached to the agenda of this meeting). The Collaboration Board agreed. Election of the Chair of the Collaboration Board Following the agreement to shorten the terms of both the Spokesperson and the Collaboration Board Chair, and to introduce a longer overlap period between the election and the start of the term, the election for the next Collaboration Board Chair was due in December 2007. If the old standard schedule specified in the Constitution were adapted to this date, then the Board should be informed at the present meeting that the election was being prepared. However, it was felt that the experience of the previous year's election of the Spokesperson had shown that it would be desirable to...

  13. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  14. WeaselBoard :

    Energy Technology Data Exchange (ETDEWEB)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  15. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  16. Financial and Transactional Bylaw of Universities and Faculties of Medical Sciences: Opportunities and Threats

    Directory of Open Access Journals (Sweden)

    Masoud Abolhallaje

    2013-12-01

    Full Text Available Background and purpose: According to developments related to the relative autonomy of universities and acquired extensive powers by the board of trustees of universities of medical sciences and healthcare services in a twenty-year perspective of country and in the context of the fourth and fifth socio-economic cultural development of country, necessity of developing financial and transactional bylaw of universities of medical sciences has become increasingly clear throughout country. Materials and Methods: Grounded theory is the qualitative methodology used for this study in order to identify the threats and opportunities of new financial tax bylaw of universities and faculties of medical sciences and through the study of documents, surveys of experts and beneficiaries and elites by Delphi method. Results: Releasing potential of public administration in order to control sources and uses, increasing management confidence in documented decision making, establishing organizational concentration on controlling costs, providing conditions of decision-making according to financial reports, independency in firing and hiring manpower by adopting specific provisions and creating independency in method of keeping accounts are among the most important opportunities. While poor organizational structure, lack of knowledge and skills in the existing structure, mental processes caused by reactions and incompatibility of staff, lack of criteria and rules in selection appointment and dismissal of managers and employees, lack of discipline and proper mechanisms in order to pursue the purposes, calculating financial burden and human resources required and finally, passing through traditional thinking and management system are among the most threats. Conclusion: Considering the mentioned threats and opportunities, financial and transactional bylaw of universities and faculties of medical sciences was basically revised and modified in January 2006, and then after

  17. 49 CFR 1011.5 - Employee boards.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Employee boards. 1011.5 Section 1011.5... OF TRANSPORTATION GENERAL RULES AND REGULATIONS BOARD ORGANIZATION; DELEGATIONS OF AUTHORITY § 1011.5 Employee boards. This section covers matters assigned to the Accounting Board, a board of employees of the...

  18. Board Size and Board Independence: A Quantitative Study on Banking Industry in Pakistan

    Directory of Open Access Journals (Sweden)

    Kashif Rashid

    2014-12-01

    Full Text Available This paper aims to investigate the relationship of board independence and board size with productivity and efficiency of the listed banks on the Karachi Stock Exchange, Pakistan. There is a lack of consensus regarding impact of corporate governance practices in correspondence to number of board members and board independence in banking sector. The derived results of the study show that there is a positive relationship between board independence and bank profitability and efficiency. Independent directors play a crucial role in providing genuine advice during executive decision making process which is an important source for improving overall corporate governance. Moreover, results regarding the role of control variables suggest a positive relationship of the total assets and deposits of the firm with the firm’s performance supporting stewardship theory in the market.

  19. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  20. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  1. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  2. Microbial community structure elucidates performance of Glyceria maxima plant microbial fuel cell

    NARCIS (Netherlands)

    Timmers, R.A.; Rothballer, M.; Strik, D.P.B.T.B.; Engel, M.; Schulz, M.; Hartmann, A.; Hamelers, H.V.M.; Buisman, C.J.N.

    2012-01-01

    The plant microbial fuel cell (PMFC) is a technology in which living plant roots provide electron donor, via rhizodeposition, to a mixed microbial community to generate electricity in a microbial fuel cell. Analysis and localisation of the microbial community is necessary for gaining insight into

  3. Preserving the Legitimacy of Board Certification.

    Science.gov (United States)

    Hanemann, Michael S; Wall, Holly C; Dean, John A

    2017-06-01

    The aims of this discussion were to inform the medical community about the American Board of Cosmetic Surgery's ongoing attempts in Louisiana to achieve equivalency to American Board of Medical Specialties (ABMS) member boards so that its diplomates may use the term "board certified" in advertising and to ensure public safety by upholding the standards for medical board certification. In 2011, Louisiana passed a truth in medical advertising law, which was intended to protect the public by prohibiting the use of the term "board certified" by improperly credentialed physicians. An American Board of Cosmetic Surgery diplomate petitioned the Louisiana State Board of Medical Examiners to approve a rule that would establish a pathway to equivalency for non-ABMS member boards, whose diplomates have not completed training approved by the Accreditation Council for Graduate Medical Education (ACGME) in the specialty they are certifying. Physicians and physician organizations representing multiple specialties (facial plastic and reconstructive surgery, otolaryngology [head and neck surgery], orthopedic spine surgery, pediatric neurosurgery, dermatology, and plastic surgery) urged the Louisiana State Board of Medical Examiners to clarify its advertising policy, limiting the use of the term "board certified" to physicians who have completed ACGME-approved training in the specialty or subspecialty named in the certificate. The public equates the term "board certified" with the highest level of expertise in a medical specialty. When a certifying board does not require completion of ACGME or American Osteopathic Association (AOA)-accredited training in the specialty it certifies, the result is an unacceptable degree of variability in the education and training standards applied to its diplomates. Independent, third-party oversight of certifying boards and training programs is necessary to ensure quality standards are upheld. Any system that assesses a non-ABMS member or non

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  5. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  6. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  7. 76 FR 52997 - Public Company Accounting Oversight Board; Order Approving Proposed Board Funding Final Rules for...

    Science.gov (United States)

    2011-08-24

    ... Accounting Oversight Board; Order Approving Proposed Board Funding Final Rules for Allocation of the Board's... August 18, 2011. I. Introduction On June 21, 2011, the Public Company Accounting Oversight Board (the... public accounting firm, in amounts that are sufficient to cover the costs of processing and reviewing...

  8. Microbial Rechargeable Battery

    NARCIS (Netherlands)

    Molenaar, Sam D.; Mol, Annemerel R.; Sleutels, Tom H.J.A.; Heijne, Ter Annemiek; Buisman, Cees J.N.

    2016-01-01

    Bioelectrochemical systems hold potential for both conversion of electricity into chemicals through microbial electrosynthesis (MES) and the provision of electrical power by oxidation of organics using microbial fuel cells (MFCs). This study provides a proof of concept for a microbial

  9. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  10. Unraveling the role of membrane microdomains during microbial infections.

    Science.gov (United States)

    Bagam, Prathyusha; Singh, Dhirendra P; Inda, Maria Eugenia; Batra, Sanjay

    2017-10-01

    Infectious diseases pose major socioeconomic and health-related threats to millions of people across the globe. Strategies to combat infectious diseases derive from our understanding of the complex interactions between the host and specific bacterial, viral, and fungal pathogens. Lipid rafts are membrane microdomains that play important role in life cycle of microbes. Interaction of microbial pathogens with host membrane rafts influences not only their initial colonization but also their spread and the induction of inflammation. Therefore, intervention strategies aimed at modulating the assembly of membrane rafts and/or regulating raft-directed signaling pathways are attractive approaches for the. management of infectious diseases. The current review discusses the latest advances in terms of techniques used to study the role of membrane microdomains in various pathological conditions and provides updated information regarding the role of membrane rafts during bacterial, viral and fungal infections.

  11. Thermodynamic controls on the kinetics of microbial low-pH Fe(II) oxidation.

    Science.gov (United States)

    Larson, Lance N; Sánchez-España, Javier; Kaley, Bradley; Sheng, Yizhi; Bibby, Kyle; Burgos, William D

    2014-08-19

    Acid mine drainage (AMD) is a major worldwide environmental threat to surface and groundwater quality. Microbial low-pH Fe(II) oxidation could be exploited for cost-effective AMD treatment; however, its use is limited because of uncertainties associated with its rate and ability to remove Fe from solution. We developed a thermodynamic-based framework to evaluate the kinetics of low-pH Fe(II) oxidation. We measured the kinetics of low-pH Fe(II) oxidation at five sites in the Appalachian Coal Basin in the US and three sites in the Iberian Pyrite Belt in Spain and found that the fastest rates of Fe(II) oxidation occurred at the sites with the lowest pH values. Thermodynamic calculations showed that the Gibbs free energy of Fe(II) oxidation (ΔG(oxidation)) was also most negative at the sites with the lowest pH values. We then conducted two series of microbial Fe(II) oxidation experiments in laboratory-scale chemostatic bioreactors operated through a series of pH values (2.1-4.2) and found the same relationships between Fe(II) oxidation kinetics, ΔG(oxidation), and pH. Conditions that favored the fastest rates of Fe(II) oxidation coincided with higher Fe(III) solubility. The solubility of Fe(III) minerals, thus plays an important role on Fe(II) oxidation kinetics. Methods to incorporate microbial low-pH Fe(II) oxidation into active and passive AMD treatment systems are discussed in the context of these findings. This study presents a simplified model that describes the relationship between free energy and microbial kinetics and should be broadly applicable to many biogeochemical systems.

  12. Linking the Gut Microbial Ecosystem with the Environment: Does Gut Health Depend on Where We Live?

    Directory of Open Access Journals (Sweden)

    Nishat Tasnim

    2017-10-01

    Full Text Available Global comparisons reveal a decrease in gut microbiota diversity attributed to Western diets, lifestyle practices such as caesarian section, antibiotic use and formula-feeding of infants, and sanitation of the living environment. While gut microbial diversity is decreasing, the prevalence of chronic inflammatory diseases such as inflammatory bowel disease, diabetes, obesity, allergies and asthma is on the rise in Westernized societies. Since the immune system development is influenced by microbial components, early microbial colonization may be a key factor in determining disease susceptibility patterns later in life. Evidence indicates that the gut microbiota is vertically transmitted from the mother and this affects offspring immunity. However, the role of the external environment in gut microbiome and immune development is poorly understood. Studies show that growing up in microbe-rich environments, such as traditional farms, can have protective health effects on children. These health-effects may be ablated due to changes in the human lifestyle, diet, living environment and environmental biodiversity as a result of urbanization. Importantly, if early-life exposure to environmental microbes increases gut microbiota diversity by influencing patterns of gut microbial assembly, then soil biodiversity loss due to land-use changes such as urbanization could be a public health threat. Here, we summarize key questions in environmental health research and discuss some of the challenges that have hindered progress toward a better understanding of the role of the environment on gut microbiome development.

  13. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  14. Microbial disease and the coral holobiont

    Science.gov (United States)

    Bourne, David G.; Garren, Melissa; Work, Thierry M.; Rosenberg, Eugene; Smith, Garriet W.; Harvell, C. Drew

    2009-01-01

    Tropical coral reefs harbour a reservoir of enormous biodiversity that is increasingly threatened by direct human activities and indirect global climate shifts. Emerging coral diseases are one serious threat implicated in extensive reef deterioration through disruption of the integrity of the coral holobiont – a complex symbiosis between the coral animal, endobiotic alga and an array of microorganisms. In this article, we review our current understanding of the role of microorganisms in coral health and disease, and highlight the pressing interdisciplinary research priorities required to elucidate the mechanisms of disease. We advocate an approach that applies knowledge gained from experiences in human and veterinary medicine, integrated into multidisciplinary studies that investigate the interactions between host, agent and environment of a given coral disease. These approaches include robust and precise disease diagnosis, standardised ecological methods and application of rapidly developing DNA, RNA and protein technologies, alongside established histological, microbial ecology and ecological expertise. Such approaches will allow a better understanding of the causes of coral mortality and coral reef declines and help assess potential management options to mitigate their effects in the longer term.

  15. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  16. Microbial biosensors

    International Nuclear Information System (INIS)

    Le Yu; Chen, Wilfred; Mulchandani, Ashok

    2006-01-01

    A microbial biosensor is an analytical device that couples microorganisms with a transducer to enable rapid, accurate and sensitive detection of target analytes in fields as diverse as medicine, environmental monitoring, defense, food processing and safety. The earlier microbial biosensors used the respiratory and metabolic functions of the microorganisms to detect a substance that is either a substrate or an inhibitor of these processes. Recently, genetically engineered microorganisms based on fusing of the lux, gfp or lacZ gene reporters to an inducible gene promoter have been widely applied to assay toxicity and bioavailability. This paper reviews the recent trends in the development and application of microbial biosensors. Current advances and prospective future direction in developing microbial biosensor have also been discussed

  17. Childhood microbial keratitis

    Directory of Open Access Journals (Sweden)

    Abdullah G Al Otaibi

    2012-01-01

    Conclusion: Children with suspected microbial keratitis require comprehensive evaluation and management. Early recognition, identifying the predisposing factors and etiological microbial organisms, and instituting appropriate treatment measures have a crucial role in outcome. Ocular trauma was the leading cause of childhood microbial keratitis in our study.

  18. Threat Object Detection using Covariance Matrix Modeling in X-ray Images

    International Nuclear Information System (INIS)

    Jeon, Byoun Gil; Kim, Jong Yul; Moon, Myung Kook

    2016-01-01

    The X-ray imaging system for the aviation security is one of the applications. In airports, all passengers and properties should be inspected and accepted by security machines before boarding on aircrafts to avoid all treat factors. That treat factors might be directly connected on terrorist threats awfully hazardous to not only passengers but also people in highly populated area such as major cities or buildings. Because the performance of the system is increasing along with the growth of IT technology, information that has various type and good quality can be provided for security check. However, human factors are mainly affected on the inspections. It means that human inspectors should be proficient corresponding to the growth of technology for efficient and effective inspection but there is clear limit of proficiency. Human being is not a computer. Because of the limitation, the aviation security techniques have the tendencies to provide not only numerous and nice information but also effective assistance for security inspectors. Many image processing applications already have been developed to provide efficient assistance for the security systems. Naturally, the security check procedure should not be altered by automatic software because it's not guaranteed that the automatic system will never make any mistake. This paper addressed an application of threat object detection using the covariance matrix modeling. The algorithm is implemented in MATLAB environment and evaluated the performance by comparing with other detection algorithms. Considering the shape of an object on an image is changed by the attitude of that to the imaging machine, the implemented detector has the robustness for rotation and scale of an object

  19. Threat Object Detection using Covariance Matrix Modeling in X-ray Images

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, Byoun Gil; Kim, Jong Yul; Moon, Myung Kook [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    The X-ray imaging system for the aviation security is one of the applications. In airports, all passengers and properties should be inspected and accepted by security machines before boarding on aircrafts to avoid all treat factors. That treat factors might be directly connected on terrorist threats awfully hazardous to not only passengers but also people in highly populated area such as major cities or buildings. Because the performance of the system is increasing along with the growth of IT technology, information that has various type and good quality can be provided for security check. However, human factors are mainly affected on the inspections. It means that human inspectors should be proficient corresponding to the growth of technology for efficient and effective inspection but there is clear limit of proficiency. Human being is not a computer. Because of the limitation, the aviation security techniques have the tendencies to provide not only numerous and nice information but also effective assistance for security inspectors. Many image processing applications already have been developed to provide efficient assistance for the security systems. Naturally, the security check procedure should not be altered by automatic software because it's not guaranteed that the automatic system will never make any mistake. This paper addressed an application of threat object detection using the covariance matrix modeling. The algorithm is implemented in MATLAB environment and evaluated the performance by comparing with other detection algorithms. Considering the shape of an object on an image is changed by the attitude of that to the imaging machine, the implemented detector has the robustness for rotation and scale of an object.

  20. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  1. NPS Transit System Passenger Boardings Study: Converting Ticket Sales to Passenger Boardings.

    Science.gov (United States)

    2016-01-01

    This report examines the reporting of passenger boardings (unlinked passenger trips) by NPS transit systems that use a ticket sales conversion methodology. By studying and validating the park units' passenger boarding methodology from converting tick...

  2. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  3. Board of Director Configurations in Mutual Funds Sponsors: A Board-Level Analysis of Director Performance and Ownership

    National Research Council Canada - National Science Library

    Fraser, Steven

    2003-01-01

    ... (or a cluster of funds); referred to as a Multiple Board Configuration (MBC). In a sample of the largest open-end mutual fund sponsors, I find MBC boards have significantly higher board-level objective-adjusted excess returns than SBC boards...

  4. DOE's Environmental Management Site-Specific Advisory Board: The Roles, Work, and Assessment of the Constituent Local Boards - 13587

    International Nuclear Information System (INIS)

    Alexander, Catherine; Freeman, Jenny; Cantrell, Yvette

    2013-01-01

    The charter for the Department of Energy's Environmental Management (EM) Site-Specific Advisory Board (SSAB) was approved under the Federal Advisory Committee Act (FACA) in 1994. With a unique mandate to provide public input on issues associated with the cleanup of nuclear legacy sites in the U.S., the EM SSAB comprises eight local boards, which are based at major EM sites. While each board is unique to the community in which it is located and reflects the diversity of the local population, the boards are governed by FACA, related regulations, and DOE policies that are intended to standardize agency advisory board operations. The EM SSAB local boards are made up of a diverse group of citizens who want to understand the mission and goals of the EM program and to help EM achieve those goals for the benefit of their communities. Some are quite passionate about their mission; others need to be coaxed into active participation. Maintaining productive relationships and a supportive environment for effective board operations is the challenge of board management for DOE EM and the board members themselves. DOE draws on research findings and best practices literature from academics and practitioners in the field of public involvement in its board management practices. The EM SSAB is also evaluated annually under the law to ensure that the investment of taxpayer dollars in the board is warranted in light of the contributions of the board. Further evaluation takes place at the agency and site levels in order to identify what aspects of board functioning the agency and board members find important to its success and to address areas where improvement is needed. Board contributions, compliance factors, and measurable outcomes related to board products and process areas are key to agency commitment to ongoing support of the boards and to participant satisfaction and thus continued member involvement. In addition to evaluation of these factors in improving board effectiveness

  5. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  6. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  7. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  8. SMART Boards Rock

    Science.gov (United States)

    Giles, Rebecca M.; Shaw, Edward L.

    2011-01-01

    SMART Board is a technology that combines the functionality of a whiteboard, computer, and projector into a single system. The interactive nature of the SMART Board offers many practical uses for providing an introduction to or review of material, while the large work area invites collaboration through social interaction and communication. As a…

  9. Departmental Appeals Board Decisions

    Data.gov (United States)

    U.S. Department of Health & Human Services — Decisions issued by the Chair and Board Members of the Departmental Appeals Board concerning determinations in discretionary, project grant programs, including...

  10. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  11. 77 FR 1956 - National Science Board; Notice of Opportunity for Public Comment on the National Science Board...

    Science.gov (United States)

    2012-01-12

    ... NATIONAL SCIENCE FOUNDATION National Science Board; Notice of Opportunity for Public Comment on the National Science Board Data Policies Report AGENCY: National Science Board (NSB), NSF. ACTION: Request for public comments. SUMMARY: The National Science Board seeks comments from the public on the...

  12. Board diversity in family firms

    OpenAIRE

    Menozzi, Anna; Fraquelli, Giovanni; Novara, Jolanda de

    2015-01-01

    The paper deals with diversity as a key factor to improve the board of directors’ decision process in family firms. The empirical literature about board diversity points at the positive impact of diversity on board functioning and firm performance. The paper uses a statistical diversity index to capture the heterogeneity of board of directors and put it in relation with firm performance, as measured by firm profitability. The empirical analysis is based on a newly collected panel of 327 famil...

  13. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  14. Buddy Board

    DEFF Research Database (Denmark)

    Enggaard, Helle; Moselund, Lene

    2015-01-01

    Projekt ’BuddyBoard’ er kommet i stand via et samarbejde mellem Frederikshavn kommune, Bunker43 og Lab. X. Afdeling en ’Havly’ på Sæby Ældrecenter fungerer som living lab, hvilket betyder, at det udgør et levende laboratorium for udvikling og afprøvning af teknologi (Schultz, 2013). Projektet er....... Bunker43 har udviklet en teknologi (BuddyBoard) til hurtig formidling af billeder fra pårørende og personale til beboere på institutioner. Pårørende og personale uploader billeder via en APP eller en hjemmeside og har mulighed for at tilføje en kort forklarende tekst til hvert billede. Beboeren ser...... billederne via en tablet. Systemet bygger på et simpelt og brugervenligt design, så ældre med kognitive og/eller fysiske funktionsnedsættelser kan anvende teknologien. BuddyBoard fungerer via internettet, og billederne gemmes på en sikret server hos udbyderen, som er Bunker43. Intentionerne med BuddyBoard er...

  15. EU conference - 'The microbial threat'

    DEFF Research Database (Denmark)

    Mevius, D.J.; Sprenger, M.J.W.; Wegener, Henrik Caspar

    1999-01-01

    and its compliance with guidelines. Keeping animals for food production involves the responsibility for their well being. This includes treatment of infections. However, the use of feed additive, growth-promoting antimicrobials related to therapeutics in human medicine, should be banned immediately......A global or European strategy should be developed to deal with increasing antimicrobial resistance. This strategy includes surveillance of antimicrobial resistance and monitoring of the use of antimicrobial agents in animals and humans. In animals, surveillance should be focussed on potential...... transfer of resistant, zoonotic, food-born pathogens and resistance genes to humans. In humans the surveillance should be clinically relevant. Guidelines for rational therapy should be implemented and 'antibiotic teams' should be installed in each hospital to evaluate the prescription of antibiotics...

  16. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  17. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  18. 22 CFR 902.3 - Board staff.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Board staff. 902.3 Section 902.3 Foreign Relations FOREIGN SERVICE GRIEVANCE BOARD ORGANIZATION § 902.3 Board staff. The chairperson shall select the Board's executive secretary and other staff provided for in the Act. The executive secretary and staff...

  19. 76 FR 40950 - Public Company Accounting Oversight Board; Notice of Filing of Proposed Board Funding Final Rules...

    Science.gov (United States)

    2011-07-12

    ... available, the issuer's net asset value. (i)(v) Issuer Accounting Support Fee The term ``issuer accounting... Accounting Oversight Board; Notice of Filing of Proposed Board Funding Final Rules for Allocation of the Board's Accounting Support Fee Among Issuers, Brokers, and Dealers, and Other Amendments to the Board's...

  20. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  1. Bringing out the Best Board Behavior

    Science.gov (United States)

    Caruso, Nicholas

    2004-01-01

    The author's advice for for a school board superintendent is to assume incompetence instead of malevolence. Board members who behave inappropriately are a minority, and those with malicious intent are extremely rare. Most misbehaving board members act out of frustration. They may not understand the appropriate role of a board member.…

  2. What makes boards effective? An examination of the relationships between board inputs, structures, processes and effectiveness in non-profit organizations

    OpenAIRE

    Cornforth, Chris

    2001-01-01

    Based on a survey of charity boards in England and Wales this paper examines what influence board inputs, structures and processes have on board effectiveness. The findings provide mixed support for the normative literature on board effectiveness. Using stepwise logistic regression the research suggests that board inputs and three process variables are important in explaining board effectiveness, namely: board members have the time, skills and experience to do the job; clear board roles and r...

  3. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  4. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  5. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  6. Effect Of Spaceflight On Microbial Gene Expression And Virulence: Preliminary Results From Microbe Payload Flown On-Board STS-115

    Science.gov (United States)

    Wilson, J. W.; HonerzuBentrup, K,; Schurr, M. J.; Buchanan, K.; Morici, L.; Hammond, T.; Allen, P.; Baker, C.; Ott, C. M.; Nelman-Gonzalez M.; hide

    2007-01-01

    Human presence in space, whether permanent or temporary, is accompanied by the presence of microbes. However, the extent of microbial changes in response to spaceflight conditions and the corresponding changes to infectious disease risk is unclear. Previous studies have indicated that spaceflight weakens the immune system in humans and animals. In addition, preflight and in-flight monitoring of the International Space Station (ISS) and other spacecraft indicates the presence of opportunistic pathogens and the potential of obligate pathogens. Altered antibiotic resistance of microbes in flight has also been shown. As astronauts and cosmonauts live for longer periods in a closed environment, especially one using recycled water and air, there is an increased risk to crewmembers of infectious disease events occurring in-flight. Therefore, understanding how the space environment affects microorganisms and their disease potential is critically important for spaceflight missions and requires further study. The goal of this flight experiment, operationally called MICROBE, is to utilize three model microbial pathogens, Salmonella typhimurium, Pseudomonas aeruginosa, and Candida albicans to examine the global effects of spaceflight on microbial gene expression and virulence attributes. Specifically, the aims are (1) to perform microarray-mediated gene expression profiling of S. typhimurium, P. aeruginosa, and C. albicans, in response to spaceflight in comparison to ground controls and (2) to determine the effect of spaceflight on the virulence potential of these microorganisms immediately following their return from spaceflight using murine models. The model microorganisms were selected as they have been isolated from preflight or in-flight monitoring, represent different degrees of pathogenic behavior, are well characterized, and have sequenced genomes with available microarrays. In particular, extensive studies of S. typhimurium by the Principal Investigator, Dr. Nickerson

  7. Governing Board of the Pension Fund

    CERN Multimedia

    2006-01-01

    The Governing Board of the Pension Fund held its 142nd meeting on 14 March 2006. As an introduction to the meeting, the Administrator underlined that, at 12.4%, the performance achieved by the Fund on its assets had been excellent and had taken the Fund's assets at the end of the year to 4,209 MCHF, which was well above the 4 billion Swiss franc mark. The Chairman of the Governing Board, Professor Ferrini, reported on the Board's closed session on 7 March to examine the nominations received for the election of the Vice-Chairmen of the Governing Board of the Pension Fund. The Governing Board had unanimously agreed to recommend the CERN Council to appoint Mr A. J. Naudi and Dr J.-P. Matheys. At its session on 16 March 2006, the Council had followed the recommendation of the Governing Board by re-appointing J.-P. Matheys and A. J. Naudi Vice-Chairmen of the Board until the end of their respective terms of office as members of the Governing Board. Regarding the comparison with other European pension funds launc...

  8. Culturable microbial groups and thallium-tolerant fungi in soils with high thallium contamination.

    Science.gov (United States)

    Sun, Jialong; Zou, Xiao; Ning, Zengping; Sun, Min; Peng, Jingquan; Xiao, Tangfu

    2012-12-15

    Thallium (Tl) contamination in soil exerts a significant threat to the ecosystem health due to its high toxicity. However, little is known about the effect of Tl on the microbial community in soil. The present study aimed at characterizing the culturable microbial groups in soils which experience for a long time high Tl contamination and elevated Hg and As. The contamination originates from As, Hg and Tl sulfide mineralization and the associated mining activities in the Guizhou Province, Southwest China. Our investigation showed the existence of culturable bacteria, filamentous fungi and actinomyces in long-term Tl-contaminated soils. Some fungal groups grow in the presence of high Tl level up to 1000 mg kg⁻¹. We have isolated and identified nine Tl-tolerant fungal strains based on the morphological traits and ITS analysis. The dominant genera identified were Trichoderma, Penicillium and Paecilomyces. Preliminary data obtained in this study suggested that certain microbes were able to face high Tl pollution in soil and maintain their metabolic activities and resistances. The highly Tl-tolerant fungi that we have isolated are potentially useful in the remediation of Tl-contaminated sites. Copyright © 2012 Elsevier B.V. All rights reserved.

  9. Microbial community structure elucidates performance of Glyceria maxima plant microbial fuel cell

    OpenAIRE

    Timmers, R.A.; Rothballer, M.; Strik, D.P.B.T.B.; Engel, M.; Schulz, M.; Hartmann, A.; Hamelers, H.V.M.; Buisman, C.J.N.

    2012-01-01

    The plant microbial fuel cell (PMFC) is a technology in which living plant roots provide electron donor, via rhizodeposition, to a mixed microbial community to generate electricity in a microbial fuel cell. Analysis and localisation of the microbial community is necessary for gaining insight into the competition for electron donor in a PMFC. This paper characterises the anode-rhizosphere bacterial community of a Glyceria maxima (reed mannagrass) PMFC. Electrochemically active bacteria (EAB) w...

  10. Microbial community structure elucidates performance of Glyceria maxima plant microbial fuel cell

    OpenAIRE

    Timmers, Ruud A.; Rothballer, Michael; Strik, David P. B. T. B.; Engel, Marion; Schulz, Stephan; Schloter, Michael; Hartmann, Anton; Hamelers, Bert; Buisman, Cees

    2012-01-01

    The plant microbial fuel cell (PMFC) is a technology in which living plant roots provide electron donor, via rhizodeposition, to a mixed microbial community to generate electricity in a microbial fuel cell. Analysis and localisation of the microbial community is necessary for gaining insight into the competition for electron donor in a PMFC. This paper characterises the anode–rhizosphere bacterial community of a Glyceria maxima (reed mannagrass) PMFC. Electrochemically active bacteria (EAB) w...

  11. German versus Nordic Board Models

    DEFF Research Database (Denmark)

    Ringe, Georg

    2016-01-01

    Board structure is an important component of the individual governance of firms, and the appropriateness of the various models is one of the most debated issues in corporate governance today. A comparison of the Nordic and German approaches to the structure of corporate boards reveals stark...... conceptual differences, as emphasized by the 2014 Lekvall Report on the Nordic Corporate Governance Model. This article provides a conceptual comparison between the two approaches to board structure and confirms the fundamental divergence between both models. However, relying on a number of recent legal...... changes and developments in business practice, the article argues that board practices in the two systems effectively blur the structural distinction, and that board organization is converging in practice. It thereby contributes to the broader debates on functionality and comparative corporate law...

  12. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  13. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Luc Vos with regard to advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 14 to 28 June 2002. Human Resources Division Tel. 74128

  14. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Olivier Francis Martin with regard to indefinite contract. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 8 to 25 June 2001.

  15. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Aloïs Girardoz with regard to classification and advancement. As the appellant has not objected, the Board's report and the Director-General's decision will be brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 15 to 29 August 2003. Human Resources Division Tel. 74128

  16. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  17. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  18. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  19. ChalkBoard: Mapping Functions to Polygons

    Science.gov (United States)

    Matlage, Kevin; Gill, Andy

    ChalkBoard is a domain specific language for describing images. The ChalkBoard language is uncompromisingly functional and encourages the use of modern functional idioms. ChalkBoard uses off-the-shelf graphics cards to speed up rendering of functional descriptions. In this paper, we describe the design of the core ChalkBoard language, and the architecture of our static image generation accelerator.

  20. Advisory Boards: Gateway to Business Engagement

    Science.gov (United States)

    Meeder, Hans; Pawlowski, Brett

    2012-01-01

    Interest has been growing in how to build or manage an effective business advisory board. Developing an advisory board is crucial to keeping CTE programs relevant and viable by engaging the support of business and industry. This article delves into how to build and manage a board, and how to re-energize boards that already exist but may be lacking.

  1. Why Not Charter School Boards?

    Science.gov (United States)

    Schlechty, Phillip C.; Cole, Robert W.

    1993-01-01

    Claiming that individual school board members act in selfish ways, proposes electing entire school board as a slate. Board would collectively be held responsible for performance of the school system and all of its employees. State legislation would be required to specify how interested groups would select a slate and create a charter, which is the…

  2. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  3. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  4. Association of Regulatory Boards of Optometry

    Science.gov (United States)

    ... website of the Association of Regulatory Boards of Optometry (ARBO). ARBO's web site is designed to provide resources to regulatory boards of optometry throughout the world. State/Provincial/Territorial Boards of ...

  5. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  6. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  7. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Poul Frandsen concerning his assimilation into the new career structure. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 13 to 24 January 2003. Human Resources Division Tel. 74128

  8. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Personnel Division

    1999-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Joào Bento with regard to residential category. As the appellant has not objected, the recommendations of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article RÊVIÊ1.20 of the Staff Regulations.The relevant documents will therefore be posted on the notice boards of the Administration Building (N¡ 60) from 29 October to 12 November 1999.Personnel DivisionTel. 74128

  9. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2006-01-01

    The Joint Advisory Appeals Board was convened to examine an appeal lodged by a member of the personnel with regard to advancement. The person concerned has requested that the report of the Board and the final decision of the Director-General be brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (No. 60) from 24 March to 10 April 2006. Human Resources Department Tel. 74128

  10. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Jack Blanchard with regard to 'non recognition of specific functions'. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 12th to 26th April 2002. Human Resources Division Tel. 74128

  11. Joint Advisory Appeals Board

    CERN Multimedia

    2004-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mrs Maria DIMOU with regard to a periodic one-step increase. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 30 April to 14 May 2004. Human Resources Department Tel. 74128

  12. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Joël Lahaye with regard to non-resident allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 18 May to 1st June 2001.

  13. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Bertrand Nicquevert with regard to the non-resident allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 29 November to 13 December 2002. Human Resources Division Tel. 74128

  14. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Antonio Millich with regard to advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 27 September to 11 October 2002. Human Resources Division Tel. 74128

  15. Joint Advisory Appeals Board

    CERN Multimedia

    Human Resources Department

    2005-01-01

    The Joint Advisory Appeals Board was convened to examine an appeal lodged by a member of the personnel with regard to a periodic one-step increase. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 1 to 15 April 2005. Human Resources Department Tel. 74128

  16. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Gert Jan Bossen with regard to dependent child allowance. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 1st to 15 March 2002. Human Resources Division Tel. 74128

  17. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2002-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Serge Peraire with regard to exceptional advancement. As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 17 to 31 May 2002. Human Resources Division Tel. 74128

  18. Primer printed circuit boards

    CERN Document Server

    Argyle, Andrew

    2009-01-01

    Step-by-step instructions for making your own PCBs at home. Making your own printed circuit board (PCB) might seem a daunting task, but once you master the steps, it's easy to attain professional-looking results. Printed circuit boards, which connect chips and other components, are what make almost all modern electronic devices possible. PCBs are made from sheets of fiberglass clad with copper, usually in multiplelayers. Cut a computer motherboard in two, for instance, and you'll often see five or more differently patterned layers. Making boards at home is relatively easy

  19. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  20. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  1. Proceedings of the 8. International Symposium on Microbial Ecology : microbial biosystems : new frontiers

    International Nuclear Information System (INIS)

    Bell, C.R.; Brylinsky, M.; Johnson-Green, P.

    2000-01-01

    A wide range of disciplines were presented at this conference which reflected the importance of microbial ecology and provided an understanding of the factors that determine the growth and activities of microorganisms. The conference attracted 1444 delegates from 54 countries. The research emerging from the rapidly expanding frontier of microbial ecosystems was presented in 62 oral presentation and 817 poster presentations. The two volumes of these proceedings presented a total of 27 areas in microbial ecology, some of which included terrestrial biosystems, aquatic, estuarine, surface and subsurface microbial ecology. Other topics included bioremediation, microbial ecology in industry and microbial ecology of oil fields. Some of the papers highlighted the research that is underway to determine the feasibility of using microorganisms for enhanced oil recovery (EOR). Research has shown that microbial EOR can increase production at lower costs than conventional oil recovery. The use of bacteria has also proven to be a feasible treatment method in the biodegradation of hydrocarbons associated with oil spills. refs., tabs., figs

  2. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  3. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  4. [Characterization and microbial community shifts of rice strawdegrading microbial consortia].

    Science.gov (United States)

    Wang, Chunfang; Ma, Shichun; Huang, Yan; Liu, Laiyan; Fan, Hui; Deng, Yu

    2016-12-04

    To study the relationship between microbial community and degradation rate of rice straw, we compared and analyzed cellulose-decomposing ability, microbial community structures and shifts of microbial consortia F1 and F2. We determined exoglucanase activity by 3, 5-dinitrosalicylic acid colorimetry. We determined content of cellulose, hemicellulose and lignin in rice straw by Van Soest method, and calculated degradation rates of rice straw by the weight changes before and after a 10-day incubation. We analyzed and compared the microbial communities and functional microbiology shifts by clone libraries, Miseq analysis and real time-PCR based on the 16S rRNA gene and cel48 genes. Total degradation rate, cellulose, and hemicellulose degradation rate of microbial consortia F1 were significantly higher than that of F2. The variation trend of exoglucanase activity in both microbial consortia F1 and F2 was consistent with that of cel48 gene copies. Microbial diversity of F1 was complex with aerobic bacteria as dominant species, whereas that of F2 was simple with a high proportion of anaerobic cellulose decomposing bacteria in the later stage of incubation. In the first 4 days, unclassified Bacillales and Bacillus were dominant in both F1 and F2. The dominant species and abundance became different after 4-day incubation, Bacteroidetes and Firmicutes were dominant phyla of F1 and F2, respectively. Although Petrimonas and Pusillimonas were common dominant species in F1 and F2, abundance of Petrimonas in F2 (38.30%) was significantly higher than that in F1 (9.47%), and the abundance of Clostridiales OPB54 in F2 increased to 14.85% after 8-day incubation. The abundance of cel48 gene related with cellulose degradation rate and exoglucanase activity, and cel48 gene has the potential as a molecular marker to monitor the process of cellulose degradation. Microbial community structure has a remarkable impact on the degradation efficiency of straw cellulose, and Petrimonas

  5. Digestate and ash as alternatives to conventional fertilisers: Benefits and threats to soil biota

    Science.gov (United States)

    Marshall, Rachel; Lag-Brotons, Alfonso J.; Herbert, Ben; Hurst, Lois; Ostle, Nick; Dodd, Ian C.; Quinton, John; Surridge, Ben; Aiouache, Farid; Semple, Kirk T.

    2017-04-01

    Recovering energy and nutrients from waste offers opportunities to tackle issues of energy and food security whilst simultaneously improving waste management. Waste materials from the bioenergy industry potentially contain valuable resources for use in agriculture and there is growing evidence to suggest that the use of digestate, from anaerobic digestion, and biomass ash from incineration processes could contribute to improving soil health and nutrition. The work presented here is part of the Adding Value to Ash and Digestate (AVAnD) project which looks at the impacts of digestate and ash blends on soil fertility, crop yields and soil health. Whilst increased crop productivity is one of the essential indicators of the success of these alternative soil amendments; it is important that the impacts on soil biological function is understood. Field and lab experiments were conducted with a number of different fertiliser treatments, including conventional fertiliser (urea and superphosphate), digestate from two contrasting feedstocks, ash material and ash-digestate blends. Looking across different biological scales from soil microbe to soil macro-fauna, this work examines the benefits and threats to soil biota arising from the use of ash-digestate fertilisers in agriculture. Measurements of microbial respiration and biomass (by chloroform fumigation) and community composition (by phospholipid fatty acid analysis) were made at different timescales (days/weeks). Data from these studies demonstrates that none of the soil amendments decreased microbial activity or biomass in the short term (t= 1 month). Additions of both conventional fertilisers and the fertilisers derived from waste stimulated microbial activity with significantly higher respiration observed from the digestate based treatments. Digestate-based treatments also resulted in higher soil microbial biomass and differential effects were observed between digestate amendments with and without ash. These results

  6. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  7. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  8. The Kostyuk report: Corporate board practices in Ukraine

    Directory of Open Access Journals (Sweden)

    Alexander N. Kostyuk

    2005-01-01

    Full Text Available The author reports on the corporate board practices in Ukraine. The roles of board of directors are mainly about control. The strategic and advisory roles are not developed. The mode of strategic involvement of the members of supervisory boards in Ukraine is mainly about reviewing and approving. Thus, the board of directors in Ukraine is "a rubber stamp". The degree of independence of directors is very low. Major board practices in Ukraine are: small number of independent directors on the board; low frequency of meeting of the board; small number of committees on the board; the management board influences the supervisory board. Board practices in Ukraine need a sort of recommendations, similar to those, made in UK at the end of 1990s, and at the start of the third millennium.

  9. National Energy Board Emergency Management Program : annex to Natural Resources Canada Civil Emergency Plan no. 004

    International Nuclear Information System (INIS)

    Lever, G.; LeMay, R.

    2006-01-01

    As a matter of primary public interest, safety is included in the National Energy Board's (NEB) mandate. The Board is responsible for ensuring companies involved with energy development and pipelines comply with regulations concerning the safety of employees, the public, and the environment. The purpose of the NEB's Emergency Management Program is to establish a prompt and coordinated response to an emergency which occurs at any facility or operation regulated by the NEB; promote safety and security and assure compliance with regulatory requirements in order to protect the public, workers, property and the environment during the life cycle of facilities and operations; and, have a documented set of procedures that accomplish these objectives. The Board ensures that companies identify and manage the potential hazards associated with their facilities; conduct a risk analysis of those hazards; and, manage the risks in order to protect the public and personnel, the security of the facilities and the environment. All companies under the Board's jurisdiction are responsible for developing and maintaining an Emergency Response and Preparedness Program for all aspects of their operations. In the event an emergency occurs, the regulated company is responsible for responding to the emergency and coordinating emergency response activities. Typically, the NEB responds on site to incidents that result in death or serious injury; involve a significant release of hydrocarbons; could result in potential or real impact due to loss of service; pose imminent threats identified by Public Safety and Emergency Preparedness Canada or other agencies; attract significant media attention, or on the advice of Natural Resources Canada or other federal Agencies. The first part of this document described the initial response check list while the second part outlined the Emergency response framework. 2 tabs., 3 figs., 15 appendices

  10. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  11. Internationalilzation of the Firm and its Board

    DEFF Research Database (Denmark)

    Oxelheim, Lars; Gregoric, Aleksandra; Randøy, Trond

    competencies required by firm internationalization positively affect board internationalization, whereas the impact of the internationalization of a firm’s commercial operations is positive but not significant across all model specifications. We find that the higher the number of national board members......, the amount of foreigners on the nomination committee also positively relates to the number of foreigners on the board. Rather than age, the median board tenure negatively impacts the prevalence of foreigners on the supervisory board. This barrier to board internationalization may reflect conservatism, fear...

  12. Microbiological air pollution of production room of the meat processing plant as a potential threat to the workers

    Directory of Open Access Journals (Sweden)

    Barbara Breza-Boruta

    2015-12-01

    Full Text Available Introduction. Production rooms of the meat plants are the specific environment that require constant monitoring of microbiological air purity. Bioaerosols pose a threat to the safety of produced food and a considerable risk to health of exposed workers. The aim of this study was to estimate the air microbiological pollution in production rooms of the meat processing plant and exposure of the workers to biological aerosol. Material and methods. Air samples were collected at 3 stands in production rooms during winter, with the compaction method using the impactor MAS-100. The total number of bacteria and moulds, Staphylococci and bacteria of the family Enterobacteriaceae were determined in the studied bioaerosol. The concentration of microorganisms was presented in the form of colony forming units in 1m3 of air. Results. The highest concentration of mesophylic bacteria was found at stand 1 – at the freezing tunnel; whereas the highest contamination with staphylococci and fungal aerosol was found in the room where several workers were employed at packing frozen food. Among determined fungi predominated moulds of the genera: Penicillium, Alternaria and Cladosporium. Also species of potentially pathogenic fungi which produce toxins and have allergizing properties were detected in the studied bioaerosol. Bacteria of the family Enterobacteriaceae, which also may cause many infavourable health effects in exposed people, occurred at all stands. Conclusion. The concentration level and microbial composition in the inhaled air make valuable information for determination of occupational risk and a potential threat to workers of their workstations. Potentially pathogenic microorganisms present in the studied air (staphylococci, bacteria of the family Enterobacteriaceae and some moulds according to the Directive 2000/54/EC l belong to the 2nd group of risk and threat of harmful biological agents. Identification of biological threats makes it easier for the

  13. PRODUCE BUYING AND MARKETING BOARDS IN NIGERIA: INTERROGATING THE FISCAL ROLE OF WESTERN NIGERIA MARKETING BOARD 1942-1962

    OpenAIRE

    Adeyinka Theresa Ajayi; Ajibade Idowu Samuel; Oladiti Abiodun Akeem

    2017-01-01

    Marketing Board system was one of the mechanisms of British colonial policy in Nigeria. Primary products were channeled through the Boards to Europe at the expense of both the Nigerian state and the farmers, the producers of these commodities. This study examines produce buying via Marketing Boards in Nigeria and specifically interrogates the fiscal role of Western Nigeria Marketing Board. It argues that the Marketing Boards, in spite of their exploitative nature was beneficial to the regiona...

  14. Microbial conversion technologies

    Energy Technology Data Exchange (ETDEWEB)

    Lau, P. [National Research Council of Canada, Ottawa, ON (Canada). Bioconversion and Sustainable Development

    2006-07-01

    Microbes are a biomass and an valuable resource. This presentation discussed microbial conversion technologies along with background information on microbial cells, their characteristics and microbial diversity. Untapped opportunities for microbial conversion were identified. Metagenomic and genome mining approaches were also discussed, as they can provide access to uncultivated or unculturable microorganisms in communal populations and are an unlimited resource for biocatalysts, novel genes and metabolites. Genome mining was seen as an economical approach. The presentation also emphasized that the development of microbial biorefineries would require significant insights into the relevant microorganisms and that biocatalysts were the ultimate in sustainability. In addition, the presentation discussed the natural fibres initiative for biochemicals and biomaterials. Anticipated outputs were identified and work in progress of a new enzyme-retting cocktail to provide diversity and/or consistency in fibre characteristics for various applications were also presented. It was concluded that it is necessary to leverage understanding of biological processes to produce bioproducts in a clean and sustainable manner. tabs., figs.

  15. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  16. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  17. Microbial and Plant-Assisted Bioremediation of Heavy Metal Polluted Environments: A Review

    Directory of Open Access Journals (Sweden)

    Omena Bernard Ojuederie

    2017-12-01

    Full Text Available Environmental pollution from hazardous waste materials, organic pollutants and heavy metals, has adversely affected the natural ecosystem to the detriment of man. These pollutants arise from anthropogenic sources as well as natural disasters such as hurricanes and volcanic eruptions. Toxic metals could accumulate in agricultural soils and get into the food chain, thereby becoming a major threat to food security. Conventional and physical methods are expensive and not effective in areas with low metal toxicity. Bioremediation is therefore an eco-friendly and efficient method of reclaiming environments contaminated with heavy metals by making use of the inherent biological mechanisms of microorganisms and plants to eradicate hazardous contaminants. This review discusses the toxic effects of heavy metal pollution and the mechanisms used by microbes and plants for environmental remediation. It also emphasized the importance of modern biotechnological techniques and approaches in improving the ability of microbial enzymes to effectively degrade heavy metals at a faster rate, highlighting recent advances in microbial bioremediation and phytoremediation for the removal of heavy metals from the environment as well as future prospects and limitations. However, strict adherence to biosafety regulations must be followed in the use of biotechnological methods to ensure safety of the environment.

  18. Microbial and Plant-Assisted Bioremediation of Heavy Metal Polluted Environments: A Review

    Science.gov (United States)

    Ojuederie, Omena Bernard

    2017-01-01

    Environmental pollution from hazardous waste materials, organic pollutants and heavy metals, has adversely affected the natural ecosystem to the detriment of man. These pollutants arise from anthropogenic sources as well as natural disasters such as hurricanes and volcanic eruptions. Toxic metals could accumulate in agricultural soils and get into the food chain, thereby becoming a major threat to food security. Conventional and physical methods are expensive and not effective in areas with low metal toxicity. Bioremediation is therefore an eco-friendly and efficient method of reclaiming environments contaminated with heavy metals by making use of the inherent biological mechanisms of microorganisms and plants to eradicate hazardous contaminants. This review discusses the toxic effects of heavy metal pollution and the mechanisms used by microbes and plants for environmental remediation. It also emphasized the importance of modern biotechnological techniques and approaches in improving the ability of microbial enzymes to effectively degrade heavy metals at a faster rate, highlighting recent advances in microbial bioremediation and phytoremediation for the removal of heavy metals from the environment as well as future prospects and limitations. However, strict adherence to biosafety regulations must be followed in the use of biotechnological methods to ensure safety of the environment. PMID:29207531

  19. GOVERNING BOARD OF THE PENSION FUND

    CERN Multimedia

    2004-01-01

    The Governing Board held its 120th and 121st meetings on 4 November and 2 December 2003 respectively. At the first of these two meetings, the Board first continued its examination of ESO's requests. In connection to this, the Board heard a presentation of the requests by M. Bloch, ESO's Head of Personnel, including a proposal that ESO's contributions and benefits to its beneficiaries be paid in euros. This option had previously been examined by the Working Group on ESO's Requests which had submitted a negative opinion to the Governing Board. Mr Bloch informed the Board that ESO was suspending that request and therefore invited the Governing Board to concentrate on the other options. After some discussion, the Governing Board decided that the euro-based request should be deemed withdrawn and that the Working Group would resume its examination of the other options put forward by ESO at the beginning of the year. At the same meeting, J.-P. Matheys reported on the recent meeting of the Working Group on Actuarial...

  20. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2007-01-01

    The Joint Advisory Appeals Board was convened to examine an internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has requested that the report of the Board and the final decision of the Director-General be brought to the notice of the members of the personnel, in accordance with Article R VI 1.18 of the Staff Regulations. The relevant documents will therefore be posted on the notice board of the Main building (Bldg. 60) from 24 September to 7 October 2007. Human Resources Department

  1. Joint Advisory Appeals Board

    CERN Multimedia

    2003-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mrs Judith Igo-Kemenes concerning the application of procedures foreseen by Administrative Circular N§ 26 (Rev. 3). As the appellant has not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 6 to 20 June 2003. Human Resources Division Tel. 74128

  2. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main Building (Bldg. 500) from 26 May to 6 June 2008. Human Resources Department (73911)

  3. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board was convened to examine an internal appeal lodged by a member of the personnel with regard to the decision not to grant him an indefinite contract. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel, in accordance with Article R VI 1.18 of the Staff Regulations. These documents will therefore be posted on the notice board of the Main Building (Bldg. 60) from 21 January to 3 February 2008. Human Resources Department (73911)

  4. Corporate boards and bank loan contracting

    OpenAIRE

    Francis, Bill; Hasan, Iftekhar; Koetter, Michael; Wu, Qiang

    2012-01-01

    We investigate the role of corporate boards in bank loan contracting. We find that when corporate boards are more independent, both price and nonprice loan terms (e.g., interest rates, collateral, covenants, and performance-pricing provisions) are more favorable, and syndicated loans comprise more lenders. In addition, board size, audit committee structure, and other board characteristics influence bank loan prices. However, they do not consistently affect all nonprice loan terms except for a...

  5. Cultural differences and board gender diversity

    OpenAIRE

    Carrasco , Amélia; Francoeur , Claude; Réal , Isabelle; Laffarga , Joaquina; Ruiz-Barbadillo , Emiliano

    2012-01-01

    International audience; As evidence of the continuing interest raised by "board gender diversity", major studies (Catalyst, 2008; World Economic Forum, 2010; European Board Diversity Analysis, 2010) were recently carried out and have all led to reports confirming the imbalance of women on boards and the need to address this issue. Moreover, our analysis of these reports indicates that the low proportion of women observed on corporate boards varies across countries, which raises the question a...

  6. Statement by the outgoing Chairperson of the Board of Governors regarding the working arrangements of the Board

    International Nuclear Information System (INIS)

    2009-01-01

    At the request of the outgoing Chairperson of the Board of Governors, her statement delivered in the Board of Governors meeting on 22 September 2009, regarding the working arrangements of the Board, is reproduced herewith for information

  7. The relationship between top management team – outside board conflict and outside board service involvement in high-tech start-ups

    OpenAIRE

    Vandenbrouke, Elien; Knockaert, Mirjam; Ucbasaran, Deniz

    2017-01-01

    Corporate governance research has extensively studied the relationship between outside board characteristics and outside board involvement. We add to this literature by investigating the extent to which interactions between outside board members and the top management team (TMT) affect the functioning of the outside board. Building on conflict theory, our study shows how conflict between TMT and outside board is an important antecedent for outside board service involvement. Specifically, draw...

  8. Board Size, Non-Executive Board Members and Financial Performance in Non-Usury Banks in Iran

    Directory of Open Access Journals (Sweden)

    GholamReza Karami

    2016-07-01

    Full Text Available Prior studies investigating the relation between the financial performance and corporate governance mechanisms for firms in Tehran Stock Exchange mainly exclude banks due to their different types of rules and structure. We study the relation between corporate governance structure and financial performance of the banks under the non-usury banking act. We study various corporate governance factors including board size and the number of non-executive board members using a sample of 21 banks for 2010 to 2012. Result show a significant positive correlation among board size and financial performance. However, non-executive board members do not correlate with financial performance.

  9. DOE's Environmental Management Site-Specific Advisory Board: The Roles, Work, and Assessment of the Constituent Local Boards - 13587

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, Catherine [U.S. Dept. of Energy, Office of Environmental Management, Office of Intergovernmental and Community Activities, 1000 Independence Avenue, S.W.,Washington, D.C. 20585 (United States); Freeman, Jenny [Strata-G, LLC, 2027 Castaic Lane, Knoxville, TN 37932 (United States); Cantrell, Yvette [Restoration Services, Inc., 136 Mitchell Road, Oak Ridge, TN 37830 (United States)

    2013-07-01

    The charter for the Department of Energy's Environmental Management (EM) Site-Specific Advisory Board (SSAB) was approved under the Federal Advisory Committee Act (FACA) in 1994. With a unique mandate to provide public input on issues associated with the cleanup of nuclear legacy sites in the U.S., the EM SSAB comprises eight local boards, which are based at major EM sites. While each board is unique to the community in which it is located and reflects the diversity of the local population, the boards are governed by FACA, related regulations, and DOE policies that are intended to standardize agency advisory board operations. The EM SSAB local boards are made up of a diverse group of citizens who want to understand the mission and goals of the EM program and to help EM achieve those goals for the benefit of their communities. Some are quite passionate about their mission; others need to be coaxed into active participation. Maintaining productive relationships and a supportive environment for effective board operations is the challenge of board management for DOE EM and the board members themselves. DOE draws on research findings and best practices literature from academics and practitioners in the field of public involvement in its board management practices. The EM SSAB is also evaluated annually under the law to ensure that the investment of taxpayer dollars in the board is warranted in light of the contributions of the board. Further evaluation takes place at the agency and site levels in order to identify what aspects of board functioning the agency and board members find important to its success and to address areas where improvement is needed. Board contributions, compliance factors, and measurable outcomes related to board products and process areas are key to agency commitment to ongoing support of the boards and to participant satisfaction and thus continued member involvement. In addition to evaluation of these factors in improving board

  10. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  11. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  12. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  13. Optimal back-to-front airplane boarding

    Science.gov (United States)

    Bachmat, Eitan; Khachaturov, Vassilii; Kuperman, Ran

    2013-06-01

    The problem of finding an optimal back-to-front airplane boarding policy is explored, using a mathematical model that is related to the 1+1 polynuclear growth model with concave boundary conditions and to causal sets in gravity. We study all airplane configurations and boarding group sizes. Optimal boarding policies for various airplane configurations are presented. Detailed calculations are provided along with simulations that support the main conclusions of the theory. We show that the effectiveness of back-to-front policies undergoes a phase transition when passing from lightly congested airplanes to heavily congested airplanes. The phase transition also affects the nature of the optimal or near-optimal policies. Under what we consider to be realistic conditions, optimal back-to-front policies lead to a modest 8-12% improvement in boarding time over random (no policy) boarding, using two boarding groups. Having more than two groups is not effective.

  14. Optimal back-to-front airplane boarding.

    Science.gov (United States)

    Bachmat, Eitan; Khachaturov, Vassilii; Kuperman, Ran

    2013-06-01

    The problem of finding an optimal back-to-front airplane boarding policy is explored, using a mathematical model that is related to the 1+1 polynuclear growth model with concave boundary conditions and to causal sets in gravity. We study all airplane configurations and boarding group sizes. Optimal boarding policies for various airplane configurations are presented. Detailed calculations are provided along with simulations that support the main conclusions of the theory. We show that the effectiveness of back-to-front policies undergoes a phase transition when passing from lightly congested airplanes to heavily congested airplanes. The phase transition also affects the nature of the optimal or near-optimal policies. Under what we consider to be realistic conditions, optimal back-to-front policies lead to a modest 8-12% improvement in boarding time over random (no policy) boarding, using two boarding groups. Having more than two groups is not effective.

  15. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  16. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  17. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  18. Microbial contamination in 20-peso banknotes in Monterrey, Mexico.

    Science.gov (United States)

    Rocha-Gámez, Judith; Tejeda-Villarreal, Paula Nelly; Macías-Cárdenas, Patricia; Canizales-Oviedo, Jorge; Garza-González, Elvira; Ramírez-Villarreal, Elsa Guadalupe

    2012-09-01

    The authors' aim was to isolate and identify bacteria or yeast that may be present on the surface of 20-peso banknotes from the metropolitan area of Monterrey, Mexico. They randomly studied a total of 70 20-peso banknotes for the presence of bacteria and species of Candida by conventional methods. Out of the 70 banknotes, 48 (69%) were found to be contaminated. The most prevalent species observed was Candida kruseii (19 bills, 27%) followed by Burkholderia cepacia (9 bills, 13%); 22 (31%) bills showed no growth. Of the 48 contaminated bills, four (5.7%) yielded bacteria considered pathogenic and the other 44 bills (63%) yielded bacteria considered potentially pathogenic. Eleven bills showed more than one microbial species. The results of the authors' study show that contamination occurs on paper currency in the metropolitan area of Monterrey. The authors' findings provide evidence that currency banknotes may represent a threat to human health.

  19. Microbial Inoculants and Their Impact on Soil Microbial Communities: A Review

    Directory of Open Access Journals (Sweden)

    Darine Trabelsi

    2013-01-01

    Full Text Available The knowledge of the survival of inoculated fungal and bacterial strains in field and the effects of their release on the indigenous microbial communities has been of great interest since the practical use of selected natural or genetically modified microorganisms has been developed. Soil inoculation or seed bacterization may lead to changes in the structure of the indigenous microbial communities, which is important with regard to the safety of introduction of microbes into the environment. Many reports indicate that application of microbial inoculants can influence, at least temporarily, the resident microbial communities. However, the major concern remains regarding how the impact on taxonomic groups can be related to effects on functional capabilities of the soil microbial communities. These changes could be the result of direct effects resulting from trophic competitions and antagonistic/synergic interactions with the resident microbial populations, or indirect effects mediated by enhanced root growth and exudation. Combination of inoculants will not necessarily produce an additive or synergic effect, but rather a competitive process. The extent of the inoculation impact on the subsequent crops in relation to the buffering capacity of the plant-soil-biota is still not well documented and should be the focus of future research.

  20. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  1. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  2. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  3. VME bus based microcomputer system boards

    International Nuclear Information System (INIS)

    Chandra, A.K.; Ganesh, G.; Mayya, Anuradha; Chachondia, A.S.; Premraj, M.K.

    1991-01-01

    Several operator information systems for nuclear plants has been developed in the Division and these have involved extensive use of microcomputer boards for achieving various functions. Standard VME bus based boards have been developed to provide the most used functions. These boards have been fabricated and tested and used in several systems including Channel Temperature Monitoring systems, Disturbance Recording Systems etc. and are also proposed to be used in additional systems under developement. The use of standard bus and boards provides considerable savings in engineering time, prototyping, testing and evaluation costs, and maintenance support. This report desribes the various boards developed and the functions available on each. (author). 4 refs., 11 figs., 3 appendixes

  4. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  5. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  6. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  7. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  8. Molecular microbial ecology manual

    NARCIS (Netherlands)

    Kowalchuk, G.A.; Bruijn, de F.J.; Head, I.M.; Akkermans, A.D.L.

    2004-01-01

    The field of microbial ecology has been revolutionized in the past two decades by the introduction of molecular methods into the toolbox of the microbial ecologist. This molecular arsenal has helped to unveil the enormity of microbial diversity across the breadth of the earth's ecosystems, and has

  9. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  10. From Global Firms to Global Boards?

    DEFF Research Database (Denmark)

    Thomsen, Steen; Gregoric, Aleksandra; Randøy, Trond

    2011-01-01

    . This indicates some support for the view that different kinds of firm internationalization – commercial versus financial - might lead to different types of board internationalization. We find no evidence that the internationalization of boards is limited by the conservatism of existing national board members...

  11. Gender Distribution Among American Board of Medical Specialties Boards of Directors.

    Science.gov (United States)

    Walker, Laura E; Sadosty, Annie T; Colletti, James E; Goyal, Deepi G; Sunga, Kharmene L; Hayes, Sharonne N

    2016-11-01

    Since 1995, women have comprised more than 40% of all medical school graduates. However, representation at leadership levels in medicine remains considerably lower. Gender representation among the American Board of Medical Specialties (ABMS) boards of directors (BODs) has not previously been evaluated. Our objective was to determine the relative representation of women on ABMS BODs and compare it with the in-training and in-practice gender composition of the respective specialties. The composition of the ABMS BODs was obtained from websites in March 2016 for all Member Boards. Association of American Medical Colleges and American Medical Association data were utilized to identify current and future trends in gender composition. Although represented by a common board, neurology and psychiatry were evaluated separately because of their very different practices and gender demographic characteristics. A total of 25 specialties were evaluated. Of the 25 specialties analyzed, 12 BODs have proportional gender representation compared with their constituency. Seven specialties have a larger proportion of women serving on their boards compared with physicians in practice, and 6 specialties have a greater proportion of men populating their BODs. Based on the most recent trainee data (2013), women have increasing workforce representation in almost all specialties. Although women in both training and practice are approaching equal representation, there is variability in gender ratios across specialties. Directorship within ABMS BODs has a more equitable gender distribution than other areas of leadership in medicine. Further investigation is needed to determine the reasons behind this difference and to identify opportunities to engage women in leadership in medicine. Copyright © 2016 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.

  12. Education Unit Transformation for Maintain Its Existence in Islamic Boarding School (Multi-Case Study on Tebuireng Islamic Boarding School, Gading Islamic Boarding School Malang, and Sidogiri Islamic Boarding School Pasuruan)

    Science.gov (United States)

    Busyairi AS, M.

    2017-01-01

    Islamic Boarding School which serves as native Islamic education institution is a continuation of education tradition grown strongly in Islamization history in unitary nation Republic of Indonesia. The education of Islamic Boarding School is also a sub-system of National Education with the purpose to make intelligent national life, to make…

  13. 14 CFR 250.8 - Denied boarding compensation.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Denied boarding compensation. 250.8 Section... PROCEEDINGS) ECONOMIC REGULATIONS OVERSALES § 250.8 Denied boarding compensation. (a) Every carrier shall tender to a passenger eligible for denied boarding compensation, on the day and place the denied boarding...

  14. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  15. Microbial electrosynthetic cells

    Energy Technology Data Exchange (ETDEWEB)

    May, Harold D.; Marshall, Christopher W.; Labelle, Edward V.

    2018-01-30

    Methods are provided for microbial electrosynthesis of H.sub.2 and organic compounds such as methane and acetate. Method of producing mature electrosynthetic microbial populations by continuous culture is also provided. Microbial populations produced in accordance with the embodiments as shown to efficiently synthesize H.sub.2, methane and acetate in the presence of CO.sub.2 and a voltage potential. The production of biodegradable and renewable plastics from electricity and carbon dioxide is also disclosed.

  16. Governing Board of the Pension Fund

    CERN Document Server

    2004-01-01

    The Governing Board of the Pension Fund held its one-hundred-and-twenty-seventh meeting on 4, 5 and 6 October. During the meeting, the Governing Board heard a report by the actuary on the Actuarial Review as at 1 January 2004. The Governing Board then examined the conclusions to be drawn and the action to be taken as a result of the Review. During its first half-day meeting the Board heard a report on the meetings of the CERN Finance Committee and Council on 15 and 16 September. As a result, the Board asked its Chairman to consult the President of the CERN Council in order to find out about the terms of reference and the composition of the working group on pensions set up by the Council. Next the Board examined a request for compensation to the Fund for the reduction in active members between 2001 and 2003. It was the third such request which the Governing Board would be making to the CERN Council following the latter's 1995 decision to reduce staff numbers. The request related to the previous three years (...

  17. Currency Boards; The Ultimate Fix?

    OpenAIRE

    Atish R. Ghosh

    1998-01-01

    The growing integration of world capital markets has made it fashionable to argue that only extreme exchange rate regimes are sustainable. Short of adopting a common currency, currency board arrangements represent the most extreme form of exchange rate peg. This paper compares the macroeconomic performance of countries with currency boards to those with other forms of pegged exchange rate regime. Currency boards are indeed associated with better inflation performance, even allowing for potent...

  18. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  19. Microbial Energy Conversion

    Energy Technology Data Exchange (ETDEWEB)

    Buckley, Merry [American Society for Microbiology (ASM), Washington, DC (United States); Wall, Judy D. [Univ. of Missouri, Columbia, MO (United States)

    2006-10-01

    The American Academy of Microbiology convened a colloquium March 10-12, 2006, in San Francisco, California, to discuss the production of energy fuels by microbial conversions. The status of research into various microbial energy technologies, the advantages and disadvantages of each of these approaches, research needs in the field, and education and training issues were examined, with the goal of identifying routes for producing biofuels that would both decrease the need for fossil fuels and reduce greenhouse gas emissions. Currently, the choices for providing energy are limited. Policy makers and the research community must begin to pursue a broader array of potential energy technologies. A diverse energy portfolio that includes an assortment of microbial energy choices will allow communities and consumers to select the best energy solution for their own particular needs. Funding agencies and governments alike need to prepare for future energy needs by investing both in the microbial energy technologies that work today and in the untested technologies that will serve the world’s needs tomorrow. More mature bioprocesses, such as ethanol production from starchy materials and methane from waste digestors, will find applications in the short term. However, innovative techniques for liquid fuel or biohydrogen production are among the longer term possibilities that should also be vigorously explored, starting now. Microorganisms can help meet human energy needs in any of a number of ways. In their most obvious role in energy conversion, microorganisms can generate fuels, including ethanol, hydrogen, methane, lipids, and butanol, which can be burned to produce energy. Alternatively, bacteria can be put to use in microbial fuel cells, where they carry out the direct conversion of biomass into electricity. Microorganisms may also be used some day to make oil and natural gas technologies more efficient by sequestering carbon or by assisting in the recovery of oil and

  20. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel against the decision to grant him only a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main building (bldg. 500) from 1 September to 14 September 2008. Human Resources Department (73911)

  1. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel with regard to the decision not to award him a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the notice of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main building (Bldg. 500) from 17 March to 30 March 2008. Human Resources Department Tel. 73911

  2. Joint Advisory Appeals Board

    CERN Multimedia

    HR Department

    2008-01-01

    The Joint Advisory Appeals Board has examined the internal appeal lodged by a member of the personnel against the decision to grant him only a periodic one-step advancement for the 2006 reference year. The person concerned has not objected to the report of the Board and the final decision of the Director-General being brought to the attention of the members of the personnel. In application of Article R VI 1.18 of the Staff Regulations, these documents will therefore be posted on the notice board of the Main Building (Bldg. 500) from 1 September to 14 September 2008. Human Resources Department (73911)

  3. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  4. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  5. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  6. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  7. 33 CFR 401.90 - Boarding for inspections.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Boarding for inspections. 401.90... OF TRANSPORTATION SEAWAY REGULATIONS AND RULES Regulations General § 401.90 Boarding for inspections... approved means of boarding. Pigeon holes are not accepted as a means of boarding and an alternate safe...

  8. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  9. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  10. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  11. Microbial bioinformatics 2020.

    Science.gov (United States)

    Pallen, Mark J

    2016-09-01

    Microbial bioinformatics in 2020 will remain a vibrant, creative discipline, adding value to the ever-growing flood of new sequence data, while embracing novel technologies and fresh approaches. Databases and search strategies will struggle to cope and manual curation will not be sustainable during the scale-up to the million-microbial-genome era. Microbial taxonomy will have to adapt to a situation in which most microorganisms are discovered and characterised through the analysis of sequences. Genome sequencing will become a routine approach in clinical and research laboratories, with fresh demands for interpretable user-friendly outputs. The "internet of things" will penetrate healthcare systems, so that even a piece of hospital plumbing might have its own IP address that can be integrated with pathogen genome sequences. Microbiome mania will continue, but the tide will turn from molecular barcoding towards metagenomics. Crowd-sourced analyses will collide with cloud computing, but eternal vigilance will be the price of preventing the misinterpretation and overselling of microbial sequence data. Output from hand-held sequencers will be analysed on mobile devices. Open-source training materials will address the need for the development of a skilled labour force. As we boldly go into the third decade of the twenty-first century, microbial sequence space will remain the final frontier! © 2016 The Author. Microbial Biotechnology published by John Wiley & Sons Ltd and Society for Applied Microbiology.

  12. SVX Sequencer Board

    International Nuclear Information System (INIS)

    Utes, M.

    1997-01-01

    The SVX Sequencer boards are 9U by 280mm circuit boards that reside in slots 2 through 21 of each of eight Eurocard crates in the D0 Detector Platform. The basic purpose is to control the SVX chips for data acquisition and when a trigger occurs, to gather the SVX data and relay the data to the VRB boards in the Movable Counting House. Functions and features are as follows: (1) Initialization of eight SVX chip strings using the MIL-STD-1553 data bus; (2) Real time manipulation of the SVX control lines to effect data acquisition, digitization, and readout based on the NRZ/Clock signals from the Controller; (3) Conversion of 8-bit electrical SVX readout data to an optical signal operating at 1.062 Gbit/sec, sent to the VRB. Eight HDIs will be serviced per board; (4) Built-in logic analyzer which can record the most important control and data lines during a data acquisition cycle and put this recorded information onto the 1553 bus; (5) Identification header and end of data trailer tacked onto data stream; (6) 1553 register which can read the current values of the control and data lines; (7) 1553 register which can test the optical link; (8) 1553 registers for crossing pulse width, calibration pulse voltage, and calibration pipeline select; (9) 1553 register for reading the optical drivers status link; (10) 1553 register for power control of SVX chips and ignoring bad SVX strings; (11) Front panel displays and LEDs show the board status at a glance; (12) In-system programmable EPLDs are programmed via 1553 or Altera's 'Bitblaster'; (13) Automatic readout abort after 45us; (14) Supplies BUSY signal back to Trigger Framework; (15) Supports a heartbeat system to prevent excessive SVX current draw; and (16) Supports a SVX power trip feature if heartbeat failure occurs.

  13. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  14. Optimal boarding method for airline passengers

    Energy Technology Data Exchange (ETDEWEB)

    Steffen, Jason H.; /Fermilab

    2008-02-01

    Using a Markov Chain Monte Carlo optimization algorithm and a computer simulation, I find the passenger ordering which minimizes the time required to board the passengers onto an airplane. The model that I employ assumes that the time that a passenger requires to load his or her luggage is the dominant contribution to the time needed to completely fill the aircraft. The optimal boarding strategy may reduce the time required to board and airplane by over a factor of four and possibly more depending upon the dimensions of the aircraft. I explore some features of the optimal boarding method and discuss practical modifications to the optimal. Finally, I mention some of the benefits that could come from implementing an improved passenger boarding scheme.

  15. Teacher quality: a comparison of National Board-certified and non-Board-certified teachers of deaf students.

    Science.gov (United States)

    Scheetz, Nanci A; Martin, David S

    2006-01-01

    THE STUDY was designed to identify specific components of teacher excellence, focusing initially on the characteristics of the small number of teachers of the deaf who are certified by the National Board for Professional Teaching Standards (NBPTS), then comparing those with the characteristics of other teachers identified as master teachers by university faculty in teacher preparation in deafness. Classroom observation, written lesson plans, teacher questionnaires on beliefs, and content analysis of interactive electronic focus groups were used to compare the two groups of teachers. Results indicated similarities between Board-certified and non-Board-certified master teachers in regard to teacher behaviors and commitment to well-founded pedagogical principles. Differences were found in classroom priorities and in the greater level of interconnectivity expressed by Board-certified teachers as the result of becoming Board certified. Recommendations are made for preparing teachers of deaf students.

  16. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  17. Are board meetings proactive or reactive to performance?

    Directory of Open Access Journals (Sweden)

    Yi Wang

    2008-11-01

    Full Text Available The purpose of this paper is to investigate the relationship between the intensity of board activity, as represented by board meeting frequency, and firm financial performance, using data from the top 500 Australian companies. Firm performance measures include return on assets, return on equity and shareholder return; several control variables are introduced in the analysis. The results indicate that board meeting frequency has a positive impact on subsequent shareholder return. Regarding the explanatory factors for the level of board activity, it is reported that firms with more board committees tend to have relatively more board and committee meetings; firms with larger boards have less board meetings. In addition, lower managerial ownership leads to more committee meetings.

  18. 12 CFR 907.12 - Finance Board procedures.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Finance Board procedures. 907.12 Section 907.12 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS PROCEDURES Case-by-Case Determinations; Review of Disputed Supervisory Determinations § 907.12 Finance Board procedures. (a) Notice of Receipt...

  19. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  20. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  1. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  2. 42 CFR 426.489 - Board remands.

    Science.gov (United States)

    2010-10-01

    ... decision; and (2) Explains why the case is being remanded and the specific actions ordered by the Board. (b) Action by an ALJ on remand. An ALJ takes any action that is ordered by the Board and may take any additional action that is not inconsistent with the Board's remand order. ...

  3. 39 CFR 3.2 - Compensation of Board.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Compensation of Board. 3.2 Section 3.2 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE BOARD OF GOVERNORS (ARTICLE III) § 3.2 Compensation of Board. Section 202(a)(1) of title 39 provides for the compensation of...

  4. Presidential Search: An Overview for Board Members

    Science.gov (United States)

    Association of Governing Boards of Universities and Colleges, 2012

    2012-01-01

    The selection of a president is a governing board's most important responsibility, and the search process is the board's best opportunity to help guide its institution into a successful new era. This guide outlines the leadership roles during a search (those of the board, the board chair, the search committee, and others), briefs board…

  5. 12 CFR 985.4 - Finance Board oversight.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Finance Board oversight. 985.4 Section 985.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD OFFICE OF FINANCE THE OFFICE OF FINANCE § 985.4 Finance Board oversight. (a) Oversight and enforcement actions. The Finance Board shall have the same regulatory oversight authority and enforcement powers...

  6. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  7. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  8. Boarding school rules.

    Science.gov (United States)

    Griffiths, Matt

    2017-01-04

    Ofsted inspects and regulates services that care for children and young people, including boarding facilities. Medication management is an integral part of caring for children in boarding schools, and robust systems must be in place to pass inspection. These systems must cover how medicines are dispensed, administered and stored at the facility, risk assessments, identifying which pupils can manage their own medicines and the individual health needs of boarders, so that care plans can be put in place for children with specific needs.

  9. Hepatitis C Virus in North Africa: An Emerging Threat

    Directory of Open Access Journals (Sweden)

    Mohamed A. Daw

    2016-01-01

    Full Text Available Hepatitis C virus is a major public health threat associated with serious clinical consequences worldwide. North Africa is a unique region composed of seven countries that vary considerably in the predisposing factors to microbial diseases both historically and at the present time. The dynamics of HCV in the region are not well documented. The data are both limited and controversial in most of the countries in the region. In North Africa, the epidemiology of HCV is disparate and understanding it has been hampered by regional “epidemiological homogeneity” concepts. As the dynamics of HCV vary from country to country, context-specific research is needed. In this review, we assess studies performed in each country in the general populations as well as among blood donors and groups exposed to the HCV infection. The reported prevalence of HCV ranges from 0.6% to 8.4% in the Maghreb countries and is predominated by genotype 1. In the Nile valley region, it ranges from 2.2% to 18.9% and is dominated by genotype 4. In North African countries, HCV seems to be a serious problem that is driven by different vectors even in different geographical locations within the same country. Efforts should be combined at both the national and regional levels to implement efficient preventive and treatment strategies.

  10. 11 Soil Microbial Biomass

    African Journals Online (AJOL)

    186–198. Insam H. (1990). Are the soil microbial biomass and basal respiration governed by the climatic regime? Soil. Biol. Biochem. 22: 525–532. Insam H. D. and Domsch K. H. (1989). Influence of microclimate on soil microbial biomass. Soil Biol. Biochem. 21: 211–21. Jenkinson D. S. (1988). Determination of microbial.

  11. 46 CFR 78.90-1 - Pilot boarding operation.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Pilot boarding operation. 78.90-1 Section 78.90-1... Boarding Operations § 78.90-1 Pilot boarding operation. (a) The master shall ensure that pilot boarding... instructions. (b) The master shall ensure compliance with the following during pilot boarding operations: (1...

  12. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  13. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  14. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  15. JOINT ADVISORY APPEALS BOARD

    CERN Multimedia

    Human Resources Division

    2001-01-01

    The Joint Advisory Appeals Board was convened to examine the appeal lodged by Mr Neil Calder, Mrs Sudeshna Datta Cockerill, Mrs Andrée Fontbonne, Mrs Moniek Laurent and Mr Ulrich Liptow with regard to membership in the Pension Fund under the period with a Paid Associate contract, appeals dealt with on a collective basis. As the appellants have not objected, the report of the Board and the final decision of the Director-General are brought to the notice of the personnel in accordance with Article R VI 1.20 of the Staff Regulations. The relevant documents will therefore be posted on the notice boards of the Administration Building (N° 60) from 10 to 31 August 2001.

  16. MBGD update 2013: the microbial genome database for exploring the diversity of microbial world.

    Science.gov (United States)

    Uchiyama, Ikuo; Mihara, Motohiro; Nishide, Hiroyo; Chiba, Hirokazu

    2013-01-01

    The microbial genome database for comparative analysis (MBGD, available at http://mbgd.genome.ad.jp/) is a platform for microbial genome comparison based on orthology analysis. As its unique feature, MBGD allows users to conduct orthology analysis among any specified set of organisms; this flexibility allows MBGD to adapt to a variety of microbial genomic study. Reflecting the huge diversity of microbial world, the number of microbial genome projects now becomes several thousands. To efficiently explore the diversity of the entire microbial genomic data, MBGD now provides summary pages for pre-calculated ortholog tables among various taxonomic groups. For some closely related taxa, MBGD also provides the conserved synteny information (core genome alignment) pre-calculated using the CoreAligner program. In addition, efficient incremental updating procedure can create extended ortholog table by adding additional genomes to the default ortholog table generated from the representative set of genomes. Combining with the functionalities of the dynamic orthology calculation of any specified set of organisms, MBGD is an efficient and flexible tool for exploring the microbial genome diversity.

  17. Women on professional society and journal editorial boards.

    Science.gov (United States)

    Morton, Melinda J; Sonnad, Seema S

    2007-07-01

    Membership on a professional medical society or journal editorial board is a marker of influence and prestige for those in academic medicine. This study presents the first comprehensive quantification of women on these boards and the implications for women in medicine. The numbers of women and men on professional society and journal editorial boards across 28 specialties (March 2004) were counted. The number of women holding multiple roles on these boards and the number of women holding top leadership positions on these boards were counted, and these proportions were compared. Three-thousand-four-hundred-seventy-three individuals on 39 professional medical society boards and 54 journal editorial boards were included. Eighty-three percent (2,884) of board members were male. Men occupied > 80% of top leadership positions on these boards. Thirty-five of the 589 women in the study held multiple roles. Anesthesiology (p women on boards in comparison to the total women in the specialty. Internal medicine, plastic surgery, cardiology and general surgery had nearly equivalent proportions; in otolaryngology and family medicine, female board members slightly exceeded the proportion of women in the field. Women's representation on society and editorial boards does not always reflect their presence in medical specialties, and it is critically lacking in certain specialties. Efforts should be made to attain parity of women leaders on these boards. Further efforts should be made to eliminate barriers to women's leadership in medicine.

  18. Microbial ecology of terrestrial Antarctica: Are microbial systems at risk from human activities?

    Energy Technology Data Exchange (ETDEWEB)

    White, G.J.

    1996-08-01

    Many of the ecological systems found in continental Antarctica are comprised entirely of microbial species. Concerns have arisen that these microbial systems might be at risk either directly through the actions of humans or indirectly through increased competition from introduced species. Although protection of native biota is covered by the Protocol on Environmental Protection to the Antarctic Treaty, strict measures for preventing the introduction on non-native species or for protecting microbial habitats may be impractical. This report summarizes the research conducted to date on microbial ecosystems in continental Antarctica and discusses the need for protecting these ecosystems. The focus is on communities inhabiting soil and rock surfaces in non-coastal areas of continental Antarctica. Although current polices regarding waste management and other operations in Antarctic research stations serve to reduce the introduction on non- native microbial species, importation cannot be eliminated entirely. Increased awareness of microbial habitats by field personnel and protection of certain unique habitats from physical destruction by humans may be necessary. At present, small-scale impacts from human activities are occurring in certain areas both in terms of introduced species and destruction of habitat. On a large scale, however, it is questionable whether the introduction of non-native microbial species to terrestrial Antarctica merits concern.

  19. Atomic Energy Control Board

    International Nuclear Information System (INIS)

    Blackman, N.S.; Gummer, W.K.

    1982-02-01

    This paper has been prepared to provide an overview of the responsibilities and activities of the Atomic Energy Control Board. It is designed to address questions that are often asked concerning the establishment of the Atomic Energy Control Board, its enabling legislation, licensing and compliance activities, federal-provincial relationships, international obligations, and communications with the public

  20. An agenda for board research

    Directory of Open Access Journals (Sweden)

    Sandra Guerra

    2008-01-01

    Full Text Available Scholarly investigations on the board of directors, although intense from the mid-1990s onward, did not lead to entirely convincing results. This study proposes discussion on building a multidisciplinary and integrated theoretical framework able to capture the complexity and distinctive dimensions of the board as a group decision-making process. This is achieved through an essay developed from analytical and descriptive review of the literature. A synthesis on board research is presented, aiming to understand theoretical models lenses used to study corporate governance issues. The strengths and weaknesses of these models are pointed out, and their influence on board investigation is observed. This essay concludes by proposing a research agenda that considers the addition of psychological and sociological approaches to economic models of the analysis of group decision-making

  1. How well-run boards make decisions.

    Science.gov (United States)

    Useem, Michael

    2006-11-01

    In the aftermath of seismic debacles like those that toppled Enron and WorldCom, corporate boards have been shaken up and made over. More directors are independent these days, for instance, and corporations now disclose directors' salaries and committee members' names. Research shows that most of the changes are having a positive effect on companies' performance. They are primarily structural, though, and don't go to the heart of a board's work: making the choices that shape a firm's future. Which decisions boards own and how those calls are made are largely hidden from the public. As a result, boards are often unable to learn from the best governance practices of their counterparts at other companies. This article pulls back the curtain and provides an inside look. Drawing on interviews with board members and executives at 31 companies, along with a close examination of three boardroom decisions, the author identifies several formal processes that can help companies improve their decision making: creating calendars that specify when the board and the standing committees will consider key items; drafting charters that define the decisions committees are responsible for; and developing decision protocols that divvy up responsibilities between directors and executives. The author also identifies a number of informal decision-making principles: Items that are strategically significant and touch on the firm's core values should go to the board. Large decisions should be divided into small pieces, so the board can devote sufficient attention to each one. Directors must remain vigilant to ensure that their decisions are effectively implemented. The CEO and either the nonexecutive chair or the lead director should engage in ongoing dialogue regarding which decisions to take to the full board and when. And directors should challenge assumptions before making yes-or-no decisions on management proposals.

  2. 12 CFR 980.6 - Finance Board consent.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Finance Board consent. 980.6 Section 980.6 Banks and Banking FEDERAL HOUSING FINANCE BOARD NEW FEDERAL HOME LOAN BANK ACTIVITIES NEW BUSINESS ACTIVITIES § 980.6 Finance Board consent. The Finance Board may at any time provide consent for a Bank to undertake a particular new business activity and...

  3. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  4. Governing Board of the Pension Fund

    CERN Multimedia

    2005-01-01

    The Governing Board of the Pension Fund held its one-hundred-and-thirtieth meeting on 18 January 2005. At the meeting, it took note of the Preliminary Draft Report by the CERN Council Working Group on the procedures for the appointment of the Chairman and the terms of office of members appointed by the Council to the Governing Board of the Pension Fund (Osnes Report). As the report constituted a preliminary version, the Governing Board took the view that it was not appropriate for it to state its position on the content for the time being, especially since some aspects, particularly those relating to the procedure for the appointment of the Council's representatives fell within the latter's remit. Nevertheless, given that a number of the issues raised in the report also related to the general operation of the bodies of the Pension Fund (Governing Board, Investment Committee, Administrator), the Governing Board instructed its Chairman, J. Bezemer, to inform the Council, at its session in March, that the Board...

  5. GOVERNING BOARD OF THE PENSION FUND

    CERN Multimedia

    2002-01-01

    The Governing Board held its 108th and 109th meetings on 5 February and 5 March respectively. At the first of these meetings, the Board heard a report by its Chairman, P. Levaux, on the CERN Council Session of December 2001. The Chairman reported that the Board that the 0.8% adjustment of pensions proposed by the Governing Board had been accepted as well as an amendment to the Rules of the Fund reducing the period of service required for entitlement to a deferred retirement pension from 10 to 5 years. The Governing Board also heard a report by the Chairman of the Investment Committee, G. Maurin, on the Committee's two January meetings. At the first of these, the Committee had addressed its structure and operating methods. Various proposals had been put forward aimed at increasing the Committee's efficiency and response time. Specific proposals will be submitted to the Governing Board during the year. In addition, on the basis of two specially commissioned studies, the Committee had examined the issue of curre...

  6. 4 CFR 22.2 - Board Consideration [Rule 2].

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Board Consideration [Rule 2]. 22.2 Section 22.2 Accounts... OFFICE CONTRACT APPEALS BOARD § 22.2 Board Consideration [Rule 2]. (a) Offices. The office of the Board... consideration of a matter by all members of the Contract Appeals Board will not be granted in any appeal filed...

  7. Panel Board From Coconut Fibre And Pet Bottle

    Science.gov (United States)

    Ngadiman, Norhayati; Kaamin, Masiri; Abd. Kadir, Aslila; Sahat, Suhaila; Zaini, Aziza; Raihana Nor Zentan, Siti; Ain Ahmad, Nur; Amran, Wan Haizatul Aisyhah Wan

    2018-03-01

    The rate of global deforestation and its impact on the environment has led particle board manufacture to search for alternative feedstock, especially in countries where wood is less available compared to other cellulosic natural product. Based on the properties of coconut fibre and PET bottle, these two materials can be recycle as raw material for manufacture of panel board. As for this study, the coconut fibre were used as the filler and PET bottle as outer lining of the panel board. Two types of coconut fibre were used which are grinding and un-grinding coconut fibre. At first, the coconut fibre are undergoes softening, grinding, drying and sieving process, while PET bottle was cleaning, shredding, sieving before compacted using hydraulic hot press machine. There are four types of testing that been carried out which are swelling, water absorption, Modulus of Elasticity (MOE) and Modulus of Rupture (MOR). The result show the conventional board has the highest value for MOE test, so it's indicate that the conventional board is less strength from the coconut fibre board. As for water absorption test, the average water absorption of coconut fibre based panel board is less than conventional board. Overall, the coconut fibre board is better than conventional panel board because coconut fibre board are less swelling, has low water absorption, high modulus of rupture and low modulus of elasticity. Based on the finding, this coconut fibre panel board has potential as a stronger and long-lasting panel board than the conventional board in the market. Other than that, the panel also have their own aesthetic value since the recycled plastic bottle used as outer lining is colourful and giving aesthetic value.

  8. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  9. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  10. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  11. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  12. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  13. Board self-evaluation: the Bayside Health experience.

    Science.gov (United States)

    Duncan-Marr, Alison; Duckett, Stephen J

    2005-08-01

    Board evaluation is a critical component of good governance in any organisation. This paper describes the board self-evaluation process used by Bayside Health, a public health service in Melbourne. The question of how governing boards can assess their performance has received increasing attention over the past decade. In particular, the increasing demand for accountability to shareholders and regulators experienced by corporate sector Boards has resulted in greater scrutiny of board performance, with the market and the balance sheet providing some basis for assessment. Performance evaluation of governing boards in the public sector has been more challenging. Performance evaluation is complex in a sector that is not simply driven by the bottom line, where the stakeholders involve both government and the broader community, and where access to, and the quality and safety of the services provided, are often the major public criteria by which performance may be judged. While some practices from the corporate sector can be applied successfully in the public sector, this is not always the case, and public sector boards such as the Board of Directors of Bayside Health have been developing ways to evaluate and improve their performance.

  14. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  15. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  16. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  17. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  18. 7 CFR 1215.2 - Board.

    Science.gov (United States)

    2010-01-01

    ... of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE POPCORN PROMOTION, RESEARCH, AND CONSUMER INFORMATION Popcorn Promotion, Research, and Consumer Information Order Definitions § 1215.2 Board. Board...

  19. Does firm performance affect board independence?

    Directory of Open Access Journals (Sweden)

    Yi Wang

    2010-07-01

    Full Text Available This paper seeks to shed some light on the antecedents of board independence. Specifically, it attempts to test the conceptual frameworks which make different predictions about the effect of firm performance on the level of board independence. The results provide support for the perspective that appointing more independent members to the boards may merely represent firms’ attempts to comply with institutional pressures. It is found that higher blockholder shareholdings lead to lower independence on the board, and audit and remuneration committees. Moreover, larger firms have relatively more independent directors sitting on nomination and remuneration committees.

  20. Social Responsibility in the Board Room

    DEFF Research Database (Denmark)

    Ege, Mette; Geisler, Kathrine; Knudsen, Jette Steen

    When do board directors pay attention to corporate social responsibility (CSR) issues? Board directors have traditionally focused on maximizing shareholder profit and viewed corporate governance narrowly as a way to meet this goal. They have paid little or no attention to CSR issues because...... they see CSR as a contrast to profit maximization. We argue in this article that companies can no longer ignore CSR. We propose that three conditions must be met in order for boards to pay attention to CSR. First, the board must have a mind-set that considers CSR as contributing value to the firm. Second...

  1. Why monetary board: Monetary board and endogenic price flexibility

    Directory of Open Access Journals (Sweden)

    Bašić Tamara

    2004-01-01

    Full Text Available The paper presents a model which proves that a unilateral exchange rate fixing, i.e. monetary board, as opposed to certain opinions, is an optimal policy since it increases flexibility of nominal prices, which is the ultimate goal of a flexible exchange rate policy. A suitable calibration of the model shows that the higher the initial price flexibility, the lower the difference needed for "utility increase" in getting the producers to switch from fixed to flexible prices. The results obtained in all cases indicate that exchange rate fixing increases price flexibility, which proves that a unilateral exchange rate fixing, i.e. monetary board, could be an optimal monetary policy.

  2. 75 FR 16438 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2010-04-01

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... Tourism Advisory Board (Board) will hold a meeting to discuss topics related to the travel and tourism...

  3. 7 CFR 1230.4 - Board.

    Science.gov (United States)

    2010-01-01

    ... of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS AND ORDERS; MISCELLANEOUS COMMODITIES), DEPARTMENT OF AGRICULTURE PORK PROMOTION, RESEARCH, AND CONSUMER INFORMATION Pork Promotion, Research, and Consumer Information Order Definitions § 1230.4 Board. Board means...

  4. Panel Board From Coconut Fibre And Pet Bottle

    Directory of Open Access Journals (Sweden)

    Ngadiman Norhayati

    2018-01-01

    Full Text Available The rate of global deforestation and its impact on the environment has led particle board manufacture to search for alternative feedstock, especially in countries where wood is less available compared to other cellulosic natural product. Based on the properties of coconut fibre and PET bottle, these two materials can be recycle as raw material for manufacture of panel board. As for this study, the coconut fibre were used as the filler and PET bottle as outer lining of the panel board. Two types of coconut fibre were used which are grinding and un-grinding coconut fibre. At first, the coconut fibre are undergoes softening, grinding, drying and sieving process, while PET bottle was cleaning, shredding, sieving before compacted using hydraulic hot press machine. There are four types of testing that been carried out which are swelling, water absorption, Modulus of Elasticity (MOE and Modulus of Rupture (MOR. The result show the conventional board has the highest value for MOE test, so it’s indicate that the conventional board is less strength from the coconut fibre board. As for water absorption test, the average water absorption of coconut fibre based panel board is less than conventional board. Overall, the coconut fibre board is better than conventional panel board because coconut fibre board are less swelling, has low water absorption, high modulus of rupture and low modulus of elasticity. Based on the finding, this coconut fibre panel board has potential as a stronger and long-lasting panel board than the conventional board in the market. Other than that, the panel also have their own aesthetic value since the recycled plastic bottle used as outer lining is colourful and giving aesthetic value.

  5. 75 FR 80039 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2010-12-21

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... agenda for an open meeting of the U.S. Travel and Tourism Advisory Board (Board). The agenda may change...

  6. 76 FR 21703 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2011-04-18

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... agenda for an open meeting of the U.S. Travel and Tourism Advisory Board (Board). The agenda may change...

  7. 76 FR 53666 - U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board

    Science.gov (United States)

    2011-08-29

    ... DEPARTMENT OF COMMERCE International Trade Administration U.S. Travel and Tourism Advisory Board: Meeting of the U.S. Travel and Tourism Advisory Board AGENCY: International Trade Administration, U.S... agenda for an open meeting of the U.S. Travel and Tourism Advisory Board (Board). The agenda may change...

  8. 36 CFR 222.11 - Grazing advisory boards.

    Science.gov (United States)

    2010-07-01

    ... such boards, the area to be covered, and the number of advisers on each board. (3) Processing Petitions... permittees are nominated and board members are elected. Nominations will be made by petition with all term...

  9. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    Science.gov (United States)

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  10. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  11. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  12. The space between us: stereotype threat and distance in interracial contexts.

    Science.gov (United States)

    Goff, Phillip Atiba; Steele, Claude M; Davies, Paul G

    2008-01-01

    Four studies investigate the role that stereotype threat plays in producing racial distancing behavior in an anticipated conversation paradigm. It was hypothesized that the threat of appearing racist may have the ironic effect of causing Whites to distance themselves from Black conversation partners. In Study 1, participants distanced themselves more from Black partners under conditions of threat, and this distance correlated with the activation of a "White racist" stereotype. In Study 2, it was demonstrated that Whites' interracial distancing behavior was not predicted by explicit or implicit prejudice. Study 3 provides evidence that conceiving of interracial interactions as opportunities to learn may attenuate the negative consequences of threat for Whites. Study 4 found that Whites have conscious access to their experience of stereotype threat and that this awareness may mediate the relationship between threat and distance. These results are discussed within a broader discourse of racial distancing and the possibility that certain identity threats may be as important as prejudice in determining the outcomes of interracial interactions. Copyright 2008 APA, all rights reserved.

  13. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  14. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  15. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  16. Age differences in the underlying mechanisms of stereotype threat effects.

    Science.gov (United States)

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  18. 36 CFR 242.10 - Federal Subsistence Board.

    Science.gov (United States)

    2010-07-01

    ... consultants to the Board. (d) Powers and duties. (1) The Board shall meet at least twice per year and at such... for the decision, in writing, in a timely fashion. (2) The Board shall provide available and...

  19. 50 CFR 100.10 - Federal Subsistence Board.

    Science.gov (United States)

    2010-10-01

    ... actively involved as consultants to the Board. (d) Powers and duties. (1) The Board shall meet at least... forth the factual basis and the reasons for the decision, in writing, in a timely fashion. (2) The Board...

  20. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  1. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  2. How two-tier boards can be more effective

    NARCIS (Netherlands)

    dr. Stefan Peij; Pieter-Jan Bezemer; Laura de Kruijs; Gregory Maassen

    2014-01-01

    Purpose – This study seeks to explore how non-executive directors address governance problems on Dutch two-tier boards. Within this board model, challenges might be particularly difficult to address due to the formal separation of management boards' decision-management from supervisory boards'

  3. THE INFLUENCE OF BOARD OF COMMISSIONERS AND AUDIT COMMITTEE EFFECTIVENESS, OWNERSHIP STRUCTURE, BANK MONITORING, AND FIRM LIFE CYCLE ON ACCOUNTING FRAUD

    Directory of Open Access Journals (Sweden)

    Synthia Madya Kusumawati

    2013-06-01

    Full Text Available Financial statement fraud has cost market participants, including investors, employees, creditors, and pensioners. Capital market participants expect active and vigilant corporate governance to ensure the quality, integrity, and transparency of financial information. Financial statement fraud is a serious threat to market participants’ confidence in published audited financial statements. Financial statement fraud has recently received considerable attention from the business community, accounting profession, academicians, and regulators. This paper sheds light on the factors that may increase the likelihood of financial statement fraud. This study empirically tests the impact of board of commissioners and audit committee effectiveness, ownership structure, bank monitoring, and the firm life cycle on the probability of accounting fraud. Hypothesis testing was carried out by using logistic regression model using fraud data from BAPEPAM-LK (Indonesia Stock Exchange Supervisory Agency during the years of 2005-2011. The result of this study indicates that the audit committee effectiveness and controlled family ownership reduce the fraud probability. However, the effectiveness of board commissioners, foreign ownership, bank monitoring, and the firm life cycle do not have any effect on fraud probability.

  4. Computer board for radioactive ray test

    International Nuclear Information System (INIS)

    Zuo Mingfu

    1996-05-01

    The present status of the radioactive-ray test system for industrial applications, the newly designed computer board for overcoming the shortcomings of the current system are described. The functions, measurement principles and the feature of the board as well as the test results for this board are discussed. The board puts together many functions of the radioactive-ray test system, such as energy calibration, MCS, etc.. It also provides many other subordinate practical function such as motor control, ADC and so on. The board summarizes two sets of test parts into one and therefore composes a powerful unit for the system. Not only can it replace all units in a normal test system for signal analysis, signal process, data management, and motor control, but also can be used in more complex test systems, such as those for double source/double energy/double channel testing, multichannel testing, position testing and core positioning, etc.. The board makes the test system more easier to achieve miniaturization, computerization goals, and therefore improves the quality of the test and reduces the cost of the system. (10 refs., 8 figs.)

  5. A Feminist Framework for Nurses on Boards.

    Science.gov (United States)

    Sundean, Lisa J; Polifroni, E Carol

    Nurses' knowledge, skills, and expertise uniquely situate them to contribute to health care transformation as equal partners in organizational board governance. The Institute of Medicine, the 10,000 Nurses on Boards Coalition, and a growing number of nurse and health care scholars advocate nurse board leadership; however, nurses are rarely appointed as voting board members. When no room is made for nurses to take a seat at the table, the opportunity is lost to harness the power of nursing knowledge for health care transformation and social justice. No philosophical framework underpins the emerging focus on nurse board leadership. The purpose of this article is to add to the extant nursing literature by suggesting feminism as a philosophical framework for nurses on boards. Feminism contributes to the knowledge base of nursing as it relates to the expanding roles of nurses in health care transformation, policy, and social justice. Furthermore, a feminist philosophical framework for nurses on boards sets the foundation for new theory development and validates ongoing advancement of the nursing profession. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Diversity in Board of Directors: Review of Diversity as a Factor to Enhance Board Performance

    Directory of Open Access Journals (Sweden)

    Pechersky Alexander

    2016-06-01

    Full Text Available In light of growing corporate influence in the business world and thus increasing further need to improve framework of corporate governance for shareholders’ protection, diversity is examined as a necessary factor to enhance monitoring and leadership functions of board of directors. This article analyses empirical studies with samples on various countries in order to examine effect of board composition and diversity on primary responsibilities of Board of Directors. Author is providing theoretical overview of diversity benefits and practical perspective of gender, qualifications, and background diversity in board performance. Our results show an added value of gender diversity to company performance in social and healthcare industries. Furthermore, author shows a rather negative effect of gender quotas. This study sheds a light on empirical researches and a need to include additional cultural factors called country readiness factors.

  7. Understanding the roles of NHS trust board members.

    Science.gov (United States)

    Deffenbaugh, J

    1996-01-01

    The establishment of NHS trust boards on a business format was a recent innovation resulting from the NHS reforms. In order to realize benefits for patients, it is essential that boards operate effectively. Explores within the framework of corporate governance, the practical implications of board member roles. Drawing on experience of strategy formulation at board level, analyses and clarifies the roles, and presents recommendations to increase board effectiveness.

  8. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  9. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal; Pernici, B; Gulla, J.A.

    2007-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not

  10. Biotechnological Aspects of Microbial Extracellular Electron Transfer

    Science.gov (United States)

    Kato, Souichiro

    2015-01-01

    Extracellular electron transfer (EET) is a type of microbial respiration that enables electron transfer between microbial cells and extracellular solid materials, including naturally-occurring metal compounds and artificial electrodes. Microorganisms harboring EET abilities have received considerable attention for their various biotechnological applications, in addition to their contribution to global energy and material cycles. In this review, current knowledge on microbial EET and its application to diverse biotechnologies, including the bioremediation of toxic metals, recovery of useful metals, biocorrosion, and microbial electrochemical systems (microbial fuel cells and microbial electrosynthesis), were introduced. Two potential biotechnologies based on microbial EET, namely the electrochemical control of microbial metabolism and electrochemical stimulation of microbial symbiotic reactions (electric syntrophy), were also discussed. PMID:26004795

  11. An Olive Branch for Boards.

    Science.gov (United States)

    Harrington-Lueker, Donna

    1993-01-01

    Peacekeeping strategies for school-board meetings include developing a code of conduct that spells out guidelines for behavior and then enforcing it; bringing in a neutral observer to help board members work through what is really worrying them; and concentrating on policy. (MLF)

  12. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  13. A theoretical reassessment of microbial maintenance and implications for microbial ecology modeling.

    Science.gov (United States)

    Wang, Gangsheng; Post, Wilfred M

    2012-09-01

    We attempted to reconcile three microbial maintenance models (Herbert, Pirt, and Compromise) through a theoretical reassessment. We provided a rigorous proof that the true growth yield coefficient (Y(G)) is the ratio of the specific maintenance rate (a in Herbert) to the maintenance coefficient (m in Pirt). Other findings from this study include: (1) the Compromise model is identical to the Herbert for computing microbial growth and substrate consumption, but it expresses the dependence of maintenance on both microbial biomass and substrate; (2) the maximum specific growth rate in the Herbert (μ(max,H)) is higher than those in the other two models (μ(max,P) and μ(max,C)), and the difference is the physiological maintenance factor (m(q) = a); and (3) the overall maintenance coefficient (m(T)) is more sensitive to m(q) than to the specific growth rate (μ(G)) and Y(G). Our critical reassessment of microbial maintenance provides a new approach for quantifying some important components in soil microbial ecology models. © This article is a US government work and is in the public domain in the USA.

  14. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    Science.gov (United States)

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  15. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  16. Phishing - A Growing Threat to E-Commerce

    OpenAIRE

    Banday, M. Tariq; Qadri, Jameel A.

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyl...

  17. 76 FR 21877 - Environmental Management Advisory Board

    Science.gov (United States)

    2011-04-19

    ... DEPARTMENT OF ENERGY Environmental Management Advisory Board AGENCY: Department of Energy. ACTION: Notice of call for nominations for appointment to the Environmental Management Advisory Board. SUMMARY... Environmental Management Advisory Board. DATES: Nominations will be accepted through May 13, 2011. ADDRESSES...

  18. The Microbial DNA Index System (MiDIS): A tool for microbial pathogen source identification

    Energy Technology Data Exchange (ETDEWEB)

    Velsko, S. P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2010-08-09

    The microbial DNA Index System (MiDIS) is a concept for a microbial forensic database and investigative decision support system that can be used to help investigators identify the sources of microbial agents that have been used in a criminal or terrorist incident. The heart of the proposed system is a rigorous method for calculating source probabilities by using certain fundamental sampling distributions associated with the propagation and mutation of microbes on disease transmission networks. This formalism has a close relationship to mitochondrial and Y-chromosomal human DNA forensics, and the proposed decision support system is somewhat analogous to the CODIS and SWGDAM mtDNA databases. The MiDIS concept does not involve the use of opportunistic collections of microbial isolates and phylogenetic tree building as a basis for inference. A staged approach can be used to build MiDIS as an enduring capability, beginning with a pilot demonstration program that must meet user expectations for performance and validation before evolving into a continuing effort. Because MiDIS requires input from a a broad array of expertise including outbreak surveillance, field microbial isolate collection, microbial genome sequencing, disease transmission networks, and laboratory mutation rate studies, it will be necessary to assemble a national multi-laboratory team to develop such a system. The MiDIS effort would lend direction and focus to the national microbial genetics research program for microbial forensics, and would provide an appropriate forensic framework for interfacing to future national and international disease surveillance efforts.

  19. Exciting fear in adolescence: Does pubertal development alter threat processing?

    Directory of Open Access Journals (Sweden)

    Jeffrey M. Spielberg

    2014-04-01

    Full Text Available Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala, but also regions associated with reward pursuit (i.e., nucleus accumbens. These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues—which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences.

  20. Exciting fear in adolescence: does pubertal development alter threat processing?

    Science.gov (United States)

    Spielberg, Jeffrey M; Olino, Thomas M; Forbes, Erika E; Dahl, Ronald E

    2014-04-01

    Adolescent development encompasses an ostensible paradox in threat processing. Risk taking increases dramatically after the onset of puberty, contributing to a 200% increase in mortality. Yet, pubertal maturation is associated with increased reactivity in threat-avoidance systems. In the first part of this paper we propose a heuristic model of adolescent affective development that may help to reconcile aspects of this paradox, which focuses on hypothesized pubertal increases in the capacity to experience (some) fear-evoking experiences as an exciting thrill. In the second part of this paper, we test key features of this model by examining brain activation to threat cues in a longitudinal study that disentangled pubertal and age effects. Pubertal increases in testosterone predicted increased activation to threat cues, not only in regions associated with threat avoidance (i.e., amygdala), but also regions associated with reward pursuit (i.e., nucleus accumbens). These findings are consistent with our hypothesis that puberty is associated with a maturational shift toward more complex processing of threat cues--which may contribute to adolescent tendencies to explore and enjoy some types of risky experiences. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  1. Effects of Elevated Carbon Dioxide and Salinity on the Microbial Diversity in Lithifying Microbial Mats

    Directory of Open Access Journals (Sweden)

    Steven R. Ahrendt

    2014-03-01

    Full Text Available Atmospheric levels of carbon dioxide (CO2 are rising at an accelerated rate resulting in changes in the pH and carbonate chemistry of the world’s oceans. However, there is uncertainty regarding the impact these changing environmental conditions have on carbonate-depositing microbial communities. Here, we examine the effects of elevated CO2, three times that of current atmospheric levels, on the microbial diversity associated with lithifying microbial mats. Lithifying microbial mats are complex ecosystems that facilitate the trapping and binding of sediments, and/or the precipitation of calcium carbonate into organosedimentary structures known as microbialites. To examine the impact of rising CO2 and resulting shifts in pH on lithifying microbial mats, we constructed growth chambers that could continually manipulate and monitor the mat environment. The microbial diversity of the various treatments was compared using 16S rRNA gene pyrosequencing. The results indicated that elevated CO2 levels during the six month exposure did not profoundly alter the microbial diversity, community structure, or carbonate precipitation in the microbial mats; however some key taxa, such as the sulfate-reducing bacteria Deltasulfobacterales, were enriched. These results suggest that some carbonate depositing ecosystems, such as the microbialites, may be more resilient to anthropogenic-induced environmental change than previously thought.

  2. MICROBIAL FUEL CELL

    DEFF Research Database (Denmark)

    2008-01-01

    A novel microbial fuel cell construction for the generation of electrical energy. The microbial fuel cell comprises: (i) an anode electrode, (ii) a cathode chamber, said cathode chamber comprising an in let through which an influent enters the cathode chamber, an outlet through which an effluent...

  3. Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2016-09-01

    Full Text Available Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft. 

  4. Molecular ecology of microbial mats

    NARCIS (Netherlands)

    Bolhuis, H.; Cretoiu, M.S.; Stal, L.J.

    2014-01-01

    Phototrophic microbial mats are ideal model systems for ecological and evolutionary analysis of highly diverse microbial communities. Microbial mats are small-scale, nearly closed, and self-sustaining benthic ecosystems that comprise the major element cycles, trophic levels, and food webs. The steep

  5. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  6. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  7. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    Science.gov (United States)

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  9. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  10. 32 CFR 881.3 - Individual Service Review Board.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Individual Service Review Board. 881.3 Section... Individual Service Review Board. (a) The Commander, Headquarters Air Force Personnel Center (HQ AFPC/CC) establishes the Individual Service Review Board as necessary. (b) The Board consists of military members in...

  11. Embedded controllers for local board-control

    CERN Document Server

    Neufeld, Niko; Mini, Giuseppe; Sannino, Mario; Guzik, Zbigniew; Jacobsson, Richard; Jost, Beat

    2005-01-01

    The LHCb experiment at CERN has a large number of custom electronic boards performing high-speed data-processing. Like in any large experiment the control and monitoring of these crate-mounted boards must be integrated into the overall control-system. Traditionally this has been done by using buses like VME on the back-plane of the crates. LHCb has chosen to equip every board with an embedded micro-controller and connecting them in a large Local Area Network. The intelligence of these devices allows complex (soft) real-time control and monitoring, required for modern powerful FPGA driven electronics. Moreover each board has its own, isolated control access path, which increases the robustness of the entire system. The system is now in pre-production at several sites and will go into full production during next year. The hardware and software will be discussed and experiences from the R&D and pre-production will be reviewed, with an emphasis on advantages and difficulties of this approach to board-control.

  12. GOVERNING BOARD OF THE PENSION FUND

    CERN Multimedia

    2003-01-01

    The Governing Board of the Pension Fund held its one hundred and twelfth and one hundred and thirteenth meetings on 5 November and 3 December 2002 respectively. At the first of these meetings, the Governing Board firstly took note of the favourable stance adopted by TREF with respect to a pension adjustment of 0.6% for 2003. TREF had also examined the proposed technical amendments to the Pension Fund's Rules and Regulations, as reported in Weekly Bulletin N° 44/2002, relating to a) clarification of the roles of the Governing Board and the Administrator, b) the procedure for appointing the Chairman, Vice-Chairmen and Administrator of the Fund, c) the Governing Board's voting rules and d) the role and composition of the Investment Committee. These amendments were to be submitted to the CERN Council for approval at its December meeting*. The Governing Board then considered a request submitted by the CERN Pensioners' Association (GAC) for an extraordinary adjustment of pensions. The request entailed making an ...

  13. The cyber threat landscape: Challenges and future research directions

    Science.gov (United States)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  14. Tumor boards and the quality of cancer care.

    Science.gov (United States)

    Keating, Nancy L; Landrum, Mary Beth; Lamont, Elizabeth B; Bozeman, Samuel R; Shulman, Lawrence N; McNeil, Barbara J

    2013-01-16

    Despite the widespread use of tumor boards, few data on their effects on cancer care exist. We assessed whether the presence of a tumor board, either general or cancer specific, was associated with recommended cancer care, outcomes, or use in the Veterans Affairs (VA) health system. We surveyed 138 VA medical centers about the presence of tumor boards and linked cancer registry and administrative data to assess receipt of stage-specific recommended care, survival, or use for patients with colorectal, lung, prostate, hematologic, and breast cancers diagnosed in the period from 2001 to 2004 and followed through 2005. We used multivariable logistic regression to assess associations of tumor boards with the measures, adjusting for patient sociodemographic and clinical characteristics. All statistical tests were two-sided. Most facilities (75%) had at least one tumor board, and many had several cancer-specific tumor boards. Presence of a tumor board was associated with only seven of 27 measures assessed (all P < .05), and several associations were not in expected directions. Rates of some recommended care (eg, white blood cell growth factors with cyclophosphamide, adriamycin, vincristine, and prednisone in diffuse large B-cell lymphoma) were lower in centers with hematologic-specialized tumor boards (39.4%) than in centers with general tumor boards (61.3%) or no tumor boards (56.4%; P = .002). Only one of 27 measures was statistically significantly associated with tumor boards after applying a Bonferroni correction for multiple comparisons. We observed little association of multidisciplinary tumor boards with measures of use, quality, or survival. This may reflect no effect or an effect that varies by structural and functional components and participants' expertise.

  15. Board Directors and Corporate Social Responsibility

    OpenAIRE

    Mariana Nedelcu (Bunea)

    2014-01-01

    The boards of directors and corporate social responsibility (CSR) have been the subject of much study and debate in the corporate governance circles over the two last decades. With issues ranging from poor corporate reporting to excessive executive compensation often splashed in the headlines, the role of boards comes into the media limelight as never before. Boards of directors are also becoming increasingly aware of corporate social responsibility issues.

  16. 78 FR 73187 - Black Hills National Forest Advisory Board

    Science.gov (United States)

    2013-12-05

    ... DEPARTMENT OF AGRICULTURE Forest Service Black Hills National Forest Advisory Board AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Black Hills National Forest Advisory Board (Board... all members of the Advisory Board; (2) provide orientation to Board Members on Basic Laws governing...

  17. An effective board from a team perspective

    Directory of Open Access Journals (Sweden)

    Eythor Ivar Jonsson

    2006-11-01

    Full Text Available This paper looks at boards from a team perspective, where insights from research on teams are used to discuss some classical problems of corporate governance. The Enron-case is used as an underlying theme as it portrays some of the biggest challenges that boards face today. Theories developed within the team literature emphasise that for boards to become more effective they need more time and better access to information as a source of knowledge, more structure and purposeful roles for directors and for the board in general, and they need to become smaller and more focused. In effect, the culture of teams could have avoided some of the blunders of the Enron board.

  18. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  19. The Problem: Low-Achieving Districts and Low-Performing Boards

    Directory of Open Access Journals (Sweden)

    David E. Lee

    2014-10-01

    Full Text Available Effective school districts maintain superintendent and school board collegiality which can foster success and connectedness among members. Delagardelle and Alsbury (2008 found that superintendents and board members are not consistent in their perceptions about the work the board does, and Glass (2007 found that states do not require boards to undergo evaluation for effectiveness. In the current study, 115 board meetings were observed using the School Board Video Project (SBVP survey, which was created in 2012 by researchers to uncover school board meetings’ effectiveness. MANOVA, Univariate ANOVA, and Pearson Chi-Square test results revealed significant differences between low-, medium-, and high-performing districts’ school board meetings. Evidence indicated that low-performing districts’ board meetings were: less orderly; had less time spent on student achievement; lacked respectful and attentive engagement across speakers; had board meeting members who seemed to advance their own agenda; had less effective working relationships among the governance team; had fewer board members who relied on the superintendent for advice and input; had one member, other than the board president, stand out for taking excessive time during meetings; and did not focus on policy items as much as high- and medium-performing school districts. The research concluded that more school board members from low-performing districts needed training to improve their effectiveness. Furthermore, highly refined and target-enhanced school board training programs might lead to lasting governance success and more effective teaming that could improve district, and ultimately, student achievement.

  20. Orthopedic board certification and physician performance: an analysis of medical malpractice, hospital disciplinary action, and state medical board disciplinary action rates.

    Science.gov (United States)

    Kocher, Mininder S; Dichtel, Laura; Kasser, James R; Gebhardt, Mark C; Katz, Jeffery N

    2008-02-01

    Specialty board certification status has become the de facto standard of competency by which the profession and the public recognize physician specialists. However, the relationship between orthopedic board certification and physician performance has not been established. Rates of medical malpractice claims, hospital disciplinary actions, and state medical board disciplinary actions were compared between 1309 board-certified (BC) and 154 non-board-certified (NBC) orthopedic surgeons in 3 states. There was no significant difference between BC and NBC surgeons in medical malpractice claim proportions (BC, 19.1% NBC, 16.9% P = .586) or in hospital disciplinary action proportions (BC, 0.9% NBC, 0.8% P = 1.000). There was a significantly higher proportion of state medical board disciplinary action for NBC surgeons (BC, 7.6% NBC, 13.0% P = .028). An association between board certification status and physician performance is necessary to validate its status as the de facto standard of competency. In this study, BC surgeons had lower rates of state medical board disciplinary action.

  1. Improving School Board Effectiveness: A Balanced Governance Approach

    Science.gov (United States)

    Alsbury, Thomas L., Ed.; Gore, Phil, Ed.

    2015-01-01

    "Improving School Board Effectiveness" offers a clarifying and essential look at the evolving role of school boards and how they contribute to efforts to improve student learning. It examines how board members can establish effective district priorities, and it explores those board policies and actions that result in shared, districtwide…

  2. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  3. Microbial biosensors for environmental monitoring

    Directory of Open Access Journals (Sweden)

    David VOGRINC

    2015-12-01

    Full Text Available Microbial biosensors are analytical devices capable of sensing substances in the environment due to the specific biological reaction of the microorganism or its parts. Construction of a microbial biosensor requires knowledge of microbial response to the specific analyte. Linking this response with the quantitative data, using a transducer, is the crucial step in the construction of a biosensor. Regarding the transducer type, biosensors are divided into electrochemical, optical biosensors and microbial fuel cells. The use of the proper configuration depends on the selection of the biosensing element. With the use of transgenic E. coli strains, bioluminescence or fluorescence based biosensors were developed. Microbial fuel cells enable the use of the heterogeneous microbial populations, isolated from wastewater. Different microorganisms are used for different pollutants – pesticides, heavy metals, phenolic compounds, organic waste, etc. Biosensing enables measurement of their concentration and their toxic or genotoxic effects on the microbes. Increasing environmental awareness has contributed to the increase of interest for biomonitoring. Although technologies, such as bioinformatics and genetic engineering, allow us to design complex and efficient microbial biosensors for environmental pollutants, the transfer of the laboratory work to the field still remains a problem to solve.

  4. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  5. Cultural adaptations to the differential threats posed by hot versus cold climates.

    Science.gov (United States)

    Murray, Damian R

    2013-10-01

    Hot and cold climates have posed differential threats to human survival throughout history. Cold temperatures can pose direct threats to survival in themselves, whereas hot temperatures may pose threats indirectly through higher prevalence of infectious disease. These differential threats yield convergent predictions for the relationship between more demanding climates and freedom of expression, but divergent predictions for freedom from discrimination.

  6. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  7. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  8. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  9. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  10. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  11. 29 CFR 1207.2 - Requests for Mediation Board action.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Requests for Mediation Board action. 1207.2 Section 1207.2 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD ESTABLISHMENT OF SPECIAL ADJUSTMENT BOARDS § 1207.2 Requests for Mediation Board action. (a) Requests for the National Mediation Board...

  12. 46 CFR 96.40-1 - Pilot boarding equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Pilot boarding equipment. 96.40-1 Section 96.40-1... CONTROL AND MISCELLANEOUS SYSTEMS AND EQUIPMENT Pilot Boarding Equipment § 96.40-1 Pilot boarding... boat or other vessel. (b) Each vessel must have suitable pilot boarding equipment available for use on...

  13. 46 CFR 195.40-1 - Pilot boarding equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Pilot boarding equipment. 195.40-1 Section 195.40-1... CONTROL AND MISCELLANEOUS SYSTEMS AND EQUIPMENT Pilot Boarding Equipment § 195.40-1 Pilot boarding... boat or other vessel. (b) Each vessel must have suitable pilot boarding equipment available for use on...

  14. 46 CFR 35.01-55 - Pilot boarding operation.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Pilot boarding operation. 35.01-55 Section 35.01-55... Requirements § 35.01-55 Pilot boarding operation. (a) The master shall ensure that pilot boarding equipment is... instructions. (b) The master shall ensure compliance with the following during pilot boarding operations: (1...

  15. Threat driven modeling framework using petri nets for e-learning system.

    Science.gov (United States)

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  16. 75 FR 11870 - Inland Waterways Users Board

    Science.gov (United States)

    2010-03-12

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  17. 78 FR 44934 - Inland Waterways Users Board

    Science.gov (United States)

    2013-07-25

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  18. 75 FR 57264 - Inland Waterways Users Board

    Science.gov (United States)

    2010-09-20

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  19. 76 FR 11216 - Inland Waterways Users Board

    Science.gov (United States)

    2011-03-01

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  20. 78 FR 72070 - Inland Waterways Users Board

    Science.gov (United States)

    2013-12-02

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  1. 77 FR 69447 - Inland Waterways Users Board

    Science.gov (United States)

    2012-11-19

    ... DEPARTMENT OF DEFENSE Department of the Army; Corps of Engineers Inland Waterways Users Board AGENCY: Department of the Army, U.S. Army Corps of Engineers, DoD. ACTION: Notice of open meeting... is made of the forthcoming meeting. Name of Committee: Inland Waterways Users Board (Board). Date...

  2. Age Differences in Selective Memory of Goal-Relevant Stimuli Under Threat.

    Science.gov (United States)

    Durbin, Kelly A; Clewett, David; Huang, Ringo; Mather, Mara

    2018-02-01

    When faced with threat, people often selectively focus on and remember the most pertinent information while simultaneously ignoring any irrelevant information. Filtering distractors under arousal requires inhibitory mechanisms, which take time to recruit and often decline in older age. Despite the adaptive nature of this ability, relatively little research has examined how both threat and time spent preparing these inhibitory mechanisms affect selective memory for goal-relevant information across the life span. In this study, 32 younger and 31 older adults were asked to encode task-relevant scenes, while ignoring transparent task-irrelevant objects superimposed onto them. Threat levels were increased on some trials by threatening participants with monetary deductions if they later forgot scenes that followed threat cues. We also varied the time between threat induction and a to-be-encoded scene (i.e., 2 s, 4 s, 6 s) to determine whether both threat and timing effects on memory selectivity differ by age. We found that age differences in memory selectivity only emerged after participants spent a long time (i.e., 6 s) preparing for selective encoding. Critically, this time-dependent age difference occurred under threatening, but not neutral, conditions. Under threat, longer preparation time led to enhanced memory for task-relevant scenes and greater memory suppression of task-irrelevant objects in younger adults. In contrast, increased preparation time after threat induction had no effect on older adults' scene memory and actually worsened memory suppression of task-irrelevant objects. These findings suggest that increased time to prepare top-down encoding processes benefits younger, but not older, adults' selective memory for goal-relevant information under threat. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  3. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  4. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    Science.gov (United States)

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  5. Strategic threat management: an exploration of nursing strategies in the pediatric intensive care unit.

    Science.gov (United States)

    Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina

    2015-03-01

    Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  6. Board Directors and Corporate Social Responsibility

    Directory of Open Access Journals (Sweden)

    Mariana Nedelcu (Bunea

    2014-08-01

    Full Text Available The boards of directors and corporate social responsibility (CSR have been the subject of much study and debate in the corporate governance circles over the two last decades. With issues ranging from poor corporate reporting to excessive executive compensation often splashed in the headlines, the role of boards comes into the media limelight as never before. Boards of directors are also becoming increasingly aware of corporate social responsibility issues.

  7. New Rationales for Women on Boards

    OpenAIRE

    Choudhury, B.

    2014-01-01

    Should measures promoting women to corporate boards be solely justified in terms of economic arguments? Traditionally, such measures have tended to rely on utilitarian arguments, despite the fact that the most prominent of these arguments—the relationship between women’s presence on boards and firm financial performance—is equivocal. Conversely, this article argues that rationales for increasing women on boards should be based on both equality and economics grounds. An equality rationale is n...

  8. Attentional bias towards health-threat information in chronic fatigue syndrome.

    Science.gov (United States)

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  9. 46 CFR 32.90-1 - Pilot boarding equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Pilot boarding equipment. 32.90-1 Section 32.90-1... REQUIREMENTS Pilot Boarding Equipment § 32.90-1 Pilot boarding equipment. (a) This section applies to each... must have suitable pilot boarding equipment available for use on each side of the vessel. If a vessel...

  10. 46 CFR 196.95-1 - Pilot boarding operations.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Pilot boarding operations. 196.95-1 Section 196.95-1... Pilot Boarding Operations § 196.95-1 Pilot boarding operations. (a) The master shall ensure that pilot boarding equipment is maintained as follows: (1) The equipment must be kept clean and in good working order...

  11. 46 CFR 77.40-1 - Pilot boarding equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Pilot boarding equipment. 77.40-1 Section 77.40-1... MISCELLANEOUS SYSTEMS AND EQUIPMENT Pilot Boarding Equipment § 77.40-1 Pilot boarding equipment. (a) This... vessel. (b) Each vessel must have suitable pilot boarding equipment available for use on each side of the...

  12. 46 CFR 97.90-1 - Pilot boarding operation.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Pilot boarding operation. 97.90-1 Section 97.90-1... OPERATIONS Pilot Boarding Operations § 97.90-1 Pilot boarding operation. (a) The master shall ensure that pilot boarding equipment is maintained as follows: (1) The equipment must be kept clean and in good...

  13. Hydrodynamics of microbial filter feeding

    DEFF Research Database (Denmark)

    Nielsen, Lasse Tor; Asadzadeh, Seyed Saeed; Dölger, Julia

    2017-01-01

    Microbial filter feeders are an important group of grazers, significant to the microbial loop, aquatic food webs, and biogeochemical cycling. Our understanding of microbial filter feeding is poor, and, importantly, it is unknown what force microbial filter feeders must generate to process adequate......-feeding choanoflagellate Diaphanoeca grandis using particle tracking, and demonstrate that the current understanding of microbial filter feeding is inconsistent with computational fluid dynamics (CFD) and analytical estimates. Both approaches underestimate observed filtration rates by more than an order of magnitude......; the beating flagellum is simply unable to draw enough water through the fine filter. We find similar discrepancies for other choanoflagellate species, highlighting an apparent paradox. Our observations motivate us to suggest a radically different filtration mechanism that requires a flagellar vane (sheet...

  14. Advisory Board on Alcoholism and Drug Abuse

    Science.gov (United States)

    State Employees Advisory Board on Alcoholism and Drug Abuse DHSS State of Alaska Home Divisions and ; Advisory Board on Alcoholism and Drug Abuse Page Content Alison Kulas Executive Director If you, a family Kulas Begins Tenure as Executive Director The Advisory Board on Alcoholism and Drug Abuse, The Alaska

  15. 50 CFR 100.13 - Board/agency relationships.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Board/agency relationships. 100.13 Section 100.13 Wildlife and Fisheries UNITED STATES FISH AND WILDLIFE SERVICE, DEPARTMENT OF THE INTERIOR... Structure § 100.13 Board/agency relationships. (a) General. (1) The Board, in making decisions or...

  16. Developing 300°C Ceramic Circuit Boards

    Energy Technology Data Exchange (ETDEWEB)

    Normann, Randy A

    2015-02-15

    This paper covers the development of a geothermal ceramic circuit board technology using 3D traces in a machinable ceramic. Test results showing the circuit board to be operational to at least 550°C. Discussion on producing this type of board is outlined along with areas needing improvement.

  17. Fermilab Friends for Science Education | Board Tools

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Board Tools Testimonials Our Donors Board of Directors Board Tools Calendar Join Us Donate Now Get FermiGear! Education FFSE Scholarship Tools Google Drive Join Us/Renew Membership Forms: Online - Print Support Us Donation

  18. 78 FR 73586 - Senior Executive Service Performance Review Board (PRB) and Executive Resources Board (ERB...

    Science.gov (United States)

    2013-12-06

    ...: Performance Review Board Leland L. Gardner, Chairman Rachel D. Campbell, Member Craig M. Keats, Member Lucille Marvin, Alternate Member Executive Resources Board Rachel D. Campbell, Chairman Lucille Marvin, Member Joseph H. Dettmar, Alternate Member These changes to the PRB and ERB membership are due to the departure...

  19. Board structure and performance in Ethiopian microfinance institutions

    Directory of Open Access Journals (Sweden)

    Letenah Ejigu Wale

    2015-04-01

    Full Text Available This research investigated the effect of one governance dimension, board structure on the sustainability and outreach performance of Ethiopian MFIs. A panel data of 13 MFIs for 6 years (2003-2008 is used for the study. No study of such type is conducted in the past for the Ethiopian environment. The results indicate an experienced manager, a larger board size and educated board members all help to increase sustainability with board education having the largest effect. Manager experience and board size also have a negative effect on depth of outreach (i.e. less lending to women. Board independence has no visible effect on either sustainability or outreach. Surprisingly, no governance variable explains breath of outreach

  20. 39 CFR 4.6 - Secretary of the Board.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Secretary of the Board. 4.6 Section 4.6 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE OFFICIALS (ARTICLE IV) § 4.6 Secretary of the Board. The Secretary of the Board of Governors is appointed by the...

  1. Fast Aircraft Turnaround Enabled by Reliable Passenger Boarding

    Directory of Open Access Journals (Sweden)

    Michael Schultz

    2018-01-01

    Full Text Available Future 4D aircraft trajectories demand comprehensive consideration of environmental, economic, and operational constraints, as well as reliable prediction of all aircraft-related processes. Mutual interdependencies between airports result in system-wide, far-reaching effects in the air traffic network (reactionary delays. To comply with airline/airport challenges over the day of operations, a change to an air-to-air perspective is necessary, with a specific focus on the aircraft ground operations as major driver for airline punctuality. Aircraft ground trajectories primarily consists of handling processes at the stand (deboarding, catering, fueling, cleaning, boarding, unloading, loading, which are defined as the aircraft turnaround. Turnaround processes are mainly controlled by ground handling, airport, or airline staff, except the aircraft boarding, which is driven by passengers’ experience and willingness/ability to follow the proposed boarding procedures. This paper provides an overview of the research done in the field of aircraft boarding and introduces a reliable, calibrated, and stochastic aircraft boarding model. The stochastic boarding model is implemented in a simulation environment to evaluate specific boarding scenarios using different boarding strategies and innovative technologies. Furthermore, the potential of a connected aircraft cabin as sensor network is emphasized, which could provide information on the current and future status of the boarding process.

  2. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  3. The board's role in organizational finance.

    Science.gov (United States)

    Curran, Connie R

    2010-01-01

    Health care reform will result in significant changes in reimbursement with much greater emphasis put on primary care, home care, and other types of non-acute care. The changes in reimbursement will necessitate significant changes in organizational structure and operations. It is essential board members keep current in their knowledge of health care finance so they can execute their responsibilities for the financial health of the organization. The board must ensure that the budget is aligned with the organization's financial objectives and monitor the financial performance. It is essential the chief nursing officer (CNO) contributes to the board's understanding of the financial health of the organization. The board of trustees will more effectively execute their financial responsibilities with the input of nurse trustees and the CNO.

  4. 39 CFR 221.2 - Board of Governors.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Board of Governors. 221.2 Section 221.2 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION GENERAL ORGANIZATION § 221.2 Board of Governors. (a) Composition. The Board of Governors consists of 11 members. Nine governors are appointed by...

  5. 14 CFR 250.3 - Boarding priority rules.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Boarding priority rules. 250.3 Section 250...) ECONOMIC REGULATIONS OVERSALES § 250.3 Boarding priority rules. (a) Every carrier shall establish priority... boarding on an oversold flight in the event that an insufficient number of volunteers come forward. Such...

  6. 46 CFR 108.719 - Pilot boarding equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Pilot boarding equipment. 108.719 Section 108.719... AND EQUIPMENT Miscellaneous Equipment § 108.719 Pilot boarding equipment. (a) This section applies to... vessel must have suitable pilot boarding equipment available for use on each side of the vessel. If a...

  7. 46 CFR 109.347 - Pilot boarding equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Pilot boarding equipment. 109.347 Section 109.347... OPERATIONS Operation and Stowage of Safety Equipment § 109.347 Pilot boarding equipment. (a) The master or person in charge shall ensure that pilot boarding equipment is maintained as follows: (1) The equipment...

  8. A simple strategy to reduce stereotype threat for orthopedic residents.

    Science.gov (United States)

    Gomez, Everlyne; Wright, James G

    2014-04-01

    Stereotype threat, defined as the predicament felt by people in either positive or negative learning experiences where they could conform to negative stereotypes associated with their own group membership, can interfere with learning. The purpose of this study was to determine if a simple orientation session could reduce stereotype threat for orthopedic residents. The intervention group received an orientation on 2 occasions focusing on their possible responses to perceived poor performance in teaching rounds and the operating room (OR). Participants completed a survey with 7 questions typical for stereotype threat evaluating responses to their experiences. The questions had 7 response options with a maximum total score of 49, where higher scores indicated greater degree of experiences typical of stereotype threat. Of the 84 eligible residents, 49 participated: 22 in the nonintervention and 27 in the intervention group. The overall scores were 29 and 29.4, and 26.2 and 25.8 in the nonintervention and intervention groups for their survey responses to perceived poor performance in teaching rounds (p = 0.85) and the OR (p = 0.84), respectively. Overall, responses typical of stereotype threat were greater for perceived poor performance at teaching rounds than in the OR (p = 0.001). Residents experience low self-esteem following perceived poor performance, particularly at rounds. A simple orientation designed to reduce stereotype threat was unsuccessful in reducing this threat overall. Future research will need to consider longer-term intervention as possible strategies to reduce perceived poor performance at teaching rounds and in the OR.

  9. Investigation of a Markov Model for Computer System Security Threats

    Directory of Open Access Journals (Sweden)

    Alexey A. A. Magazev

    2017-01-01

    Full Text Available In this work, a model for computer system security threats formulated in terms of Markov processes is investigated. In the framework of this model the functioning of the computer system is considered as a sequence of failures and recovery actions which appear as results of information security threats acting on the system. We provide a detailed description of the model: the explicit analytical formulas for the probabilities of computer system states at any arbitrary moment of time are derived, some limiting cases are discussed, and the long-run dynamics of the system is analysed. The dependence of the security state probability (i.e. the state for which threats are absent on the probabilities of threats is separately investigated. In particular, it is shown that this dependence is qualitatively different for odd and even moments of time. For instance, in the case of one threat the security state probability demonstrates non-monotonic dependence on the probability of threat at even moments of time; this function admits at least one local minimum in its domain of definition. It is believed that the mentioned feature is important because it allows to locate the most dangerous areas of threats where the security state probability can be lower then the permissible level. Finally, we introduce an important characteristic of the model, called the relaxation time, by means of which we construct the permitting domain of the security parameters. Also the prospects of the received results application to the problem of finding the optimal values of the security parameters is discussed.

  10. Microbial stratification and microbially catalyzed processes along a hypersaline chemocline

    Science.gov (United States)

    Hyde, A.; Joye, S. B.; Teske, A.

    2017-12-01

    Orca Basin is the largest deep hypersaline anoxic basin in the world, covering over 400 km2. Located at the bottom of the Gulf of Mexico, this body of water reaches depths of 200 meters and is 8 times denser (and more saline) than the overlying seawater. The sharp pycnocline prevents any significant vertical mixing and serves as a particle trap for sinking organic matter. These rapid changes in salinity, oxygen, organic matter, and other geochemical parameters present unique conditions for the microbial communities present. We collected samples in 10m intervals throughout the chemocline. After filtering the water, we used high-throughput bacterial and archaeal 16S rRNA gene sequencing to characterize the changing microbial community along the Orca Basin chemocline. The results reveal a dominance of microbial taxa whose biogeochemical function is entirely unknown. We then used metagenomic sequencing and reconstructed genomes for select samples, revealing the potential dominant metabolic processes in the Orca Basin chemocline. Understanding how these unique geochemical conditions shape microbial communities and metabolic capabilities will have implications for the ocean's biogeochemical cycles and the consequences of expanding oxygen minimum zones.

  11. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    OpenAIRE

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01

    This chapter explores stereotype threat in organizational contexts. Building on the understanding that stereotype threat involves concerns about confirming a negative stereotype about one’s group, we begin by elucidating the scope of potential stereotype threat effects in organizations. We first examine the ubiquity of evaluations in organizations, which are at the heart of stereotype threat. Next we specify the potential psychological consequences of stereotype threat on targeted individua...

  12. The new Board of Governors

    International Nuclear Information System (INIS)

    1964-01-01

    Full text: Miss Blanche Margaret Meagher was elected chairman of the IAEA Board of Governors for 1964-65, after the new Board had been constituted at the Eighth Session of the General Conference in September. Since 1962 Miss Meagher has been Canadian Ambassador to Austria, and Canadian Governor of the Agency. Miss Meagher joined the Canadian Department of External Affairs in 1942, and has held a number of foreign diplomatic appointments; she has also served on Canadian delegations to the UN Educational, Scientific and Cultural Organization, the International Telecommunication Union, the Economic and Social Council of UN and the UN Disarmament Sub-Committee. The Vice-Chairmen of the Board are Mr. Wilhelm Billig (Poland) and Mr. Hassan M. Tohamy (UAR). Mr. Billig is Chairman of the State Council for Atomic Energy, and High Commissioner for Peaceful Uses of Atomic Energy. Mr. Tohamy is Ambassador to Austria, and Resident Representative to the Agency. Of the twelve elected members of the Board, five were chosen by the General Conference in 1964 for two years, viz. Argentina, Chile, Netherlands, Thailand and the United Arab Republic. Seven were elected in 1963: Afghanistan, China, Congo (Leopoldville), Morocco, Romania, Switzerland and Uruguay. The remaining thirteen members have been designated by the Board: Australia, Belgium, Brazil, Canada, Finland, France, India, Japan, Poland, South Africa, USSR, United Kingdom and United States. (author)

  13. Hospital board structure: changing form and changing issues.

    Science.gov (United States)

    Tregoning, S

    2000-01-01

    Economic and social pressures are compelling many hospitals to consider their current board structure in an effort to position their hospital to meet changing demands. A national profile of the structures of hospital boards has been compiled from a questionnaire completed by hospital board representatives from both government and non-government sectors. Results show that hospital board structures are a hybrid of both philanthropic and corporate models. New structures may be required to meet future challenges. In developing new structures, consideration should be given to identifying the skills and processes required to undertake board business.

  14. 12 CFR 905.4 - Duties of the Finance Board.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Duties of the Finance Board. 905.4 Section 905.4 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS DESCRIPTION OF ORGANIZATION AND FUNCTIONS Functions and Responsibilities of Finance Board § 905.4 Duties of the Finance Board. (a) Bank Syste...

  15. Microbial electrode sensor for alcohols

    Energy Technology Data Exchange (ETDEWEB)

    Hikuma, M [Ajinomoto Co., Inc., Kawasaki, Japan; Kubo, T; Yasuda, T; Karube, I; Suzuki, S

    1979-10-01

    A microbial electrode consisting of immobilized microorganisms, a gas permeable Teflon membrane, and an oxygen electrode was prepared for the continuous determination of methyl and ethyl alcohols. Immobilized Trichosporon brassicae was employed for a microbial electrode sensor for ethyl alcohol. When a sample solution containing ethyl alcohol was injected into a microbial electrode system, the current of the electrode decreased markedly with time until a steady state was reached. The response time was within 10 min by the steady state method and within 6 min by the pulse method. A linear relationship was observed between the current decrease and the concentration of ethyl alcohol below 22.5 mg/liter. The current was reproducible within +- 6% of the relative error when a sample solution containing 16.5 mg/liter ethyl alcohol. The standard deviation was 0.5 mg/liter in 40 experiments. The selectivity of the microbial electrode sensor for ethyl alcohol was satisfactory. The microbial electrode sensor was applied to a fermentation broth of yeasts and satisfactory comparative results were obtained (correlation coefficient 0.98). The current output of the microbial electrode sensor was almost constant for more than three weeks and 2100 assays. A microbial electrode sensor using immobilized bacteria for methyl alcohol was also described.

  16. Global microbialization of coral reefs.

    Science.gov (United States)

    Haas, Andreas F; Fairoz, Mohamed F M; Kelly, Linda W; Nelson, Craig E; Dinsdale, Elizabeth A; Edwards, Robert A; Giles, Steve; Hatay, Mark; Hisakawa, Nao; Knowles, Ben; Lim, Yan Wei; Maughan, Heather; Pantos, Olga; Roach, Ty N F; Sanchez, Savannah E; Silveira, Cynthia B; Sandin, Stuart; Smith, Jennifer E; Rohwer, Forest

    2016-04-25

    Microbialization refers to the observed shift in ecosystem trophic structure towards higher microbial biomass and energy use. On coral reefs, the proximal causes of microbialization are overfishing and eutrophication, both of which facilitate enhanced growth of fleshy algae, conferring a competitive advantage over calcifying corals and coralline algae. The proposed mechanism for this competitive advantage is the DDAM positive feedback loop (dissolved organic carbon (DOC), disease, algae, microorganism), where DOC released by ungrazed fleshy algae supports copiotrophic, potentially pathogenic bacterial communities, ultimately harming corals and maintaining algal competitive dominance. Using an unprecedented data set of >400 samples from 60 coral reef sites, we show that the central DDAM predictions are consistent across three ocean basins. Reef algal cover is positively correlated with lower concentrations of DOC and higher microbial abundances. On turf and fleshy macroalgal-rich reefs, higher relative abundances of copiotrophic microbial taxa were identified. These microbial communities shift their metabolic potential for carbohydrate degradation from the more energy efficient Embden-Meyerhof-Parnas pathway on coral-dominated reefs to the less efficient Entner-Doudoroff and pentose phosphate pathways on algal-dominated reefs. This 'yield-to-power' switch by microorganism directly threatens reefs via increased hypoxia and greater CO2 release from the microbial respiration of DOC.

  17. Governing Board of the Pension Fund

    CERN Multimedia

    2006-01-01

    The Governing Board of the Pension Fund held its one-hundred-and-fortieth meeting on 14 February 2006. Professor F. Ferrini, the Board's new Chairman, welcomed Mr C. Hauviller, new member of the Board, and Mr P. Martel and Professor D.-O. Riska, new alternate members. In his opening remarks as Chairman, Professor Ferrini set out his views on the role of the Governing Board. Within the general context of the Organization, whose priority continues to be LHC completion, the Fund has a duty to send a clear signal to the Council, the Management, the active members and the beneficiaries that it is committed to resolving the serious problems it faces. In concrete terms, the Governing Board's work should be guided by some general principles: it is of the utmost importance to re-establish an atmosphere of trust and cooperation between the various parties to the Fund; wherever possible, all opinions voiced will have to be taken into account; issues relating to pension guarantees will have to be given active attentio...

  18. Governing Board of the Pension Fund

    CERN Multimedia

    2005-01-01

    The Governing Board of the Pension Fund held its one hundred-and-twenty-eighth and one hundred and-twenty-ninth meetings on 2 November and 7 December 2004 respectively. At the first of these two meetings, the Governing Board was requested to deal with an urgent request relating to the procedure for the election of two members and two alternates to the Board. The members of the Board decided to cancel the voting procedure under way at that time on the grounds that one of the candidates had benefited from special publicity from the Staff Association that ran counter to the spirit of the Rules and Regulations of the Fund and could potentially influence the outcome of the elections. It was decided that a new round of voting should be organised to ensure a fair procedure. As announced in the Weekly Bulletin of 6 December 2004, the new vote was deferred to January 2005. The Governing Board then took note of a document setting out the large number of proposals from its members concerning possible measures to impr...

  19. Governing Board of the Pension Fund

    CERN Multimedia

    2004-01-01

    The Governing Board of the Pension Fund held its one-hundred-and twenty-sixth meeting on 7th September 2004. The first main item on the agenda was a report by the Chairman, J. Bezemer, on the June meetings of the CERN Council and its committees. Dr Bezemer reported that, at its June session, the Council had unanimously approved the 2003 annual report and accounts of the Pension Fund. and had appointed himself and Mr P. Levaux members of the Governing Board for periods of 18 months1 and 3 years respectively, with J.-P. Ruder and F. Bello as their respective alternates. On the basis of a recommendation first made by the Governing Board in October 2002 and confirmed at its June 2004 meeting, the Council had also re-appointed Dr Bezemer Chairman of the Governing Board for a period of 18 months*. A further item on the Governing Board's agenda was the examination of the half-yearly accounts, namely the profit and loss account, the contributions and benefits account and the balance sheet. J. Steel and the Administ...

  20. Governing Board of the Pension Fund

    CERN Multimedia

    2005-01-01

    The Governing Board of the Pension Fund held its 133rd and 134th meetings on 20 April and 17 May respectively. The President of the CERN Council, Professor E. Iarocci, attended part of the first of these two meetings in order to inform the members of the Governing Board in person of the decisions affecting the Pension Fund taken at the March Session of Council. He underlined that the Council, meeting in Restricted Session, had approved an amendment to the procedure for the appointment of the Chairman of the Governing Board of the Pension Fund as well as the setting of a limit on the terms of office of members of the Board. He further informed the Board that the Council had unanimously decided to set up a new Working Group, "Osnes II", composed of four Council representatives (Professor E. Osnes, (Chair), Professor J. Niederle, Mr C. Van Riel and Mr P. Williams) and of four Fund members: one member appointed by the Director-General (Dr E. Chiaveri); one member appointed by the Staff Association (Dr J.-P. Math...