WorldWideScience

Sample records for stakes health threat

  1. Stereotype Threat, Inquiring about Test Takers' Race and Gender, and Performance on Low-Stakes Tests in a Large-Scale Assessment. Research Report. ETS RR-15-02

    Science.gov (United States)

    Stricker, Lawrence J.; Rock, Donald A.; Bridgeman, Brent

    2015-01-01

    This study explores stereotype threat on low-stakes tests used in a large-scale assessment, math and reading tests in the Education Longitudinal Study of 2002 (ELS). Issues identified in laboratory research (though not observed in studies of high-stakes tests) were assessed: whether inquiring about their race and gender is related to the…

  2. Why Has High-Stakes Testing So Easily Slipped into Contemporary American Life?

    Science.gov (United States)

    Nichols, Sharon L.; Berliner, David C.

    2008-01-01

    High-stakes testing is the practice of attaching important consequences to standardized test scores, and it is the engine that drives the No Child Left Behind (NCLB) Act. The rationale for high-stakes testing is that the promise of rewards and the threat of punishments will cause teachers to work more effectively, students to be more motivated,…

  3. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  4. One Health Perspectives on Emerging Public Health Threats

    Directory of Open Access Journals (Sweden)

    Sukhyun Ryu

    2017-11-01

    Full Text Available Antimicrobial resistance and emerging infectious diseases, including avian influenza, Ebola virus disease, and Zika virus disease have significantly affected humankind in recent years. In the premodern era, no distinction was made between animal and human medicine. However, as medical science developed, the gap between human and animal science grew deeper. Cooperation among human, animal, and environmental sciences to combat emerging public health threats has become an important issue under the One Health Initiative. Herein, we presented the history of One Health, reviewed current public health threats, and suggested opportunities for the field of public health through better understanding of the One Health paradigm.

  5. Women's Health: The Biggest Threats to Women's Health are often Preventable.

    Science.gov (United States)

    Healthy Lifestyle Women's health The biggest threats to women's health are often preventable. Here's what you need to know to live ... Clinic Staff Many of the leading threats to women's health can be prevented — if you know how. ...

  6. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    OpenAIRE

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, ste...

  7. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  8. Stakes Matter in Ultimatum Games

    DEFF Research Database (Denmark)

    Andersen, Steffen; Ertaç, Seda; Gneezy, Uri

    2011-01-01

    One of the most robust findings in experimental economics is that individuals in one-shot ultimatum games reject unfair offers. Puzzlingly, rejections have been found robust to substantial increases in stakes. By using a novel experimental design that elicits frequent low offers and uses much...... larger stakes than in the literature, we are able to examine stakes' effects over ranges of data that are heretofore unexplored. Our main result is that proportionally equivalent offers are less likely to be rejected with high stakes. In fact, our paper is the first to present evidence that as stakes...

  9. Raising the stakes: How students' motivation for mathematics associates with high- and low-stakes test achievement.

    Science.gov (United States)

    Simzar, Rahila M; Martinez, Marcela; Rutherford, Teomara; Domina, Thurston; Conley, AnneMarie M

    2015-04-01

    This study uses data from an urban school district to examine the relation between students' motivational beliefs about mathematics and high- versus low-stakes math test performance. We use ordinary least squares and quantile regression analyses and find that the association between students' motivation and test performance differs based on the stakes of the exam. Students' math self-efficacy and performance avoidance goal orientation were the strongest predictors for both exams; however, students' math self-efficacy was more strongly related to achievement on the low-stakes exam. Students' motivational beliefs had a stronger association at the low-stakes exam proficiency cutoff than they did at the high-stakes passing cutoff. Lastly, the negative association between performance avoidance goals and high-stakes performance showed a decreasing trend across the achievement distribution, suggesting that performance avoidance goals are more detrimental for lower achieving students. These findings help parse out the ways motivation influences achievement under different stakes.

  10. Attentional bias towards health-threat information in chronic fatigue syndrome.

    Science.gov (United States)

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  11. Power affects performance when the pressure is on: evidence for low-power threat and high-power lift.

    Science.gov (United States)

    Kang, Sonia K; Galinsky, Adam D; Kray, Laura J; Shirako, Aiwa

    2015-05-01

    The current research examines how power affects performance in pressure-filled contexts. We present low-power-threat and high-power-lift effects, whereby performance in high-stakes situations suffers or is enhanced depending on one's power; that is, the power inherent to a situational role can produce effects similar to stereotype threat and lift. Three negotiations experiments demonstrate that role-based power affects outcomes but only when the negotiation is diagnostic of ability and, therefore, pressure-filled. We link these outcomes conceptually to threat and lift effects by showing that (a) role power affects performance more strongly when the negotiation is diagnostic of ability and (b) underperformance disappears when the low-power negotiator has an opportunity to self-affirm. These results suggest that stereotype threat and lift effects may represent a more general phenomenon: When the stakes are raised high, relative power can act as either a toxic brew (stereotype/low-power threat) or a beneficial elixir (stereotype/high-power lift) for performance. © 2015 by the Society for Personality and Social Psychology, Inc.

  12. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study.

    Science.gov (United States)

    Abdou, Cleopatra M; Fingerhut, Adam W; Jackson, James S; Wheaton, Felicia

    2016-02-01

    Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. Copyright © 2016. Published by Elsevier Inc.

  13. Security Threats Emerging from the Middle East and North Africa

    OpenAIRE

    Çınar, Bekir

    2015-01-01

    The main security threats affecting the Middle East and North African (MENA) region arise from energy insecurity, immigration and terrorism. These threats would remain if authorities and other stake holders do not address the root causes of the problems, which are artificial national borders, authoritarian regimes and lack of pluralist education. This paper suggests that lifting state borders and setting up regional economic communities such as the EU may ease conflicts in the region which ca...

  14. The globalization of public health, I: Threats and opportunities.

    Science.gov (United States)

    Yach, D; Bettcher, D

    1998-01-01

    The globalization of public health poses new threats to health but also holds important opportunities in the coming century. This commentary identifies the major threats and opportunities presented by the process of globalization and emphasizes the need for transnational public health approaches to take advantage of the positive aspects of global change and to minimize the negative ones. Transnational public health issues are areas of mutual concern for the foreign policies of all countries. These trends indicate a need for cross-national comparisons (e.g., in the areas of health financing and policy development) and for the development of a transnational research agenda in public health. PMID:9585736

  15. The energy stakes - After Fukushima. 2. ed.

    International Nuclear Information System (INIS)

    Iacona, Estelle; Taine, Jean; Tamain, Bernard

    2012-01-01

    The energy question today is worldwide and depends on major geopolitical stakes (demography, development, water, health, environment, research, risks). The energy must be universally produced and distributed together with minimizing pollutions, nuclear risks and CO 2 emissions. This new edition of 'the energy stakes' is fully updated and approaches some of the main questions that any responsible citizen should ask. It comprises 3 parts dealing with: a comprehensive review of the energy question in most of countries in the world, the constraints and challenges to take up to manage energy in an optimum way, and a prospective study about the control of energy consumption and about the existing technical solutions. (J.S)

  16. [Health threats and health system crises. An approach to early warning and response. 2008 SESPAS Report].

    Science.gov (United States)

    Simón Soria, Fernando; Guillén Enríquez, Francisco Javier

    2008-04-01

    The world is changing more and faster than ever before. New diseases are coming to light each year, controlled diseases are reemerging as potential threats, and natural or man-made disasters are increasingly affecting human health. The "International Health Regulations (2005)" reflect the changes in the response of public health to this new situation. Surveillance of specific diseases and predefined control measures have been replaced by surveillance of public health events of international concern and control measures adapted to each situation. The public health events of international interest are characterized by their seriousness, predictability, the risk of international spread and potential for travel or trade restrictions. The development of the European Early Warning and Response System in 1998 and the creation of the European Center for Disease Prevention and Control in 2005 demonstrate political commitment in Europe, with early detection of and response to public health threats. However, timely risk evaluation and response at a national level requires improved data digitalization and accessibility, automatic notification processes, data analysis and dissemination of information, the combination of information from multiple sources and adaptation of public health services. The autonomous regions in Spain are initiating this adaptation process, but interoperability between systems and the development of guidelines for a coordinated response should be steered by the National Interregional Health Council and coordinated by the Ministry of Health. Efficient early warning systems of health threats that allow for a timely response and reduce uncertainty about information would help to minimize the risk of public health crises. The profile of public health threats is nonspecific. Early detection of threats requires access to information from multiple sources and efficient risk assessment. Key factors for improving the response to public health threats are the

  17. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  18. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  19. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  20. Workplace threats to health and job turnover among women workers.

    Science.gov (United States)

    Gucer, Patricia W; Oliver, Marc; McDiarmid, Melissa

    2003-07-01

    Is job turnover related to concern about workplace health risks? Using data from a national sample of working women, we examined the relationships among workplace risk communications, worker concerns about workplace threats from hazardous substances, indoor air quality, and job change. Eight percent reported changing a job as a result of concern over workplace threats to health. Previous workplace injury predicted concern about hazardous materials and indoor air quality as well as job change, but employer communication about workplace health risks was associated with less job change and less concern about indoor air quality. Women worry about workplace threats to their health enough to change their jobs, but employers may have the power to cut turnover costs and reduce disruption to workers' lives through the use of risk communication programs.

  1. Stereotype Threat Among Black and White Women in Health Care Settings

    Science.gov (United States)

    Abdou, Cleopatra M.; Fingerhut, Adam W.

    2016-01-01

    The first of its kind, the present experiment applied stereotype threat—the threat of being judged by or confirming negative group-based stereotypes—to the health sciences. Black and White women (N = 162) engaged in a virtual health care situation. In the experimental condition, one’s ethnic identity and negative stereotypes of Black women specifically were made salient. As predicted, Black women in the stereotype threat condition who were strongly identified as Black (in terms of having explored what their ethnic identity means to them and the role it plays in their lives) reported significantly greater anxiety while waiting to see the doctor in the virtual health care setting than all other women. It is hypothesized that stereotype threat experienced in health care settings is one overlooked social barrier contributing to disparities in health care utilization and broader health disparities among Black women. PMID:25045944

  2. Small Stakes Risk Aversion in the Laboratory

    DEFF Research Database (Denmark)

    Harrison, Glenn W.; Lau, Morten I.; Ross, Don

    2017-01-01

    Evidence of risk aversion in laboratory settings over small stakes leads to a priori implausible levels of risk aversion over large stakes under certain assumptions. One core assumption in statements of this calibration puzzle is that small-stakes risk aversion is observed over all levels of wealth...

  3. Microbial Threats to Health: Emergence, Detection, and Response

    National Research Council Canada - National Science Library

    Smolinski, Mark S; Hamburg, Margaret A; Lederberg, Joshua

    2003-01-01

    .... The recent SARS outbreak is a prime example. Knowing neither geographic nor political borders, often arriving silently and lethally, microbial pathogens constitute a grave threat to the health of humans...

  4. Ebola virus – new threat to global health

    Directory of Open Access Journals (Sweden)

    Rina K. Kusumaratna

    2015-12-01

        The Ebola virus outbreak constitutes a serious warning that epidemics may occur anywhere and places every afflicted nation at risk. Therefore it is essential to institute measures to stop its spread and its future threat, which is a moral obligation of members of the health profession, whether academicians, researchers, or health ministry officials.

  5. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Directory of Open Access Journals (Sweden)

    Bettina J Casad

    2016-01-01

    Full Text Available Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  6. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Science.gov (United States)

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681

  7. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.

    Science.gov (United States)

    Casad, Bettina J; Bryant, William J

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  8. Value-Added Models for Teacher Preparation Programs: Validity and Reliability Threats, and a Manageable Alternative

    Science.gov (United States)

    Brady, Michael P.; Heiser, Lawrence A.; McCormick, Jazarae K.; Forgan, James

    2016-01-01

    High-stakes standardized student assessments are increasingly used in value-added evaluation models to connect teacher performance to P-12 student learning. These assessments are also being used to evaluate teacher preparation programs, despite validity and reliability threats. A more rational model linking student performance to candidates who…

  9. Does self-threat promote social connection? The role of self-esteem and contingencies of self-worth.

    Science.gov (United States)

    Park, Lora E; Maner, Jon K

    2009-01-01

    Six studies examined the social motivations of people with high self-esteem (HSE) and low self-esteem (LSE) following a threat to a domain of contingent self-worth. Whether people desired social contact following self-threat depended on an interaction between an individual's trait self-esteem and contingencies of self-worth. HSE participants who strongly based self-worth on appearance sought to connect with close others following a threat to their physical attractiveness. LSE participants who staked self-worth on appearance wanted to avoid social contact and, instead, preferred a less interpersonally risky way of coping with self-threat (wanting to enhance their physical attractiveness). Implications for theories of self-esteem, motivation, and interpersonal processes are discussed.

  10. Adapting to the Changing Climate: An Assessment of Local Health Department Preparations for Climate Change-Related Health Threats, 2008-2012.

    Science.gov (United States)

    Roser-Renouf, Connie; Maibach, Edward W; Li, Jennifer

    2016-01-01

    Climate change poses a major public health threat. A survey of U.S. local health department directors in 2008 found widespread recognition of the threat, but limited adaptive capacity, due to perceived lack of expertise and other resources. We assessed changes between 2008 and 2012 in local public health departments' preparedness for the public health threats of climate change, in light of increasing national polarization on the issue, and widespread funding cutbacks for public health. A geographically representative online survey of directors of local public health departments was conducted in 2011-2012 (N = 174; response rate = 50%), and compared to the 2008 telephone survey results (N = 133; response rate = 61%). Significant polarization had occurred: more respondents in 2012 were certain that the threat of local climate change impacts does/does not exist, and fewer were unsure. Roughly 10% said it is not a threat, compared to 1% in 2008. Adaptation capacity decreased in several areas: perceived departmental expertise in climate change risk assessment; departmental prioritization of adaptation; and the number of adaptation-related programs and services departments provided. In 2008, directors' perceptions of local impacts predicted the number of adaptation-related programs and services their departments offered, but in 2012, funding predicted programming and directors' impact perceptions did not. This suggests that budgets were constraining directors' ability to respond to local climate change-related health threats. Results also suggest that departmental expertise may mitigate funding constraints. Strategies for overcoming these obstacles to local public health departments' preparations for climate change are discussed.

  11. Small Stakes Risk Aversion in the Laboratory

    DEFF Research Database (Denmark)

    Harrison, Glenn W.; Lau, Morten; Ross, Don

    Evidence of risk aversion in laboratory settings over small stakes leads to a priori implausible levels of risk aversion over large stakes under certain assumptions. One core assumption in standard statements of this calibration puzzle is that individuals define utility over terminal wealth......, and that terminal wealth is defined as the sum of extra-lab wealth and any wealth accumulated in the lab. This assumption is often used in Expected Utility Theory, as well as popular alternatives such as RankDependent Utility theory. Another core assumption is that the small-stakes risk aversion is observed over...... all levels of wealth, or over a “sufficiently large” range of wealth. Although this second assumption if often viewed as self-evident from the vast experimental literature showing risk aversion over laboratory stakes, it actually requires that lab wealth be varied for a given subject as one takes...

  12. Health and environmental threats associated with the destruction of chemical weapons.

    Science.gov (United States)

    Matousek, Jirí

    2006-09-01

    Still existing arsenals of chemical weapons (CW) pose not only security threats for possible use in hostilities by state actors or misuse by terrorists but also safety threats to humans and biota due to leakages and possible accidents. The Chemical Weapons Convention (CWC) commits the States Parties (SPs) to destroy CW using technologies taking into consideration human health and environmental protection. It does not allow methods, routinely used up to the 1970s, such as earth burial, open-pit burning, and sea dumping. Long-term health and environmental threats and some accidents that have already occurred in the known localities of the sea-dumped and earth-buried arsenals of Nazi-German armed forces in the Baltic Region and of Imperial Japanese forces in the Far East Region are analyzed according to the impact of major CW and ammunition types (i.e., sulfur mustard--HD, tabun--GA, arsenicals--DA, DC, DM, arsine oil, and chloroacetophenone--CN). Any possible operations and handling with CW envisaged by the CWC as well as their verification are summarized taking into account the health threat they pose. CW and toxic armament waste to be destroyed and applied technologies (both developed and under current use in operational CW destruction facilities [CWDF]) are reviewed as are systems of health safety and environmental protection of the destruction/demilitarization stems from the extraordinary high toxicity of supertoxic lethal agents in man and biota. Problems of currently used Russian and U.S. standards for maximum allowable workplace concentrations and general population limits and possibilities of their determination by available analytical instrumentation are discussed.

  13. Terrorism: a public health threat with a trauma system response.

    Science.gov (United States)

    Jacobs, Lenworth M; Burns, Karyl J; Gross, Ronald I

    2003-12-01

    The threat of mass casualties and widespread infectious disease caused by terrorism is now a challenge for our government and public health system. Funds have been granted to the states by the Centers for Disease Control and Prevention and the Health Resources and Services Administration to establish bioterrorism preparedness and response capabilities. Hartford Hospital has been designated as a Center of Excellence for Bioterrorism Preparedness by the Commissioner of the Connecticut Department of Public Health. The Center of Excellence has implemented strategies to prepare for a possible bioterrorist attack. A unique model that combines epidemiology and traumatology is being used to guide the preparedness activities. Although the focus of the grant from the Connecticut Department of Public Health is bioterrorism, the application of the model can apply to preparation for all terrorist events. Implementation of strategies indicates that bioterrorism preparedness is well underway. Similar initiatives should be achievable by other trauma systems throughout the country. A Center of Excellence for Bioterrorism Preparedness in Connecticut is successfully modifying a trauma system to meet the challenge of a new public health threat, terrorism.

  14. More on Inoculating Against Reactance to Persuasive Health Messages: The Paradox of Threat.

    Science.gov (United States)

    Richards, Adam S; Banas, John A; Magid, Yoav

    2017-07-01

    This research examined the efficacy of inoculation as a strategy to mitigate psychological reactance based on the level of threat communicated in the forewarning and subsequent persuasive health appeal. Two 2 (inoculation) × 2 (freedom-threatening language) experiments were conducted. The first (N = 181) used elaborated inoculation designed to enhance the threat of impending reactance to a message advocating for responsible alcohol consumption. The second (N = 159) used limited inoculation designed to minimize the threat of impending reactance to a message advocating for responsible soft drink consumption. Results showed that elaborated inoculation increased reactance, whereas limited inoculation decreased reactance but only when the subsequent appeal used less freedom-threatening language. These findings suggest that inoculation has the potential to facilitate or buffer reactance depending on the level of threat communicated in inoculation forewarnings and in subsequent persuasive health appeals.

  15. Cyber threats to health information systems: A systematic review.

    Science.gov (United States)

    Luna, Raul; Rhine, Emily; Myhra, Matthew; Sullivan, Ross; Kruse, Clemens Scott

    2016-01-01

    Recent legislation empowering providers to embrace the electronic exchange of health information leaves the healthcare industry increasingly vulnerable to cybercrime. The objective of this systematic review is to identify the biggest threats to healthcare via cybercrime. The rationale behind this systematic review is to provide a framework for future research by identifying themes and trends of cybercrime in the healthcare industry. The authors conducted a systematic search through the CINAHL, Academic Search Complete, PubMed, and ScienceDirect databases to gather literature relative to cyber threats in healthcare. All authors reviewed the articles collected and excluded literature that did not focus on the objective. Researchers selected and examined 19 articles for common themes. The most prevalent cyber-criminal activity in healthcare is identity theft through data breach. Other concepts identified are internal threats, external threats, cyber-squatting, and cyberterrorism. The industry has now come to rely heavily on digital technologies, which increase risks such as denial of service and data breaches. Current healthcare cyber-security systems do not rival the capabilities of cyber criminals. Security of information is a costly resource and therefore many HCOs may hesitate to invest what is required to protect sensitive information.

  16. Frightfully funny: combining threat and humour in health messages for men and women.

    Science.gov (United States)

    Hendriks, Hanneke; Janssen, Loes

    2018-05-01

    It is imperative for public health to investigate what factors may reduce defensive responses and increase the effectiveness of health information. The present research investigated gender differences in responses to threatening health-promoting information communicated with humour. Male and female participants were exposed to a health message stressing the negative consequences of binge drinking (Experiment 1; N = 209) or caffeine consumption (Experiment 2; N = 242), that did or did not contain a funny visual metaphor (Experiment 1) or a slapstick cartoon (Experiment 2). Message evaluation, message attention, and attitudes and intentions towards the behaviour were measured. Results showed that health messages were more persuasive when communicated with humour, although humour played a different role for men and women. Whereas men responded more in line with message goals when the message combined high threat with humour, women preferred the low threat humour messages. By uncovering the moderating role of gender as a key audience characteristic, this research contributes to designing effective future health campaigns and provides important insights for future studies investigating the underlying mechanisms responsible for the different effects of threat and humour appeals for men and women.

  17. French government to trim direct stake in Total

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that the French government has decided to slash its direct stake in partly state owned oil company Total to 5% from 31.7%, a surprise move expected to raise 10 billion francs ($1.8 billion). At the same time, other state owned entities will be asked to boost their combined 2.2% stake in Total to 10%, leaving the government with a net 15% interest in Total vs. the current 34%. Initially, state owned insurance companies Groupe des Assurances Nationales and Assurances Generale de France will be asked to hike their stakes in Total, but others could be asked to join if needed to meet the 10% target. The government the its phase-down of participation in Total, established in 1924 to manage French interests in Iraq Petroleum Co., was prompted by the evolution of the oil context, which differs greatly from what had prompted a significant stake of the state in Total's capital

  18. Risk preferences over small stakes: Evidence from deductible choice

    OpenAIRE

    Janko Gorter; Paul Schilp

    2012-01-01

    This paper provides new field evidence on risk preferences over small stakes. Using unique population and survey data on deductible choice in Dutch universal health insurance, we find that risk preferences are a dominant factor in decision aking. In fact, our results indicate that risk preferences are both statistically and quantitatively more significant in explaining deductible choice behavior than risk type. This finding contrasts with classical expected utility theory, as it implies risk ...

  19. High-stakes educational testing and democracy

    DEFF Research Database (Denmark)

    Ydesen, Christian

    2014-01-01

    This article investigates the relation between high-stakes educational testing and democracy drawn from the experiences of 20th-century high-stakes educational testing practices in the Danish history of education. The article presents various concepts of democracy using leading propositions within...... the field of education. Then a sample of relevant historic case studies are examined in light of these definitions. Among other things, the article concludes that a combination of different evaluation technologies – some formative and some summative – might be the safest way to go from a democratic...

  20. A Conceptualization of Threat Communications and Preventive Health Behavior.

    Science.gov (United States)

    Beck, Kenneth H.; Frankel, Arthur

    Making others especially fearful of what can happen if they ignore the advice given in a health-threat warning (fear appeal) encourages their acceptance of the message most of the time, though occasionally this strategy backfires. Current formulations of fear appeals are unable to reconcile these findings satisfactorily. The drive model notion…

  1. Karm betoon, roheline kanjon : STAKES-i ja Senati kinnisvara büroo, Lintulahdenkuja 4, Sörnäinen, Helsingi = Office Facilities for the National Research and Development Centre for Welfare an Health (STAKES) and Senate Properties / Mikko Heikkinen,

    Index Scriptorium Estoniae

    Heikkinen, Mikko

    2004-01-01

    Senati kinnisvarafirma valis oma peakorteri asukohaks endise lao. Samas ehitati STAKES-i uus hoone. Projekteerija: Heikkinen-Komonen OY. Autorid Mikko Heikkinen, Markku Komonen. Sisekujundus: Suunnittelupalvelut (STAKES), Heikkinen-Komonen (Senat). Maastikukujundus: Byman & Ruokonen. Valmis 2002. I korruse plaan, välis- ja sisevaated

  2. Large Stroke High Fidelity PZN-PT Single-Crystal "Stake" Actuator.

    Science.gov (United States)

    Huang, Yu; Xia, Yuexue; Lin, Dian Hua; Yao, Kui; Lim, Leong Chew

    2017-10-01

    A new piezoelectric actuator design, called "Stake" actuator, is proposed and demonstrated in this paper. As an example, the stake actuator is made of four d 32 -mode PZN-5.5%PT single crystals (SCs), each of 25 mm ( L ) ×8 mm ( W ) ×0.4 mm (T) in dimensions, bonded with the aid of polycarbonate edge guide-cum-stiffeners into a square-pipe configuration for improved bending and twisting strengths and capped with top and bottom pedestals made of 1.5-mm-thick anodized aluminum. The resultant stake actuator measured 9 mm ×9 mm ×28 mm. The hollow structure is a key design feature, which optimizes SC usage efficiency and lowers the overall cost of the actuator. The displacement-voltage responses, blocking forces, resonance characteristics of the fabricated stake actuator, as well as the load and temperature effects, are measured and discussed. Since d 32 is negative for [011]-poled SC, the "Stake" actuator contracts in the axial direction when a positive-polarity field is applied to the crystals. Biased drive is thus recommended when extensional displacement is desired. The SC stake actuator has negligible (0.13% when driven up to +300 V (i.e., 0.75 kV/mm), which is close to the rhombohedral-to-orthorhombic transformation field ( E RO ) of 0.85 kV/mm of the SC used. The stake actuator displays a stroke of [Formula: see text] (at +300 V) despite its small overall dimensions, and has a blocking force of 114 N. The SC d 32 stake actuator fabricated displays more than 30% larger axial strain than the state-of-the-art PZT stack actuators of comparable length as well as moderate blocking forces. Said actuators are thus ideal for applications when large displacements with simple open-loop control are preferred.

  3. When does risk perception predict protection motivation for health threats? A person-by-situation analysis

    Science.gov (United States)

    Klein, William M. P.; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation. PMID:29494705

  4. When does risk perception predict protection motivation for health threats? A person-by-situation analysis.

    Science.gov (United States)

    Ferrer, Rebecca A; Klein, William M P; Avishai, Aya; Jones, Katelyn; Villegas, Megan; Sheeran, Paschal

    2018-01-01

    Although risk perception is a key concept in many health behavior theories, little research has explicitly tested when risk perception predicts motivation to take protective action against a health threat (protection motivation). The present study tackled this question by (a) adopting a multidimensional model of risk perception that comprises deliberative, affective, and experiential components (the TRIRISK model), and (b) taking a person-by-situation approach. We leveraged a highly intensive within-subjects paradigm to test features of the health threat (i.e., perceived severity) and individual differences (e.g., emotion reappraisal) as moderators of the relationship between the three types of risk perception and protection motivation in a within-subjects design. Multi-level modeling of 2968 observations (32 health threats across 94 participants) showed interactions among the TRIRISK components and moderation both by person-level and situational factors. For instance, affective risk perception better predicted protection motivation when deliberative risk perception was high, when the threat was less severe, and among participants who engage less in emotional reappraisal. These findings support the TRIRISK model and offer new insights into when risk perceptions predict protection motivation.

  5. RWE sells Nafta stake

    International Nuclear Information System (INIS)

    Janoska, J.

    2004-01-01

    At year-end 2000, state-owned Slovensky plynarensky priemysel (SPP) signed a Memorandum of Understanding that set the conditions for the German concern RWE to purchase a 40 % stake in Nafta Gbely. This partnership agreement was meant to grant RWE participation in the management of the gas storage operator, which is controlled by SPP, and allow RWE to increase the use of Nafta's capacities. But in the 3 years since then, these objectives were not met. RWE representatives were not appointed to the Nafta Board and not a single cubic meter of RWE gas was stored at Nafta. RWE denied that it was considering leaving Nafta. Control of Nafta and SPP gradually passed to RWE's major competitors. The attitude of RWE only changed last week, when it sold its stake in Nafta to Ruhrgas under favourable conditions. Although Ruhrgas already more or less controlled Nafta via SPP, it paid RWE 62.22 million Eur for its stake. This represents a price per share of about 12.44 Eur more than RWE paid over two years ago and about double the market price. One of the possible reasons why RWE decided to leave the company is, apart from uncertainty surrounding future participation in the company management, uncertainty regarding whether there is a profit to be made on future dividends. Another reason may be the joint operation of both rivals in a number of companies. And so the Nafta trade may be part of the establishment of areas of influence

  6. Syrian Refugees: Are They a Non Traditional Threat to Water Supplies in Lebanon and Jordan

    Science.gov (United States)

    2016-09-01

    effects of Syrian refugees on the water supplies of each country as a non-traditional security threat. Political stability is the ultimate goal of each...security.html. 11 against Syrians sets the stage for political instability because the Syrians represent an increasing portion of the population, if...of political instability could send shockwaves through the region and drastically alter U.S. foreign policy in the Middle East. Though the stakes

  7. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers

    OpenAIRE

    Carey, R. N.; Sarma, K. M.

    2016-01-01

    BACKGROUND: Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. METHODS: To address limitati...

  8. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers

    OpenAIRE

    Rachel N. Carey; Kiran M. Sarma

    2016-01-01

    Background Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These ?threat appeals? feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. Methods To address limitations...

  9. Threats during sex work and association with mental health among young female sex workers in Hong Kong.

    Science.gov (United States)

    Mo, Phoenix K H; Mak, Winnie W S; Kwok, Yvonne T Y; Xin, Meiqi; Chan, Charlie W L; Yip, Louise W M

    2018-08-01

    Young female sex workers (YFSWs) are confronted with significant threats during sex work. The present cross-sectional study examined different levels of threats (i.e., threats to life and health, threats to humanity, threats to control of work and financial security, and the threats to future) experienced by 87 YFSWs (age 16-25) in Hong Kong, and identified their association with mental health (i.e., psychological well-being) together with other factors, including childhood trauma, self-efficacy, hope, and social support. Results showed that the participants encountered a significant number of threats. More than half reported that they had a condom removed by clients during sex (51.7%); or have been humililated by clients (51.7%). Because of sex work, about a quarter (25.3%) have had sexually transmitted disease, and respectively 10.3% and 12.6% have had abortion and unplanned pregnancy. The majority have had friends found out that they engaged in sex work (72.4%). They also showed a high level of worry about the various threats. Multiple linear regression analysis showed that childhood trauma (β = -.26) and worry about threats during sex work (β = -.22) were significantly negative predictors, while self-efficacy (β = .20) and hope (β = .27) were significantly positive predictors of mental health. Future services should improve YFSWs' skills to minimize potential threats during female sex work, address the structural correlates and relieve their worries, and empower them with more hope and self-efficacy in choosing clients.

  10. Threat of Deportation as Proximal Social Determinant of Mental Health Amongst Migrant Workers.

    Science.gov (United States)

    Harrigan, Nicholas M; Koh, Chiu Yee; Amirrudin, Amirah

    2017-06-01

    While migration health studies traditionally focused on socioeconomic determinants of health, an emerging body of literature is exploring migration status as a proximate cause of health outcomes. Study 1 is a path analysis of the predictors of mental health amongst 582 documented migrant workers in Singapore, and shows that threat of deportation is one of the most important proximate social determinants of predicted mental illness, and a mediator of the impact of workplace conflict on mental health. Study 2 is a qualitative study of the narratives of 149 migrant workers who were in workplace conflict with their employers, and demonstrates that workers believed threats were used as a negotiating strategy during workplace conflicts. Findings suggest that migration status places workers who come into workplace conflict with their employers at heightened risk of mental illness because migration status can be used as a tool by employers in workplace negotiations.

  11. Hantaviruses: an emerging public health threat in India? A review

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    is to increase awareness of these emerging pathogens and the threats they pose to the public health system. [Chandy S, Abraham P and ..... distribution of the hosts through international shipping routes. The majority of SEOV-related .... Dalrymple J M 1994 Serological relationships among viruses in the Hantavirus genus, ...

  12. International investment agreements and public health: neutralizing a threat through treaty drafting.

    Science.gov (United States)

    Mercurio, Bryan

    2014-07-01

    The high profile investment claims filed by Philip Morris challenging Uruguayan and Australian measures that restrict advertising and logos on tobacco packaging awakened the public health community to the existence and potential detrimental impact of international investment agreements (IIAs). More recently, Eli Lilly challenged Canada's invalidation of a pharmaceutical patent under an IIA. All of the cases claim that the intellectual property rights of the investor were infringed. As a result of these cases, many commentators and activists view IIAs as a threat to public health and have lobbied against their inclusion in ongoing trade negotiations. This article does not argue against IIAs. Instead, it seeks to demonstrate how more sophisticated treaty drafting can neutralize the threat to public health. In this regard, the article seeks to engage members of the public health community as campaigners not against IIAs but as advocates of better treaty drafting to ensure that IIAs do not infringe upon the right of a nation to take non-discriminatory measures for the promotion and protection of the health of their populations.

  13. Sexual orientation and self-rated health: the role of social capital, offence, threat of violence, and violence.

    Science.gov (United States)

    Axelsson, Jakob; Modén, Birgit; Rosvall, Maria; Lindström, Martin

    2013-07-01

    To study the association between sexual orientation and self-rated health, including trust, offence, threat of violence, and violence. DESIGN/SETTING/PARTICIPANTS/MEASUREMENT: The 2008 Public Health Survey in Skåne is a cross-sectional postal questionnaire study. A total of 28,198 persons aged 18-80 years responded (55%). Logistic regressions analysed the association between sexual orientation and self-rated health. 27.4% of all men and 30.0% of all women rated their health as poor. Poor self-rated health was significantly more prevalent in higher age, among immigrants, people with lower education, low social support, low trust, experience of being offended, experience of threat of violence and violence, and bisexual and other orientation. Homosexual and bisexual men and women had higher age-adjusted odds ratios of having felt offended compared to heterosexual respondents. The odds ratios of low trust, threat of violence (men), and experience of violence (women) were significant for respondents with bisexual orientation but not for respondents with homosexual orientation. In the age-adjusted model, no significant association was observed between homosexual orientation and poor self-rated health among women. All other associations between sexual orientation and health were significant in the age-adjusted model but non-significant in the multiple models. Associations between sexual orientation and health disappear after multiple adjustments including trust and experience of offence, threat of violence, and violence. The study suggests that the group with bisexual orientation seems to be more exposed to low social capital (trust), threat of violence, and violence than the group with homosexual orientation.

  14. The stakes of radiation protection: introduction

    International Nuclear Information System (INIS)

    Cordoliani, Y.S.

    2005-01-01

    The benefit/risk ratio of radiological examinations, particularly with the multi-cut scanner, can be insured only if the justification and optimization principles are respected. the justification stands on the reference to the guide of good practice of imaging examinations and the respect of the public health code that imposes an exchange of written information between the requester and the achiever. The optimization stands on the dosimetry evaluation of his practice and the comparison with the diagnosis reference levels, to realize the examinations at the lowest radiological cost. The stakes are the certainty not to be harmful for the patient, the rehabilitation of the radiologist in his consultant part rather than in this performer one and the protection against eventual legal consequences. (N.C.)

  15. Measuring Motivation in Low-Stakes Assessments. Research Report. ETS RR-15-19

    Science.gov (United States)

    Finn, Bridgid

    2015-01-01

    There is a growing concern that when scores from low-stakes assessments are reported without considering student motivation as a construct of interest, biased conclusions about how much students know will result. Low motivation is a problem particularly relevant to low-stakes testing scenarios, which may be low stakes for the test taker but have…

  16. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    Science.gov (United States)

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  17. Yellow Fever Remains a Potential Threat to Public Health.

    Science.gov (United States)

    Vasconcelos, Pedro F C; Monath, Thomas P

    2016-08-01

    Yellow fever (YF) remains a serious public health threat in endemic countries. The recent re-emergence in Africa, initiating in Angola and spreading to Democratic Republic of Congo and Uganda, with imported cases in China and Kenya is of concern. There is such a shortage of YF vaccine in the world that the World Health Organization has proposed the use of reduced doses (1/5) during emergencies. In this short communication, we discuss these and other problems including the risk of spread of YF to areas free of YF for decades or never before affected by this arbovirus disease.

  18. The Nation's Top HIV/AIDS Researcher Discusses This Continuing Health Threat

    Science.gov (United States)

    Skip Navigation Bar Home Current Issue Past Issues HIV / AIDS The Nation's Top HIV/AIDS Researcher Discusses This Continuing Health Threat Past Issues / ... on. For more than 30 years, the NIH's HIV/AIDS research program has been led by Dr. Anthony S. ...

  19. Economic games on the internet: the effect of $1 stakes.

    Science.gov (United States)

    Amir, Ofra; Rand, David G; Gal, Ya'akov Kobi

    2012-01-01

    Online labor markets such as Amazon Mechanical Turk (MTurk) offer an unprecedented opportunity to run economic game experiments quickly and inexpensively. Using Mturk, we recruited 756 subjects and examined their behavior in four canonical economic games, with two payoff conditions each: a stakes condition, in which subjects' earnings were based on the outcome of the game (maximum earnings of $1); and a no-stakes condition, in which subjects' earnings are unaffected by the outcome of the game. Our results demonstrate that economic game experiments run on MTurk are comparable to those run in laboratory settings, even when using very low stakes.

  20. Multilevel stake holder consensus building in radioactive waste management

    International Nuclear Information System (INIS)

    Dreimanis, Andrejs

    2008-01-01

    Full text: The increased demand of our society to its quality of life, global security and environmental safety as well as to observing a basic ethical principle of equity have advanced our attitude towards the recent proposals to develop shared multinational projects in the use of nuclear energy technologies, in particular, to: a) Siting of shared deep repositories for high-level radioactive waste (RW) and spent nuclear fuel safe disposal. In turn, arrangement of multinational facilities requires to gain more complex consensus between all involved parties. Method: We propose an interdisciplinary synergetic approach to multilevel consensus building for siting and construction of shared multinational repositories for RW deep disposal, based on self-organization (SO) of various stake holders, chaos and fuzziness concepts as well as Ashby principle of requisite variety. In the siting of a multi-national repository there appears an essential novel component of stake holder consensus building, namely: to reach consent - political, social, economic, ecological - among international partners, in addition to solving the whole set of intra-national consensus building items. An entire partnering country is considered as a national stake holder, represented by the national government, being faced to simultaneous seeking an upward (international) and a downward (intra-national) consensus in a psychologically stressed environment, having possibly diverse political, economic and social interests. Main Results: Following inferences about building of multilevel consensus are developed: 1) The basis of synergetic approach to stake holder interaction - informational SO, by forming a knowledge-creating stake holder community via cooperation and competition among individuals, public bodies/groups, companies, institutions; 2) Building of international stake holder consensus could be promoted by activating and diversifying multilateral interactions between intra- and international stake

  1. High-Stakes Educational Testing and Democracy--Antagonistic or Symbiotic Relationship?

    Science.gov (United States)

    Ydesen, Christian

    2014-01-01

    This article argues that high-stakes educational testing, along with the attendant questions of power, education access, education management and social selection, cannot be considered in isolation from society at large. Thus, high-stakes testing practices bear numerous implications for democratic conditions in society. For decades, advocates of…

  2. Split or Steal? Cooperative Behavior When the Stakes Are Large

    NARCIS (Netherlands)

    M.J. van den Assem (Martijn); D. van Dolder (Dennie); R.H. Thaler (Richard)

    2012-01-01

    textabstractWe examine cooperative behavior when large sums of money are at stake, using data from the television game show Golden Balls. At the end of each episode, contestants play a variant on the classic prisoner's dilemma for large and widely ranging stakes averaging over $20,000. Cooperation

  3. Economic games on the internet: the effect of $1 stakes.

    Directory of Open Access Journals (Sweden)

    Ofra Amir

    Full Text Available Online labor markets such as Amazon Mechanical Turk (MTurk offer an unprecedented opportunity to run economic game experiments quickly and inexpensively. Using Mturk, we recruited 756 subjects and examined their behavior in four canonical economic games, with two payoff conditions each: a stakes condition, in which subjects' earnings were based on the outcome of the game (maximum earnings of $1; and a no-stakes condition, in which subjects' earnings are unaffected by the outcome of the game. Our results demonstrate that economic game experiments run on MTurk are comparable to those run in laboratory settings, even when using very low stakes.

  4. Staking solutions to tube vibration problems (developed by Technos et Compagnie - FRANCE)

    International Nuclear Information System (INIS)

    Hewitt, E.W.; Bizard, A.; Horn, M.J.

    1989-01-01

    Electric generating plant steam surface condensers have been prone to vibration induced tube failures. One common and effective method for stopping this vibration has been to insert stakes into the bundle to provide additional support. Stakes have been fabricated of a variety of rigid and semi-rigid materials of fixed dimensions. Installation difficulties and problems of incomplete tube support have been associated with this approach. New developments in the application of plastic technology has offered another approach. Stakes made of plastic tubes which are flattened, by evacuation, at the time of manufacture may now be easily inserted into the tube bundle. After insertion, the vacuum is released and the memory of the plastic causes the stakes to expand and assume their original form. The spring force of the plastic cradles the adjacent condenser tubes and stops the vibration. Developed for Electricite de France (EDF), the stakes are currently installed in 19 units of the French utility system, and two units in the United States

  5. Attention processes in chronic fatigue syndrome: attentional bias for health-related threat and the role of attentional control.

    Science.gov (United States)

    Hou, Ruihua; Moss-Morris, Rona; Risdale, Anna; Lynch, Jeannette; Jeevaratnam, Preshan; Bradley, Brendan P; Mogg, Karin

    2014-01-01

    Cognitive behavioural models of chronic fatigue syndrome (CFS) propose that attention processes, specifically, enhanced selective attention to health-threat related cues, may play an important role in symptom maintenance. The current study investigated attentional bias towards health-threat stimuli in CFS. It also examined whether individuals with CFS have impaired executive attention, and whether this was related to attentional bias. 27 participants with CFS and 35 healthy controls completed a Visual Probe Task measuring attentional bias, and an Attention Network Test measuring executive attention, alerting and orienting. Participants also completed self-report measures of CFS and mood symptoms. Compared to the control group, the CFS group showed greater attentional bias for health-threat words than pictures; and the CFS group was significantly impaired in executive attention. Furthermore, CFS individuals with poor executive attention showed greater attentional bias to health-threat related words, compared not only to controls but also to CFS individuals with good executive attention. Thus, this study revealed a significant relationship between attentional bias and executive attention in CFS: attentional bias to threat was primarily evident in those with impaired executive attention control. Taking account of individual differences in executive attention control in current intervention models may be beneficial for CFS. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Reconsidering the Impact of High-stakes Testing

    Directory of Open Access Journals (Sweden)

    Henry Braun

    2004-01-01

    Full Text Available Over the last fifteen years, many states have implemented high-stakes tests as part of an effort to strengthen accountability for schools, teachers, and students. Predictably, there has been vigorous disagreement regarding the contributions of such policies to increasing test scores and, more importantly, to improving student learning. A recent study by Amrein and Berliner (2002a has received a great deal of media attention. Employing various databases covering the period 1990-2000, the authors conclude that there is no evidence that states that implemented high-stakes tests demonstrated improved student achievement on various external measures such as performance on the SAT, ACT, AP, or NAEP. In a subsequent study in which they conducted a more extensive analysis of state policies (Amrein & Berliner, 2002b, they reach a similar conclusion. However, both their methodology and their findings have been challenged by a number of authors. In this article, we undertake an extended reanalysis of one component of Amrein and Berliner (2002a. We focus on the performance of states, over the period 1992 to 2000, on the NAEP mathematics assessments for grades 4 and 8. In particular, we compare the performance of the high-stakes testing states, as designated by Amrein and Berliner, with the performance of the remaining states (conditioning, of course, on a state’s participation in the relevant NAEP assessments. For each grade, when we examine the relative gains of states over the period, we find that the comparisons strongly favor the high-stakes testing states. Moreover, the results cannot be accounted for by differences between the two groups of states with respect to changes in percent of students excluded from NAEP over the same period. On the other hand, when we follow a particular cohort (grade 4, 1992 to grade 8, 1996 or grade 4, 1996 to grade 8, 2000, we find the comparisons slightly favor the low-stakes testing states, although the discrepancy can

  7. Implications of Fuzziness for the Practical Management of High-Stakes Risks

    Directory of Open Access Journals (Sweden)

    Mark Jablonowski

    2010-04-01

    Full Text Available High-stakes (dangerous, catastrophic risks take on a wider profile as progress unfolds. What are the impacts of technological and social change on the risk landscape? Due to the complexities and dynamics involved, we can only answer these questions approximately. By using the concept of fuzziness, we can formalize our imprecision about high-stakes risk, and therefore place their management on a stronger footing. We review here the impacts of fuzziness, i.e., knowledge imperfection, on high-stakes risk management, including its implementation via computationally intelligent decision aids.

  8. Health system strengthening: prospects and threats for its sustainability on the global health policy agenda.

    Science.gov (United States)

    Naimoli, Joseph F; Saxena, Sweta; Hatt, Laurel E; Yarrow, Kristina M; White, Trenton M; Ifafore-Calfee, Temitayo

    2018-01-01

    In 2013, Hafner and Shiffman applied Kingdon's public policy process model to explain the emergence of global attention to health system strengthening (HSS). They questioned, however, HSS's sustainability on the global health policy agenda, citing various concerns. Guided by the Grindle and Thomas interactive model of policy implementation, we advance and elaborate a proposition: a confluence of developments will contribute to maintaining HSS's prominent place on the agenda until at least 2030. Those developments include (1) technical, managerial, financial, and political responses to unpredictable public health crises that imperil the routine functioning of health systems, such as the 2014-2015 Ebola virus disease (Ebola) epidemic in West Africa; (2) similar responses to non-crisis situations requiring fully engaged, robust health systems, such as the pursuit of the new Sustainable Development Goal for health (SDG3); and (3) increased availability of new knowledge about system change at macro, meso, and micro levels and its effects on people's health and well-being. To gauge the accuracy of our proposition, we carried out a speculative assessment of credible threats to our premise by discussing all of the Hafner-Shiffman concerns. We conclude that (1) the components of our proposition and other forces that have the potential to promote continuing attention to HSS are of sufficient strength to counteract these concerns, and (2) prospective monitoring of HSS agenda status and further research on agenda sustainability can increase confidence in our threat assessment. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. [Tuberculosis and refusal of treatment: resorting to legislation on serious health threats].

    Science.gov (United States)

    Bouvet, R; Le Gueut, M

    2013-06-01

    Clinicians are regularly confronted with the question of refusal of treatment from patients with tuberculosis. For several years, the French public health authorities have been studying the possibility of compelling treatment or isolation, but no plan has been implemented even though European and American experiences have shown the effectiveness of restrictive measures. Neither the statutory exceptions to the principle of consent to medical treatment nor the conditions of implementation of "required care" allow legally binding measures against patients refusing care or isolation. The legislation on serious health threats has recently been applied to the situation of a refusal of treatment in the context of tuberculosis. It allowed the patient to be ordered to observe prescribed care and the possibility of forced isolation in the event of breach of this order. The legislation on serious health threats is a response to the question of refusal of treatment from patients with tuberculosis. However the opinion of the legal authority as to its necessity and proportionality to the risk remains unknown. Copyright © 2013 SPLF. Published by Elsevier Masson SAS. All rights reserved.

  10. Politics in evaluation: Politically responsive evaluation in high stakes environments.

    Science.gov (United States)

    Azzam, Tarek; Levine, Bret

    2015-12-01

    The role of politics has often been discussed in evaluation theory and practice. The political influence of the situation can have major effects on the evaluation design, approach and methods. Politics also has the potential to influence the decisions made from the evaluation findings. The current study focuses on the influence of the political context on stakeholder decision making. Utilizing a simulation scenario, this study compares stakeholder decision making in high and low stakes evaluation contexts. Findings suggest that high stakes political environments are more likely than low stakes environments to lead to reduced reliance on technically appropriate measures and increased dependence on measures better reflect the broader political environment. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. A Threat- and Efficacy-Based Framework to Understand Confidence in Vaccines among the Public Health Workforce

    Directory of Open Access Journals (Sweden)

    Lainie Rutkow

    2013-04-01

    Full Text Available The Extended Parallel Process Model (EPPM is an established threat- and efficacy-based behavioral framework for understanding health behaviors in the face of uncertain risk. A growing body of research has applied this model to understand these behaviors among the public health workforce. In this manuscript, we aim to explore the application of this framework to the public health workforce, with a novel focus on their confidence in vaccines and perceptions of vaccine injury compensation mechanisms. We characterize specific connections between EPPM’s threat and efficacy dimensions and relevant vaccine policy frameworks and highlight how these connections can usefully inform training interventions for public health workers to enhance their confidence in these vaccine policy measures.

  12. The threat of home eviction and its effects on health through the equity lens: A systematic review.

    Science.gov (United States)

    Vásquez-Vera, Hugo; Palència, Laia; Magna, Ingrid; Mena, Carlos; Neira, Jaime; Borrell, Carme

    2017-02-01

    The aims of this review are to gather and systematize the currently available evidence on the effect of the threat of eviction on health and its eventual spillover effects, to assess the quality of the selected studies, and to describe how these findings vary with respect to dimensions of social inequity. We conducted a literature search in March 2016, which yielded 2208 unduplicated articles. The title, abstract and full text of these articles were reviewed by three independent pairs of researchers. We performed a quality assessment of each article, and evaluated whether health inequities had been considered. We selected 47 articles for this review, of which 86% were from Anglo-Saxon countries (mainly the US), and 75% were published after 2009. Most studies used either a cross-sectional (32%), cohort (28%), or qualitative (17%) design. The majority (55%) assessed mental health as a key health indicator, and a notable proportion assessed physical health (38%) and health-related behaviours (19%). Many of the studies evaluated more than one of these health indicators. The average quality score was 7.4 (SD = 1.5). Evidence from these selected articles revealed a general consensus that individuals under threat of eviction present negative health outcomes, both mental (e.g. depression, anxiety, psychological distress, and suicides) and physical (poor self-reported health, high blood pressure and child maltreatment). However, the distribution and extent of these outcomes depend on inequity dimensions such as gender, age, ethnicity and territory. Furthermore, qualitative studies highlighted some of the pathways that may connect the threat of eviction with its health outcomes. The threat of eviction will likely continue to be a major issue in the coming years, so it is important to conduct further research to create effective interventions and courageous policies to tackle this problem. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. The effect of $1, $5 and $10 stakes in an online dictator game.

    Science.gov (United States)

    Raihani, Nichola J; Mace, Ruth; Lamba, Shakti

    2013-01-01

    The decision rules underpinning human cooperative behaviour are often investigated under laboratory conditions using monetary incentives. A major concern with this approach is that stake size may bias subjects' decisions. This concern is particularly acute in online studies, where stakes are often far lower than those used in laboratory or field settings. We address this concern by conducting a Dictator Game using Amazon Mechanical Turk. In this two-player game, one player (the dictator) determines the division of an endowment between himself and the other player. We recruited subjects from India and the USA to play an online Dictator Game. Dictators received endowments of $1, $5 or $10. We collected two batches of data over two consecutive years. We found that players from India were less generous when playing with a $10 stake. By contrast, the effect of stake size among players from the USA was very small. This study indicates that the effects of stake size on decision making in economic games may vary across populations.

  14. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  15. Correlates of cooperation in a one-shot high-stakes televised prisoners' dilemma.

    Directory of Open Access Journals (Sweden)

    Maxwell N Burton-Chellew

    Full Text Available Explaining cooperation between non-relatives is a puzzle for both evolutionary biology and the social sciences. In humans, cooperation is often studied in a laboratory setting using economic games such as the prisoners' dilemma. However, such experiments are sometimes criticized for being played for low stakes and by misrepresentative student samples. Golden balls is a televised game show that uses the prisoners' dilemma, with a diverse range of participants, often playing for very large stakes. We use this non-experimental dataset to investigate the factors that influence cooperation when "playing" for considerably larger stakes than found in economic experiments. The game show has earlier stages that allow for an analysis of lying and voting decisions. We found that contestants were sensitive to the stakes involved, cooperating less when the stakes were larger in both absolute and relative terms. We also found that older contestants were more likely to cooperate, that liars received less cooperative behavior, but only if they told a certain type of lie, and that physical contact was associated with reduced cooperation, whereas laughter and promises were reliable signals or cues of cooperation, but were not necessarily detected.

  16. Special COP 21 - Stakes and actors

    International Nuclear Information System (INIS)

    Chauveau, Loic; Dupain, Julien; Descamps, Olivier; Blosseville, Thomas; Connors, Anne; Canto, Albane; Robischon, Christian; Boedec, Morgan; Tubiana, Fabian; Bomstein, Dominique

    2015-01-01

    A first set of article comments and discusses the various stakes and challenges of the 21. Conference of Parties (COP 21): the negotiation process which resulted in a synthesis which is to be signed by 95 States in Paris, the elaboration of an Agenda of solutions with the commitment of enterprises and local authorities, the issue of international financing as some promises remained not kept for the support to adaptation of developing countries. A second set of articles addresses the involved actors and their technological or economic challenges: the needed evolution of energy (electricity, heat, gas, fuel) producers away from fossil energies to reduce greenhouse gas emissions, the strategy of the French company Engie in the field of photovoltaic, wind and more generally renewable energies, innovating trends of decentralisation of energy production (offshore wind energy, hydrogen, plasma torch, flexible photovoltaic arrays, the wind tree, the floating wind turbine, new technologies for solar arrays), the perspectives for industrial sectors concerned by energy transition (with the example of Schneider Electric), emerging technologies (oil lamp, new boilers, desalination equipment, storage of wind energy, co-generation), developments and perspectives in the transport sector (example of Renault, new technologies for hybrid propulsion, bio-refineries, reduction of fuel consumption, hybrid aircraft, and heat management in railways) and in the building sector (new standards and applications, new building materials). A last article outlines the threat that climate can be for profitability and the taking of the carbon risk into account by the insurance and financial sectors

  17. Invasive Lionfish (Pterosis volitans) Pose Public Health Threats.

    Science.gov (United States)

    Diaz, James H

    2015-01-01

    The lionfish, Pterosis volitans, a native of Indo-Pacific oceans, is a popular saltwater aquarium fish despite venomous spines on its fins. Lionfish were inadvertently introduced into the western Atlantic from Florida in the early 1990s and have overpopulated and dispersed widely into the Caribbean Sea and Gulf of Mexico. Initiatives to control lionfish populations were launched, including the National Oceanographic and Atmospheric Administration (NOAA)-sponsored "Lionfish as Food Campaign".2 Recently, scientists from the Food and Drug Administration (FDA) reported that lionfish caught off the US Virgin Islands contained ciguatoxins and could cause ciguatera fish poisoning (CFP); a seafood-borne poisoning without an antidote or any specific treatment, and a potential for prolonged neurotoxicity. Lionfish pose several public health threats. New strategies to control the lionfish population explosion in coastal waters and offshore fisheries are needed now to ensure seafood safety and public health. The lionfish, Pterosis volitans, is native to the reefs of the western Indian and Pacific Oceans (Figure 1). Brightly colored with red, white, and black stripes and adorned with feathery fins, the lionfish is a popular saltwater aquarium fish despite venomous spines on its fins (Figure 2). Lionfish were introduced into the western North Atlantic from Florida in the early 1990s after some specimens were discarded by dissatisfied amateur aquarists and others escaped from hurricane-flooded public aquariums.1 Since lionfish are voracious carnivores, have few natural predators, and reproduce prolifically, they have overpopulated and dispersed widely from Cape Hatteras to Florida, throughout the Caribbean Sea, and into the Gulf of Mexico.1 The population density of lionfish in its new, invaded territory now exceeds that of its native habitat.1 As a result, campaigns to control lionfish populations were launched in Florida and the Caribbean. Lionfish now pose several public

  18. Evaluating Strategies for Achieving Global Collective Action on Transnational Health Threats and Social Inequalities

    OpenAIRE

    Hoffman, Steven Justin

    2015-01-01

    This dissertation presents three studies that evaluate different strategies for addressing transnational health threats and social inequalities that depend upon or would benefit from global collective action. Each draws upon different academic disciplines, methods and epistemological traditions. Chapter 1 assesses the role of international law in addressing global health challenges, specifically examining when, how and why global health treaties may be helpful. Evidence from 90 quantitati...

  19. Raising the Stakes: High-Stakes Testing and the Attack on Public Education in New York

    Science.gov (United States)

    Hursh, David

    2013-01-01

    Over the last almost two decades, high-stakes testing has become increasingly central to New York's schools. In the 1990s, the State Department of Education began requiring that secondary students pass five standardized exams to graduate. In 2002, the federal No Child Left Behind Act required students in grades three through eight to take math and…

  20. The effect of $1, $5 and $10 stakes in an online dictator game.

    Directory of Open Access Journals (Sweden)

    Nichola J Raihani

    Full Text Available The decision rules underpinning human cooperative behaviour are often investigated under laboratory conditions using monetary incentives. A major concern with this approach is that stake size may bias subjects' decisions. This concern is particularly acute in online studies, where stakes are often far lower than those used in laboratory or field settings. We address this concern by conducting a Dictator Game using Amazon Mechanical Turk. In this two-player game, one player (the dictator determines the division of an endowment between himself and the other player. We recruited subjects from India and the USA to play an online Dictator Game. Dictators received endowments of $1, $5 or $10. We collected two batches of data over two consecutive years. We found that players from India were less generous when playing with a $10 stake. By contrast, the effect of stake size among players from the USA was very small. This study indicates that the effects of stake size on decision making in economic games may vary across populations.

  1. Risk Factor Knowledge, Perceived Threat, and Protective Health Behaviors: Implications for Type 2 Diabetes Control in Rural Communities.

    Science.gov (United States)

    Paige, Samantha R; Bonnar, Kelly K; Black, David R; Coster, Daniel C

    2018-02-01

    Purpose The purpose of this study was to explore how perceived threat of type 2 diabetes (T2D) is shaped by risk factor knowledge and promotes the engagement of protective health behaviors among rural adults. Methods Participants (N = 252) completed a cross-sectional mixed-mode survey. Chi-squared analyses were computed to examine differences in perceived threat by demographic factors and knowledge of T2D risk factors. Logistic regressions were conducted to examine the relationship between T2D perceived threat and engagement in physical activity and health screenings. Results Perceived threat and knowledge of T2D risk factors were high. Perceived susceptibility was significantly higher among women, whites, and respondents with high body mass index (BMI). Respondents reporting physical activity most/almost every day had low perceived susceptibility to T2D. Perceived severity was significantly higher among respondents with high BMI. Blood cholesterol and glucose screenings were associated with greater T2D perceived susceptibility and severity. Higher BMI was associated with receiving a blood glucose screening. Conclusion Health education specialists and researchers should further explore the implications of using audience segmented fear appeal messages to promote T2D control through protective health behaviors.

  2. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    Science.gov (United States)

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy.

  3. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    Science.gov (United States)

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  4. Validating High-Stakes Testing Programs.

    Science.gov (United States)

    Kane, Michael

    2002-01-01

    Makes the point that the interpretations and use of high-stakes test scores rely on policy assumptions about what should be taught and the content standards and performance standards that should be applied. The assumptions built into an assessment need to be subjected to scrutiny and criticism if a strong case is to be made for the validity of the…

  5. Huntsman takes a stake in Chemplex

    International Nuclear Information System (INIS)

    Wood, A.

    1993-01-01

    Huntsman Chemical (Salt Lake City) has bought a 50% stake in Australian styrenics maker Chemplex (Melbourne) from Consolidated Press Holdings (Sydney). Huntsman stepped in after a previous acquisition plan by South Africa's Sentrachem (Johannesburg) broke down because of a failure to agree on price. Chemplex has two production locations near Melbourne: West Footscray, with capacity for 100,000 m.t./year of styrene, plus polystyrene, phenol, and acetone; and Dandenong, with production of acrylonitrile butadiene styrene and latex. The company was originally Monsanto Australia, before being acquired by Consolidated Press in 1988. The deal will give Huntsman its first major production position in the Asia/Pacific region, apart from a 50% stake in a 25,000-m.t./year polystyrene plant in Taiwan, with Grand Pacific Petrochemical (Taipei) as a partner. In 1991, Huntsman abandoned plans to invest in a 25,000-m.t./year polystyrene plant in Thailand with Mitsubishi Corp. and Toa (Bangkok). Huntsman Chemical has annual revenues of $1.3 billion

  6. NOISE IN THE INDUSTRY – THREAT FOR HEALTH

    Directory of Open Access Journals (Sweden)

    Alin IRIMIA

    2015-07-01

    Full Text Available The success of certain industrial activities bring both benefits and negative effects such as pollution, occupational diseas-es, exposure of workers and residents of neighboring areas and high risk in case of technological failure. An undesirable effect of industrial activity which may be considered a threat to workers and residents in the immediate vicinity of industrial sites is the noise. Due to the presence of technology in all activities, is a major problem considering its nature and harmful repercussions on health. Hearing loss and deafness caused by occupational exposure to noise at work are the most common occupational diseases that occur in the European Union. The development of modern technology by increasing the power and speed of the technical equipment, contributed to diversify and increase the number of sources of noise and vibration, and thus to increase the number of people exposed. This paper analyzes the effect of noise from industrial equipment and health risks.

  7. Avoidance temperament and social-evaluative threat in college students' math performance: a mediation model of math and test anxiety.

    Science.gov (United States)

    Liew, Jeffrey; Lench, Heather C; Kao, Grace; Yeh, Yu-Chen; Kwok, Oi-man

    2014-01-01

    Standardized testing has become a common form of student evaluation with high stakes, and limited research exists on understanding the roles of students' personality traits and social-evaluative threat on their academic performance. This study examined the roles of avoidance temperament (i.e., fear and behavioral inhibition) and evaluative threat (i.e., fear of failure and being viewed as unintelligent) in standardized math test and course grades in college students. Undergraduate students (N=184) from a large public university were assessed on temperamental fear and behavioral inhibition. They were then given 15 minutes to complete a standardized math test. After the test, students provided data on evaluative threat and their math performance (scores on standardized college entrance exam and average grades in college math courses). Results indicate that avoidance temperament was linked to social-evaluative threat and low standardized math test scores. Furthermore, evaluative threat mediated the influence of avoidance temperament on both types of math performance. Results have educational and clinical implications, particularly for students at risk for test anxiety and underperformance. Interventions targeting emotion regulation and stress management skills may help individuals reduce their math and test anxieties.

  8. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers

    Directory of Open Access Journals (Sweden)

    Rachel N. Carey

    2016-07-01

    Full Text Available Abstract Background Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These ‘threat appeals’ feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. Methods To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62 examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81 investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Results Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Conclusions Findings suggest that threat-based road safety communications that target affective (fear and cognitive (perceived efficacy mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  9. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  10. Small- and large-stakes risk aversion: implications of concavity calabration for decision theory

    NARCIS (Netherlands)

    Cox, J.C.; Sadiraj, V.

    2006-01-01

    A growing literature reports the conclusions that: (a) expected utility theory does not provide a plausible theory of risk aversion for both small-stakes and large-stakes gambles; and (b) this decision theory should be replaced with an alternative theory characterized by loss aversion. This paper

  11. Use of media and public-domain Internet sources for detection and assessment of plant health threats.

    Science.gov (United States)

    Thomas, Carla S; Nelson, Noele P; Jahn, Gary C; Niu, Tianchan; Hartley, David M

    2011-09-05

    Event-based biosurveillance is a recognized approach to early warning and situational awareness of emerging health threats. In this study, we build upon previous human and animal health work to develop a new approach to plant pest and pathogen surveillance. We show that monitoring public domain electronic media for indications and warning of epidemics and associated social disruption can provide information about the emergence and progression of plant pest infestation or disease outbreak. The approach is illustrated using a case study, which describes a plant pest and pathogen epidemic in China and Vietnam from February 2006 to December 2007, and the role of ducks in contributing to zoonotic virus spread in birds and humans. This approach could be used as a complementary method to traditional plant pest and pathogen surveillance to aid global and national plant protection officials and political leaders in early detection and timely response to significant biological threats to plant health, economic vitality, and social stability. This study documents the inter-relatedness of health in human, animal, and plant populations and emphasizes the importance of plant health surveillance.

  12. Highways and outposts: economic development and health threats in the central Brazilian Amazon region

    OpenAIRE

    Barcellos, Christovam; Feitosa, Patrícia; Damacena, Giseli N; Andreazzi, Marco A

    2010-01-01

    Abstract Background Economic development is often evoked as a driving force that has the capacity to improve the social and health conditions of remote areas. However, development projects produce uneven impacts on local communities, according to their different positions within society. This study examines the spatial distribution of three major health threats in the Brazilian Amazon region that may undergo changes through highway construction. Homicide mortality, AIDS incidence and malaria ...

  13. Learning to Label: Socialisation, Gender, and the Hidden Curriculum of High-Stakes Testing

    Science.gov (United States)

    Booher-Jennings, Jennifer

    2008-01-01

    Although high-stakes tests play an increasing role in students' schooling experiences, scholars have not examined these tests as sites for socialisation. Drawing on qualitative data collected at an American urban primary school, this study explores what educators teach students about motivation and effort through high-stakes testing, how students…

  14. Student Motivation in Low-Stakes Assessment Contexts: An Exploratory Analysis in Engineering Mechanics

    Science.gov (United States)

    Musekamp, Frank; Pearce, Jacob

    2016-01-01

    The goal of this paper is to examine the relationship of student motivation and achievement in low-stakes assessment contexts. Using Pearson product-moment correlations and hierarchical linear regression modelling to analyse data on 794 tertiary students who undertook a low-stakes engineering mechanics assessment (along with the questionnaire of…

  15. Nuclear weapons: new threats, new challenges

    International Nuclear Information System (INIS)

    Durand, D.

    2005-01-01

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  16. Highways and outposts: economic development and health threats in the central Brazilian Amazon region.

    Science.gov (United States)

    Barcellos, Christovam; Feitosa, Patrícia; Damacena, Giseli N; Andreazzi, Marco A

    2010-06-17

    Economic development is often evoked as a driving force that has the capacity to improve the social and health conditions of remote areas. However, development projects produce uneven impacts on local communities, according to their different positions within society. This study examines the spatial distribution of three major health threats in the Brazilian Amazon region that may undergo changes through highway construction. Homicide mortality, AIDS incidence and malaria prevalence rates were calculated for 70 municipalities located within the areas of influence of the Cuiabá-Santarém highway (BR-163), i.e. in the western part of the state of Pará state and the northern part of Mato Grosso. The municipalities were characterized using social and economic indicators such as gross domestic product (GDP), urban and indigenous populations, and recent migration. The municipalities' connections to the region's main transportation routes (BR-163 and Trans-Amazonian highways, along with the Amazon and Tapajós rivers) were identified by tagging the municipalities that have boundaries crossing these routes, using GIS overlay operations. Multiple regression was used to identify the major driving forces and constraints relating to the distribution of health threats. The main explanatory variables for higher malaria prevalence were: proximity to the Trans-Amazonian highway, high proportion of indigenous population and low proportion of migrants. High homicide rates were associated with high proportions of migrants, while connection to the Amazon River played a protective role. AIDS incidence was higher in municipalities with recent increases in GDP and high proportions of urban population. Highways induce social and environmental changes and play different roles in spreading and maintaining diseases and health threats. The most remote areas are still protected against violence but are vulnerable to malaria. Rapid economic and demographic growth increases the risk of AIDS

  17. Highways and outposts: economic development and health threats in the central Brazilian Amazon region

    Directory of Open Access Journals (Sweden)

    Damacena Giseli N

    2010-06-01

    Full Text Available Abstract Background Economic development is often evoked as a driving force that has the capacity to improve the social and health conditions of remote areas. However, development projects produce uneven impacts on local communities, according to their different positions within society. This study examines the spatial distribution of three major health threats in the Brazilian Amazon region that may undergo changes through highway construction. Homicide mortality, AIDS incidence and malaria prevalence rates were calculated for 70 municipalities located within the areas of influence of the Cuiabá-Santarém highway (BR-163, i.e. in the western part of the state of Pará state and the northern part of Mato Grosso. Results The municipalities were characterized using social and economic indicators such as gross domestic product (GDP, urban and indigenous populations, and recent migration. The municipalities' connections to the region's main transportation routes (BR-163 and Trans-Amazonian highways, along with the Amazon and Tapajós rivers were identified by tagging the municipalities that have boundaries crossing these routes, using GIS overlay operations. Multiple regression was used to identify the major driving forces and constraints relating to the distribution of health threats. The main explanatory variables for higher malaria prevalence were: proximity to the Trans-Amazonian highway, high proportion of indigenous population and low proportion of migrants. High homicide rates were associated with high proportions of migrants, while connection to the Amazon River played a protective role. AIDS incidence was higher in municipalities with recent increases in GDP and high proportions of urban population. Conclusions Highways induce social and environmental changes and play different roles in spreading and maintaining diseases and health threats. The most remote areas are still protected against violence but are vulnerable to malaria. Rapid

  18. The role of stake holders in the Italian debate on the national radioactive waste deposit

    International Nuclear Information System (INIS)

    Cantone, Marie C.

    2008-01-01

    Full text: In early 2003, following an increased concern about the international terrorist threat, the Italian Government declared an emergency status for national nuclear installations, and in particular for radioactive waste deposits. A working group of experts - mainly from the Society for the Management of Nuclear Installations (SOGIN) and the Agency for New Technologies, Energy and Environment (ENEA) - was appointed and charged with the analysis of the technical aspects implied in the creation of a repository to host permanently LLRW and MLRW as well as to host temporarily HLRW. In November 2003 the Italian Government passed a decree to authorize the creation of a national nuclear waste repository within a geological salt deposit in the territory of Scanzano Jonico, in the Basilicata Region. The decision was made without any negotiation with the local population and the authorities of Scanzano Jonico. The lack of transparent communication and the attempt to impose the project 'from the top' was perceived as a 'deceptive strategy'. The population of the entire region spontaneously organized a mass protest movement against the project; blockades were carried out on the major highway connecting Northern to Southern Italy and the controversy gained the attention of the national mass media. Two weeks later, the Italian government withdrew the decree. Presently, the Italian nuclear waste is distributed over more than 20 locations in 11 different Regions, and the creation of a national disposal site has been postponed. The present study aims at highlighting the reasons behind social conflicts on nuclear waste risks. We will examine the attitudes and the communication strategies of the different stake holders which took part in the public debate on the Italian nuclear waste dump. Drawing on methodologies used in media studies, we are carrying out a quantitative and qualitative analysis of the main national and local newspapers in order to draw a 'map' of the

  19. Re-analysis of NAEP Math and Reading Scores in States with and without High-stakes Tests: Response to Rosenshine

    Directory of Open Access Journals (Sweden)

    Audrey Amrein-Beardsley

    2003-08-01

    Full Text Available Here we address the criticism of our NAEP analyses by Rosenshine (2003. On the basis of his thoughtful critique we redid some of the analyses on which he focused. Our findings contradict his. This is no fault of his, the reasons for which are explained in this paper. Our findings do support our position that high-stakes tests do not do much to improve academic achievement. The extent to which states with high-stakes tests outperform states without high-stakes tests is, at best, indeterminable. Using 1994-1998 NAEP reading and 1996-2000 NAEP math data and accounting for NAEP exemption rates for the same years, we found that states with high-stakes tests are not outperforming states without high-stakes tests in reading in the 4th grade or math in the 8th grade at a statistically significant level. States with high-stakes tests are, however, outperforming states without high-stakes tests in math in the 4th grade at a statistically significant level. Our findings also support our earlier stance that states with high-stakes tests are exempting more students from participating in the NAEP than are states without high-stakes tests. This is more prevalent the more recent the NAEP test administration. This is illustrated in the tables below.

  20. The effect of job insecurity on employee health complaints: A within-person analysis of the explanatory role of threats to the manifest and latent benefits of work.

    Science.gov (United States)

    Vander Elst, Tinne; Näswall, Katharina; Bernhard-Oettel, Claudia; De Witte, Hans; Sverke, Magnus

    2016-01-01

    The current study contributes to the literature on job insecurity by highlighting threat to the benefits of work as an explanation of the effect of job insecurity on health complaints. Building on the latent deprivation model, we predicted that threats to both manifest (i.e., financial income) and latent benefits of work (i.e., collective purpose, social contacts, status, time structure, activity) mediate the relationships from job insecurity to subsequent mental and physical health complaints. In addition, in line with the conservation of resources theory, we proposed that financial resources buffer the indirect effect of job insecurity on health complaints through threat to the manifest benefit. Hypotheses were tested using a multilevel design, in which 3 measurements (time lag of 6 months between subsequent measurements) were clustered within 1,994 employees (in Flanders, Belgium). This allowed for the investigation of within-person processes, while controlling for variance at the between-person level. The results demonstrate that job insecurity was related to subsequent threats to both manifest and latent benefits, and that these threats in turn were related to subsequent health complaints (with an exception for threat to the manifest benefit that did not predict mental health complaints). Three significant indirect effects were found: threat to the latent benefits mediated the relationships between job insecurity and both mental and physical health complaints, and threat to the manifest benefit mediated the relationship between job insecurity and physical health complaints. Unexpectedly, the latter indirect effect was exacerbated by financial resources. (c) 2016 APA, all rights reserved).

  1. Hiding behind High-Stakes Testing: Meritocracy, Objectivity and Inequality in U.S. Education

    Science.gov (United States)

    Au, Wayne

    2013-01-01

    This paper analyses how high-stakes, standardised testing became the policy tool in the U.S. that it is today and discusses its role in advancing an ideology of meritocracy that fundamentally masks structural inequalities related to race and economic class. This paper first traces the early history of high-stakes testing within the U.S. context,…

  2. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  3. The socio-technical setting of economic stakes of global environment risks

    International Nuclear Information System (INIS)

    Salles, J.M.

    1993-01-01

    For policy-making for fighting acid rain, protecting the ozone layer and initiating action to prevent global climate change related to the growth of the greenhouse effect, the economic approach requires more precise consideration of how the economic stakes attached to these threats have been built up by their social actors. Global environmental risks (GER) are not directly perceivable nor can they be easily related to any activity or phenomena at local level (in time or space). There are scientific controversies about the reality of damage and establishing credible responsibility links. Moreover, these controversies are brought to media and social debate before any scientific clarification is possible. The media representations of GER emphasize the fact they could have catastrophic and irreversible consequences. So, the social demand for public action becomes very heavy when delay, possibly of several years between the causes and consequences of global environmental change, prevents any rapid clarification in the controversies. These difficulties have led to the evolution of a decision process in several steps: firstly, an international convention is prepared in which signatory countries commit themselves to cooperate and to take action; secondly, one or several agreements are signed with clear technical objectives and a timetable for implementations. 23 refs

  4. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  5. Strengthening the abilities of French-speaking NGOs. Post-2012 climate stakes. Adaptation - Energy - Deforestation, France - Africa - Canada

    International Nuclear Information System (INIS)

    Creach, Morgane; Margot, Stephanie; Connor, Richard; Angerand, Sylvain

    2007-10-01

    The first part of this report discusses the possibilities of an international response to face the challenge of adaptation to climate change (presentation of the main notions, discussion of the United Nations Framework Convention on Climate Change and international stakes about adaptation). The second part discusses the perspectives of access to energy in African countries: description of the African energy context, applications of existing mechanisms of struggle against climate change to the field of energy, stakes for post-2012 negotiations. The next part addresses the stakes of the avoided deforestation: definitions and key figures, direct and underlying causes of deforestation and assessment of the cost for slowing down or stopping it, stakes and struggle of interests about the 'avoided deforestation'. The last part reports the 'post-2012 climate stakes' workshop which addressed these same topics (access to energy in African countries, adaptation to climate change, avoided deforestation)

  6. Are insecure jobs as bad for mental health and occupational commitment as unemployment? Equal threat or downward spiral

    Directory of Open Access Journals (Sweden)

    Kathleen Otto

    2014-01-01

    Full Text Available We investigated the significance of unemployment and job insecurity for mental health (self-esteem; life satisfaction and occupational commitment (occupational self-efficacy; affective occupational commitment comparing the "equal threat" assumption with the "downward spiral" assumption. Whereas the equal threat model suggests that unemployment and (perceived insecure employment are similarly threatening phenomena, the downward spiral model assumes that there might be a spectrum of employment insecurity, ranging from secure employment to long-term unemployment, that is associated with decreasing mental health and occupational commitment. Controlling for socio-demographic background variables and personality traits, results of ANCOVAs, in which we distinguished between workers who were (more or less securely employed and those who were either insecurely employed or short- or long-term unemployed revealed that the insecurely employed workers were no better off than those who were (short-term unemployed - in line with the equal threat hypothesis. Only for occupational self-efficacy did we find some support for the downward spiral model.

  7. CO2 capture and sequestration. Technological and social stakes in France

    International Nuclear Information System (INIS)

    Minh, Ha-Duong; Naceur, Chaabane

    2010-01-01

    Industrial technology already tested in Norway, North America and Algeria, the CO 2 capture and sequestration (CCS) consists in collecting carbon dioxide and to inject it into deep geological traps. This solution, which contributes to the fight against climatic change, arouses a growing up interest in France as a consequence of the Grenelle Environnement meetings. At a time when big research and demonstration programs are launched everywhere in Europe, this book proposes for the first time a status of the knowledge gathered so far by the specialists of the IPG (World Physics Institute), of the BRGM (Bureau of Geologic and Mining Researches), of the IFP (French Petroleum Institute), and of the CNRS (National Center of Scientific Research). It takes stock of the stakes of this new technology in France. Beyond the technical discussions between experts, the book deals with the external communication stakes and the open public debates. The point of views of the different intervening parties (research organizations, environmental non-governmental organizations, European lobby (Zero Emission Platform), citizens, journalists and companies are compared. A large part of the book aims at shading light on the social acceptability question of this technology. In addition to a synthesis of the available literature, it presents and analyses two participation instruments: a dialogue workshop and a geographical information web site. Content: 1 - scientific stakes of CO 2 geologic sequestration; 2 - technical stakes; 3 - economical stakes; 4 - risks and public opinion; 5 - social acceptability and territorial planning, the wind energy experience; 6 - the point of view of Action-Climat-France network (RAC-F); 7 - citizens' recommendations; 8 - the comeback of coal on the international energy scene; 9 - some consensus from a 'dialogue workshop': the social acceptability of CCS; 10 - bibliographic synthesis about the social acceptability of CCS; 11 - METSTOR, the interactive maping at

  8. What is at stake? Exploring the moral experience of stigma with Indian-Australians and Anglo-Australians living with depression.

    Science.gov (United States)

    Brijnath, Bianca; Antoniades, Josefine

    2018-04-01

    This article applies the framework of moral experience to examine the cultural experience of stigma with Indian-Australians and Anglo-Australians living with depression in Melbourne, Australia. To date few studies have examined this dynamic in relation to mental illness and culture, and no studies have applied this framework in a culturally comparative way. Based on 58 in-depth interviews with people with depression recruited from the community, we explicate how stigma modulates what is at stake upon disclosure of depression, participants' lived experience following that disclosure, and how practices of health-seeking become stigmatised. Findings show that the social acceptance of depression jars against participants' experience of living with it. Denialism and fear of disclosure were overwhelming themes to emerge from our analysis with significant cultural differences; the Anglo-Australians disclosed their depression to family and friends and encountered significant resistance about the legitimacy of their illness. In contrast, many Indian-Australians, especially men, did not disclose their illness for fear of a damaged reputation and damaged social relations. For Indian-Australians, social relations in the community were at stake, whereas for Anglo-Australians workplace relations (but not community relations) were at stake. Participants' experiences in these settings also influenced their patterns of health-seeking behaviors and age and inter-generational relationships were important mediators of stigma and social support. These findings illuminate how stigma, culture, and setting are linked and they provide critical information necessary to identify and develop customised strategies to mitigate the harmful effects of stigma in particular cultural groups.

  9. Wind power: Areva acquires a 51% stake in Multibrid

    International Nuclear Information System (INIS)

    2007-01-01

    AREVA announced the acquisition of a 51% stake in Multibrid, a designer and manufacturer of multi-megawatt off-shore wind turbines based in Germany. With this acquisition, AREVA has entered into a joint venture with Prokon Nord, a German off-shore wind turbine and biomass plant developer and current owner of Multibrid. This transaction values Multibrid at euro 150 million. AREVA plans to rapidly further develop Multibrid's activities by giving the company access to its industrial resources, financial base and international commercial network. In return, Multibrid will provide AREVA with its leading-edge technology which, developed for 5 MW turbines, can achieve a very high output while reducing operating costs thanks to a simplified maintenance system. With this stake in Multibrid, AREVA aims to increase its presence on the offshore wind market that meets land settlement requirements and that should grow significantly in the years to come (from 300 MW in Europe today to an expected 1400 MW by 2011). As an exclusive supplier of Prokon Nord, Multibrid will participate in projects such as Borkum West (30 MW), the first offshore project in Germany, Borkum West 2 (400 MW), and Cote d'Albatre (105 MW), the first offshore wind farm project in France. The stake in Multibrid strengthens AREVA's strategic positioning on the CO 2 -free energy market, thanks to complementary solutions ranging from nuclear technologies to renewables. A number of recent achievements illustrate this strategy: - bio-energy (crucial energy supply in numerous rural areas): delivery of turnkey biomass power plants; ongoing construction of 10 plants in India, Thailand and Brazil; future development plans in fast-growing regions, such as Latin America; - wind power: Multibrid adds to the Group's stake in REpower and to its partnership with Suzlon for which AREVA is the number one supplier of transmission and distribution solutions for wind power; - hydrogen and fuel cells: design and manufacture of

  10. Using efficacy cues in persuasive health communication is more effective than employing threats - An experimental study of a vaccination intervention against Ebola.

    Science.gov (United States)

    Ort, Alexander; Fahr, Andreas

    2018-04-10

    Although much effort has been made to study fear appeals in persuasive health communication, there is still mixed support for the effectiveness of this approach. Therefore, this research investigated the effect of invoked fear via health communication messages on crucial components of the Extended Parallel Process Model (EPPM) by focusing on the rarely examined interaction between perceptions of threat and efficacy and their effects on fear control and danger control processes as well as health-relevant outcomes. We recruited 447 participants (M age  = 32.00 years; 64% female) for a 2 × 2 between-subjects experimental study via quota sampling. While completing an online questionnaire, subjects were randomly assigned to view one of four versions of a mock website containing information about vaccinations against Ebola virus disease (EVD), which varied in threat and efficacy. After seeing the stimulus, participants completed assessments of their perceptions of threat and efficacy, evoked fear, adaptive and defensive responses to the presented message, attitudes, and intentions. Structure equation modelling (SEM) was used to analyse the relationships within the model (EPPM). Promoting efficacy with respect to EVD was more effective than emphasizing threat, resulting in danger control rather than fear control processes. Although threat may be effective in attracting peoples' attention, there is a comparatively small effect of evoked fear on attitudes and intentions. The data support the assumption that there is an important association between threat and coping appraisals facilitating behaviour change. Moreover, the widely held notion that people have to be scared or threatened to encourage attitude and behaviour changes should be treated with caution. Communication should instead focus on efficacy to foster adaptive responses. Statement of contribution What is already known on this subject? There is mixed support for the effectiveness of fear appeals in

  11. Mindfulness, anxiety, and high-stakes mathematics performance in the laboratory and classroom.

    Science.gov (United States)

    Bellinger, David B; DeCaro, Marci S; Ralston, Patricia A S

    2015-12-01

    Mindfulness enhances emotion regulation and cognitive performance. A mindful approach may be especially beneficial in high-stakes academic testing environments, in which anxious thoughts disrupt cognitive control. The current studies examined whether mindfulness improves the emotional response to anxiety-producing testing situations, freeing working memory resources, and improving performance. In Study 1, we examined performance in a high-pressure laboratory setting. Mindfulness indirectly benefited math performance by reducing the experience of state anxiety. This benefit occurred selectively for problems that required greater working memory resources. Study 2 extended these findings to a calculus course taken by undergraduate engineering majors. Mindfulness indirectly benefited students' performance on high-stakes quizzes and exams by reducing their cognitive test anxiety. Mindfulness did not impact performance on lower-stakes homework assignments. These findings reveal an important mechanism by which mindfulness benefits academic performance, and suggest that mindfulness may help attenuate the negative effects of test anxiety. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. An Assessment of Coherence Between Early Warning and Response Systems and Serious Cross-Border Health Threats in the European Union and Turkey.

    Science.gov (United States)

    Ekmekci, Perihan Elif

    2016-12-01

    Disease outbreaks have attracted the attention of the public health community to early warning and response systems (EWRS) for communicable diseases and other cross-border threats to health. The European Union (EU) and the World Health Organization (WHO) have published regulations in this area. Decision 1082/2013/EU brought a new approach the management of public health threats in EU member states. Decision 1082/2013/EU brought several innovations, which included establishing a Health Security Committee; preparedness and response planning; joint procurement of medical countermeasures; ad hoc monitoring for biological, chemical, and environmental threats; EWRS; and recognition of an emergency situation and interoperability between various sectors. Turkey, as an acceding country to the EU and a member of the WHO, has been improving its national public health system to meet EU legislations and WHO standards. This article first explains EWRS as defined in Decision 1082/2013/EU and Turkey's obligations to align its public health laws to the EU acquis. EWRS in Turkey are addressed, particularly their coherence with EU policies regarding preparedness and response, alert notification, and interoperability between health and other sectors. Finally, the challenges and limitations of the current Turkish system are discussed and further improvements are suggested. (Disaster Med Public Health Preparedness. 2016;10:883-892).

  13. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  14. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  15. Design Optimization and Fatigue Analysis of Laser Stake Welded Connections

    National Research Council Canada - National Science Library

    Singh, Anshuman; Vel, Senthil S; Caccese, Vincent

    2008-01-01

    This report summanzes research on the design and fatigue analysis of laser-stake welded connections performed at the University of Maine from January 2006 to December 2007 for the Structural Response...

  16. Does high-stakes testing increase cultural capital among low-income and racial minority students?

    Directory of Open Access Journals (Sweden)

    Won-Pyo Hong

    2008-03-01

    Full Text Available This article draws on research from Texas and Chicago to examine whether high-stakes testing enables low-income and racial minority students to acquire cultural capital. While students' performance on state or district tests rose after the implementation of high-stakes testing and accountability policies in Texas and Chicago in the 1990s, several studies indicate that these policies seemed to have had deleterious effects on curriculum, instruction, the percentage of students excluded from the tests, and student dropout rates. As a result, the policies seemed to have had mixed effects on students' opportunities to acquire embodied and institutionalized cultural capital. These findings are consistent with the work of Shepard (2000, Darling-Hammond (2004a, and others who have written of the likely negative repercussions of high-stakes testing and accountability policies.

  17. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  18. Colloquium on the stakes and new realities of renewable energies

    International Nuclear Information System (INIS)

    2001-01-01

    Today, renewable energies represent 23% of the French energy production and should become a real advantage to overcome the greenhouse effect stakes and to optimize the durable development policy. This book brings together the interventions of the different participants to this colloquium on renewable energies. The following aspects were covered: how to make renewable energies profitable in the framework of an industrial facility; which specific renewable energy models would allow to overcome the greenhouse effect stake; how emission permits can incite to the use of renewable energies and reduce the pollution tax amount; how to take advantage of the new wastes valorization techniques in the rationalization of energy expenses; advantages and limitations of renewable energies in the on-site energy optimization; opportunities and stakes of the climate risk for renewable energies; last developments of the national regulatory framework applicable to renewable energies; status and perspectives of the European directive project on renewable energies; the suitability of renewable energies with respect to the energy needs of the industry and tertiary sectors; how to insert renewable energies in a durable development policy; how to exploit the diversity of renewable energies in order to maximize their economical and environmental potentialities; how to integrate the solar thermal and photovoltaic energies in the framework of a global environmental policy. (J.S.)

  19. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  20. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    Science.gov (United States)

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  1. An integrative approach to threat assessment and management: security and mental health response to a threatening client.

    Science.gov (United States)

    Farkas, Gary M; Tsukayama, John K

    2012-01-01

    Workplace violence threat assessment and management practices represent an interdisciplinary approach to the diversion of potentially dangerous employees and clients. This case study illustrates such an intervention in a complex situation involving a social service agency and its client. Following a curtailment of services and an arrest, the client developed an escalating homicidal anger toward the agency administrator. Once a Tarasoff warning was received, the agency contacted a security company who organized a threat assessment and management plan involving interdisciplinary collaboration. Information developed in the course of the assessment was presented to prosecutors, who facilitated the client's arrest and involuntary psychiatric commitment until he was judged to be no longer dangerous. This case ultimately involved an integration of the services of security, law enforcement, mental health professionals, prosecutors, the courts and the state mental health system in leading to a successful diversion of the client from a path of intended violence.

  2. Antimicrobial resistance: A global emerging threat to public health systems.

    Science.gov (United States)

    Ferri, Maurizio; Ranucci, Elena; Romagnoli, Paola; Giaccone, Valerio

    2017-09-02

    Antimicrobial resistance (AMR) became in the last two decades a global threat to public health systems in the world. Since the antibiotic era, with the discovery of the first antibiotics that provided consistent health benefits to human medicine, the misuse and abuse of antimicrobials in veterinary and human medicine have accelerated the growing worldwide phenomenon of AMR. This article presents an extensive overview of the epidemiology of AMR, with a focus on the link between food producing-animals and humans and on the legal framework and policies currently implemented at the EU level and globally. The ways of responding to the AMR challenges foresee an array of measures that include: designing more effective preventive measures at farm level to reduce the use of antimicrobials; development of novel antimicrobials; strengthening of AMR surveillance system in animal and human populations; better knowledge of the ecology of resistant bacteria and resistant genes; increased awareness of stakeholders on the prudent use of antibiotics in animal productions and clinical arena; and the public health and environmental consequences of AMR. Based on the global nature of AMR and considering that bacterial resistance does not recognize barriers and can spread to people and the environment, the article ends with specific recommendations structured around a holistic approach and targeted to different stakeholders.

  3. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  4. City and energy: which common stakes?

    International Nuclear Information System (INIS)

    Saujot, Mathieu; Peiffer-Smadja, Oceane; Renard, Vincent

    2014-01-01

    This publication proposes a synthesis of several issues addressed during sessions hold during a year. The addressed topics have been: the interactions between forms of urban development and energy transition, energetic vulnerability in relationship with mobility, the role and participation of inhabitants in the making of the city and in energy transition (the challenge of ways of life and usages in eco-districts), stakes and consequences of a more integrated urban production, the local governance of energy. Each of these topics is discussed, and the main lessons learned are highlighted

  5. High Stakes Testing and Its Impact on Rural Schools.

    Science.gov (United States)

    Hodges, V. Pauline

    2002-01-01

    The movement to standardization and high-stakes testing has been driven by ideological and political concerns and has adversely affected teaching/learning, democratic discourse, and educational equity. Rural schools are hit harder because of geographic isolation and insufficient staff and resources. Testing used for purposes other than measuring…

  6. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  7. Energy storage. Stakes, technical solutions and valorization opportunities

    International Nuclear Information System (INIS)

    2012-03-01

    As a key factor to allow the continuous growth of renewable energies, energy storage technologies are now more than ever in the spotlight. In order to grasp the stakes, understand the technology diversity, learn relevant orders of magnitudes and comprehend the close intricacy of energy storage with energy and environmental issues, ENEA has published a detailed and well-documented publication on the subject

  8. Electric power from renewable energy: resources and stakes for France

    International Nuclear Information System (INIS)

    2001-01-01

    This paper presents the essential of the last thematic letter published by the IFEN (French institute of the environment), devoted to the resources and stakes of the electric power produced by the renewable energies in France. (A.L.B.)

  9. The Rise of High-Stakes Educational Testing in Denmark (1920-1970)

    DEFF Research Database (Denmark)

    Ydesen, Christian

    The Rise of High-Stakes Educational Testing in Denmark (1920–1970) is an attempt to determine why and how tests rose to prominence in an educational system that used to rely on qualitative tests and teacher evaluations. The study addresses the important issues of how testing interacts...... with and influences an educational system, and which common factors are involved in order to implement testing in an educational system. The study is based on three relatively unknown case studies – illustrious examples of high-stakes educational testing practices in the Danish public school system. The first case...... to 1959. The third case study examines the testing of Greenlandic children during the preparation scheme in the Greenlandic educational system from 1961 to 1976....

  10. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  11. Commentary: health care payment reform and academic medicine: threat or opportunity?

    Science.gov (United States)

    Shomaker, T Samuel

    2010-05-01

    Discussion of the flaws of the current fee-for-service health care reimbursement model has become commonplace. Health care costs cannot be reduced without moving away from a system that rewards providers for providing more services regardless of need, effectiveness, or quality. What alternatives are likely under health care reform, and how will they impact the challenged finances of academic medical centers? Bundled payment methodologies, in which all providers rendering services to a patient during an episode of care split a global fee, are gaining popularity. Also under discussion are concepts like the advanced medical home, which would establish primary care practices as a regular source of care for patients, and the accountable care organization, under which providers supply all the health care services needed by a patient population for a defined time period in exchange for a share of the savings resulting from enhanced coordination of care and better patient outcomes or a per-member-per-month payment. The move away from fee-for-service reimbursement will create financial challenges for academic medicine because of the threat to clinical revenue. Yet academic health centers, because they are in many cases integrated health care organizations, may be aptly positioned to benefit from models that emphasize coordinated care. The author also has included a series of recommendations for how academic medicine can prepare for the implementation of new payment models to help ease the transition away from fee-for-service reimbursement.

  12. Diplomatic advantages and threats in global health program selection, design, delivery and implementation: development and application of the Kevany Riposte.

    Science.gov (United States)

    Kevany, Sebastian

    2015-05-27

    Global health programs, as supported by organizations such as the Global Fund to Fight AIDS, Tuberculosis and Malaria and the President's Emergency Plan for AIDS Relief (PEPFAR), stand to make significant contributions to international medical outcomes. Traditional systems of monitoring and evaluation, however, fail to capture downstream, indirect, or collateral advantages (and threats) of intervention selection, design, and implementation from broader donor perspectives, including those of the diplomatic and foreign policy communities, which these programs also generate. This paper describes the development a new métier under which assessment systems designed to consider the diplomatic value of global health initiatives are described and applied based on previously-identified "Top Ten" criteria. The "Kevany Riposte" and the "K-Score" were conceptualized based on a retrospective and collective assessment of the author's participation in the design, implementation and delivery of a range of global health interventions related to the HIV/AIDS epidemic. Responses and associated scores reframe intervention worth or value in terms of global health diplomacy criteria such as "adaptability", "interdependence", "training," and "neutrality". Response options ranged from "highly advantageous" to "significant potential threat". Global health initiatives under review were found to generate significant advantages from the diplomatic perspective. These included (1) intervention visibility and associations with donor altruism and prestige, (2) development of international non-health collaborations and partnerships, (3) adaptability and responsiveness of service delivery to local needs, and (4) advancement of broader strategic goals of the international community. Corresponding threats included (1) an absence of formal training of project staff on broader political and international relations roles and responsibilities, (2) challenges to recipient cultural and religious practices

  13. Negotiating the terrain of high-stakes accountability in science teaching

    Science.gov (United States)

    Aronson, Isaak

    Teachers interact with their students on behalf of the entire educational system. The aim of this study is to explore how biology teachers understand and construct their practice in a high-stakes accountability environment that is likely to be riddled with tensions. By critically questioning the technical paradigms of accountability this study challenges the fundamental assumptions of accountability. Such a critical approach may help teachers develop empowerment strategies that can free them from the de-skilling effects of the educational accountability system. This interpretive case study of a high-school in Maryland is grounded in three streams of research literature: quality science instruction based on scientific inquiry, the effects of educational accountability on the curriculum, and the influence of policy on classroom practice with a specific focus on how teachers balance competing tensions. This study theoretically occurs at the intersection of educational accountability and pedagogy. In terms of data collection, I conduct two interviews with all six biology teachers in the school. I observe each teacher for at least fifteen class periods. I review high-stakes accountability policy documents from the federal, state, and district levels of the education system. Three themes emerge from the research. The first theme, "re-defining science teaching," captures how deeply accountability structures have penetrated the science curriculum. The second theme, "the pressure mounts," explores how high-stakes accountability in science has increased the stress placed on teachers. The third theme, "teaching-in-between," explores how teachers compromise between accountability mandates and their own understandings of quality teaching. Together, the three themes shed light on the current high-stakes climate in which teachers currently work. This study's findings inform the myriad paradoxes at all levels of the educational system. As Congress and advocacy groups battle over

  14. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework.

    Science.gov (United States)

    Gushulak, Bd; Weekers, J; Macpherson, Dw

    2009-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced

  15. The Impact of High Stakes Testing: The Australian Story

    Science.gov (United States)

    Klenowski, Val; Wyatt-Smith, Claire

    2012-01-01

    High stakes testing in Australia was introduced in 2008 by way of the National Assessment Program--Literacy and Numeracy (NAPLAN). Currently, every year all students in Years 3, 5, 7 and 9 are assessed on the same days using national tests in Reading, Writing, Language Conventions (Spelling, Grammar and Punctuation) and Numeracy. In 2010 the…

  16. Local governance of energy. Clarification of stakes and illustration by spatial planning

    International Nuclear Information System (INIS)

    Saujot, Mathieu; Ruedinger, Andreas; Guerry, Anais

    2014-01-01

    As energy transition implies important societal transformations, the authors developed an analysis framework about the main questions raised by local governance: role of the different levels of local communities in the definition and implementation of strategies, key stakes of the sharing of skills between the State and communities, and stakes regarding spatial planning in this context. The authors first address the issue of relevance of the different territorial scales in a context of evolution of energy policies. They propose an overview of this issue with reference to the debate on local governance of transition. They discuss the return on experience of decentralisation in other fields of action of local policies, notably urban planning and spatial planning

  17. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    Science.gov (United States)

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  18. Stereotype threat among older employees: relationship with job attitudes and turnover intentions.

    Science.gov (United States)

    von Hippel, Courtney; Kalokerinos, Elise K; Henry, Julie D

    2013-03-01

    Stereotype threat, or the belief that one may be the target of demeaning stereotypes, leads to acute performance decrements and reduced psychological well-being. The current research examined stereotype threat among older employees, a group that is the target of many negative stereotypes. Study 1 surveyed older workers in two different organizations regarding their experiences of stereotype threat, their job attitudes and work mental health, and their intentions to resign or retire. Across both samples, feelings of stereotype threat were related to more negative job attitudes and poorer work mental health. In turn, these negative job attitudes were associated with intentions to resign and (possibly) retire. In Study 2, younger and older employees were surveyed. The results indicated that only for older employees were feelings of stereotype threat negatively related to job attitudes, work mental health, and intentions to resign. The implications of these findings for understanding job attitudes and intentions among older workers are discussed. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  19. A Study on consensus development through stake holder engagement for the use of nuclear energy in Japan

    International Nuclear Information System (INIS)

    Aoyama, Yoshiko; Sawada, Tetsuo; Fujii, Yasuhiko

    2008-01-01

    In order to alleviate the distrust surrounding the use of nuclear energy and operation of nuclear facilities, as well as to foster trust and find better ways to live in harmony with society, it is essential for the state and electric power utilities not to provide one-sided information, but to formulate adequate bilateral communication and dialogue with stake holders. In this study, we conducted a case study focused on four stake holder meetings with a view to ensuring safety in the use of nuclear energy and operation of nuclear facilities in Japan; the 'Community Meeting for Securing the Transparency of Kashiwazaki-Kariwa Nuclear Power Station (Chiiki-no-kai)'; the 'Monitoring and Evaluation Conference on Environmental Radiation', established by communities where nuclear facilities are installed; the 'Round-Table Conference on Nuclear Power Policy' and the 'Conference for Public Participation and Decision Making for Nuclear Energy Policy' organized by Japan Atomic Energy Commission. As a consequence, it has been observed that in each case varying opinions were summarized through stake holder meetings, but the fact that no system exists to reflect these opinions in design of the nuclear energy policy has emerged as a controversial point. This study suggests future efforts in regard to the requirements in Japan for stake holder meetings that are necessary for fostering trust and mutual understanding among stake holders including the state and local government, electric power utilities and local residents. (author)

  20. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  1. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  2. COST action TD1407: network on technology-critical elements (NOTICE)--from environmental processes to human health threats.

    Science.gov (United States)

    Cobelo-García, A; Filella, M; Croot, P; Frazzoli, C; Du Laing, G; Ospina-Alvarez, N; Rauch, S; Salaun, P; Schäfer, J; Zimmermann, S

    2015-10-01

    The current socio-economic, environmental and public health challenges that countries are facing clearly need common-defined strategies to inform and support our transition to a sustainable economy. Here, the technology-critical elements (which includes Ga, Ge, In, Te, Nb, Ta, Tl, the Platinum Group Elements and most of the rare-earth elements) are of great relevance in the development of emerging key technologies-including renewable energy, energy efficiency, electronics or the aerospace industry. In this context, the increasing use of technology-critical elements (TCEs) and associated environmental impacts (from mining to end-of-life waste products) is not restricted to a national level but covers most likely a global scale. Accordingly, the European COST Action TD1407: Network on Technology-Critical Elements (NOTICE)-from environmental processes to human health threats, has an overall objective for creating a network of scientists and practitioners interested in TCEs, from the evaluation of their environmental processes to understanding potential human health threats, with the aim of defining the current state of knowledge and gaps, proposing priority research lines/activities and acting as a platform for new collaborations and joint research projects. The Action is focused on three major scientific areas: (i) analytical chemistry, (ii) environmental biogeochemistry and (iii) human exposure and (eco)-toxicology.

  3. Has the time come for big science in wildlife health?

    Science.gov (United States)

    Sleeman, Jonathan M.

    2013-01-01

    The consequences of wildlife emerging diseases are global and profound with increased burden on the public health system, negative impacts on the global economy, declines and extinctions of wildlife species, and subsequent loss of ecological integrity. Examples of health threats to wildlife include Batrachochytrium dendrobatidis, which causes a cutaneous fungal infection of amphibians and is linked to declines of amphibians globally; and the recently discovered Pseudogymnoascus (Geomyces) destructans, the etiologic agent of white nose syndrome which has caused precipitous declines of North American bat species. Of particular concern are the novel pathogens that have emerged as they are particularly devastating and challenging to manage. A big science approach to wildlife health research is needed if we are to make significant and enduring progress in managing these diseases. The advent of new analytical models and bench assays will provide us with the mathematical and molecular tools to identify and anticipate threats to wildlife, and understand the ecology and epidemiology of these diseases. Specifically, new molecular diagnostic techniques have opened up avenues for pathogen discovery, and the application of spatially referenced databases allows for risk assessments that can assist in targeting surveillance. Long-term, systematic collection of data for wildlife health and integration with other datasets is also essential. Multidisciplinary research programs should be expanded to increase our understanding of the drivers of emerging diseases and allow for the development of better disease prevention and management tools, such as vaccines. Finally, we need to create a National Fish and Wildlife Health Network that provides the operational framework (governance, policies, procedures, etc.) by which entities with a stake in wildlife health cooperate and collaborate to achieve optimal outcomes for human, animal, and ecosystem health.

  4. Marine renewable energies. Stakes and technical solutions

    International Nuclear Information System (INIS)

    Lacroix, Olivier; Macadre, Laura-Mae

    2012-05-01

    Marine renewable energies are able to supply carbon free energy from various ocean resources (tides, waves, currents, winds, salinity and temperature gradients). This sector, currently at an early stage of deployment, has good prospects of development in the coming years. ENEA releases a report on marine renewable energies giving a transversal vision of the associated stakes and prospects of development. Technical and economic characteristics, maturity level and specificities of each marine energy are analyzed. French and European sources of funding, regulatory framework and potential environmental and social impacts are also reported

  5. Climate change: Bio-technologies are facing a huge challenge. Why is climate changing? Control and measurement of greenhouse gases in the atmosphere. Soils at the heart of climate change. Between pollution and climate change, the survival of soil organisms. Modelling microbial degradation in soils to analyse greenhouse gas releases. A threat against plant health. The opinion of the seed industry. Truly living clouds. Language, the other stake of the struggle against climate changes

    International Nuclear Information System (INIS)

    Salas y Melia, David; Delmotte, Marc; Chenu, Claire; Chevallier, Tiphaine; Mougin, Christian; Lamy, Isabelle; Caquet, Thierry; Garnier, Patricia; Sache, Ivan; Pagesse, Pierre; Amato, Pierre; Desprez, Basile; Vernet, Agnes

    2015-01-01

    As the Rio Earth Summit in 1992 decided to react to limit the irrecoverable global warming, this publication, through several articles, outlines that this issue has not progressed at all after 23 years on a political point of view, and has even regressed with respect to initially defined objectives, but has progressed in terms of understanding of climate change under the influence of our production modes, notably in the agriculture sector. Thus, the articles discuss or recall the origin and process of climate change, how greenhouse gas emissions are controlled and measured, how soil are impacted or play a role in climate change as the survival of soil organisms is at stake under the pressure of pollution and climate change, how climate change can be a threat for plants, how the seed industry perceives these issues, how micro-organisms present in the air and clouds are now a topic in atmosphere sciences. The last article discusses the importance of intelligibility of scientific publications on these issues

  6. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  7. Stereotype threat and social function in opioid substitution therapy patients.

    Science.gov (United States)

    von Hippel, Courtney; Henry, Julie D; Terrett, Gill; Mercuri, Kimberly; McAlear, Karen; Rendell, Peter G

    2017-06-01

    People with a history of substance abuse are subject to widespread stigmatization. It seems likely that this societal disapproval will result in feelings of stereotype threat, or the belief that one is the target of demeaning stereotypes. If so, stereotype threat has the potential to contribute to functional difficulties including poor social outcomes. Eighty drug users on opioid substitution therapy and 84 demographically matched controls completed measures of mental health and social function. The opioid substitution therapy group were additionally asked to complete a measure that focused on their feelings of stereotype threat in relation to their drug use history. Bivariate correlations and hierarchical regression analyses were conducted to establish the magnitude and specificity of the relationship between stereotype threat and social functioning. Relative to controls, the opioid substitution therapy group reported higher levels of negative affect and schizotypy, and poorer social functioning, with all three of these indices significantly correlated with their feelings of stereotype threat. The results also showed that stereotype threat contributed significant unique variance to social functioning in the opioid substitution therapy group, even after taking into account other background, clinical, and mental health variables. Social functioning is an important aspect of recovery, yet these data indicate that people with a history of drug abuse who believe they are the target of stereotypical attitudes have poorer social functioning. This relationship holds after controlling for the impact of other variables on social functioning, including mental health. The theoretical and practical implications of these findings are discussed. Concerns about being stereotyped can shape the social experiences of opioid substitution therapy patients. Opioid substitution therapy patients who feel negatively stereotyped experience greater social function deficits, and this

  8. Smoking Out a Deadly Threat: Tobacco Use in the LGBT Community

    Science.gov (United States)

    ... Out a Deadly Threat: Tobacco Use in the LGBT Community Disparities in Lung Health Series "Smoking Out a Deadly Threat: Tobacco Use in the LGBT Community" is part of the American Lung Association's ...

  9. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  10. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  11. Zika Virus: An Emerging Global Health Threat

    Science.gov (United States)

    Mittal, Rahul; Nguyen, Desiree; Debs, Luca H.; Patel, Amit P.; Liu, George; Jhaveri, Vasanti M.; S. Kay, Sae-In; Mittal, Jeenu; Bandstra, Emmalee S.; Younis, Ramzi T.; Chapagain, Prem; Jayaweera, Dushyantha T.; Liu, Xue Zhong

    2017-01-01

    Zika virus (ZIKV) is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS) and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV), and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease. PMID:29276699

  12. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  13. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  14. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  15. Risk communication: climate change as a human-health threat, a survey of public perceptions in Malta.

    Science.gov (United States)

    DeBono, Roberto; Vincenti, Karen; Calleja, Neville

    2012-02-01

    Scientific evidence shows that climate change is very likely the product of human behaviour and lifestyle. The effects of climate change on human health are diverse in nature and range from direct effects due to extreme weather events such as heat waves, floods and storms, to indirect effects such as those caused by water and food shortages. A telephone survey was conducted between January and February 2009, on a stratified representative random sample of the Maltese population over the age of 18 years (N = 310,819). Five hundred and forty-three individuals successfully participated in the survey giving a response rate of 92.7%. The respondent sample was very similar to the target population by gender (P = 0.977), age (P = 0.767) and district (P = 0.812). The results of the study demonstrate a very strong relationship between the perception of climate change as a threat to health and well-being, support for climate change mitigation policy and a willingness to implement measures to address climate change. The findings of this study show that the perception that climate change may claim lives, cause disease, reduce the standard of living and worsen water shortages, may be the strongest driver behind support for climate change mitigation policy and a willingness to act. It is recommended that, in order to gain more public support, climate change campaigns and risk communication strategies should frame climate change as a threat to human health and general well-being.

  16. The Mediating Role of Textbooks in High-Stakes Assessment Reform

    Science.gov (United States)

    Leung, Ching Yin; Andrews, Stephen

    2012-01-01

    Whenever high-stakes assessment/curriculum reforms take place, new textbooks appear on the market. These textbooks inevitably play a significant mediating role in the implementation of any reform and on teaching and learning. This paper reports on a small-scale study which attempts to investigate the role of textbooks in the mediation of a…

  17. The Effects of High-Stakes Testing Policy on Arts Education

    Science.gov (United States)

    Baker, Richard A., Jr.

    2012-01-01

    This study examined high-stakes test scores for 37,222 eighth grade students enrolled in music and/or visual arts classes and those students not enrolled in arts courses. Students enrolled in music had significantly higher mean scores than those not enrolled in music (p less than 0.001). Results for visual arts and dual arts were not as…

  18. Curricular constraints, high-stakes testing and the reality of reform in high school science classrooms

    Science.gov (United States)

    Coble, Jennifer

    Through a series of open-ended interviews, this study investigated the beliefs of six third year high school science teachers about how they implement science education reform ideals in their practice and the contextual challenges they face as they attempt to implement reform. The teachers argue that the lack of connection between their curricula and students' lives serves as a significant obstacle to them utilizing more inquiry-based and student-centered strategies. In their science classes that are not subject to a high stakes exam, the teachers shared instances where they engage students in inquiry by refraining the focus of their curricula away from the decontextualized factual information and onto how the information relates to human experience. In their science classes subject to a high stakes test, however, the teachers confessed to feeling no choice but to utilize more teacher-centered strategies focused on information transmission. This study provides an in depth analysis of how the presence of high stakes tests discourages teachers from utilizing reform based teaching strategies within high school science classrooms.

  19. Legal access to medications: a threat to Brazil's public health system?

    Science.gov (United States)

    Chieffi, Ana Luiza; Barradas, Rita De Cassia Barata; Golbaum, Moisés

    2017-07-19

    lawyers and physicians in filing lawsuits. The judicialization of health in the State of São Paulo with the characteristics presented herein is a threat to the SUS.

  20. Zika Virus: An Emerging Global Health Threat

    Directory of Open Access Journals (Sweden)

    Rahul Mittal

    2017-12-01

    Full Text Available Zika virus (ZIKV is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV, and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease.

  1. Social stakes of the reversibility in the deep storage of high level radioactive wastes

    International Nuclear Information System (INIS)

    Heriard-Dubreuil, G.; Schieber, C.; Schneider, T.

    1998-06-01

    This document proposes a study of the conditions which surrounded the reversibility introduction in high activity wastes deep storage at an international scale, as well as a reflexion on the social stakes associated there. In France, the law of december 30, 1991 concerning the research on the radioactive wastes prescribes '' the study of possibilities retrieval or non retrieval storage in deep geological deposits''. The analysis of the reversibility associated social stakes emphasizes the necessity to prevent irreversible consequences, to take care to the choices reversibility, to preserve the future generations autonomy. Thus to elaborate a more satisfactory solution between deep disposal and surface storage, a deep storage, capable of gradually evolution, concept is defined. (A.L.B.)

  2. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  3. Climate change: which stakes? Stakes of climate change. Man and the trajectory of the Earth ship

    International Nuclear Information System (INIS)

    Bramy, Herve; Rogalski, Michel; Sachs, Ignacy

    2011-12-01

    A first article recalls what the greenhouse effect is, outlines that the increase of CO 2 concentration due to human activity is indisputable, that the future of the Kyoto Protocol remains hypothetical, that evolving towards a new development mode is a crucial necessity. It also addresses the issue of financing this struggle against climate change, and outlines the importance of international negotiations. A second article outlines the stakes of climate change, notably by referring to the different international summits and to the associated issues (commitments of most countries, technology transfers, and so on). The third article comments the entry into the Anthropocene as a disruption for the joint evolution of mankind and biosphere. The author outlines the need of a new planning for development, and briefly discusses the question of energies

  4. Trans-Saharan geopolitics. The game and the stakes

    International Nuclear Information System (INIS)

    Chegrouche, L.

    2010-01-01

    The geopolitics of energy exports from the trans-Saharan region are similar to the Caspian great game' at the end of the last century. In North/West Africa as in West/Central Asia, the question of control over hydrocarbon reserves and lines of access to those reserves lies at the source of various conflicts. Rivalries are expressed through open and complex conflicts in which powers confront one another over oil-rich zones through proxy ethnic, religious or cultural groups, as dictated by the colossal economic interests at stake. The increasing number of conflicts - the Niger Delta, Darfur, the Azawak, etc. - is an illustration of this. The shock waves from this rivalry undermine regional peace and security, as well as the security of international energy supplies. The question here is to understand the game and the stakes of this trans-Saharan chess-board, to study its principal features and its energetic consequences. The national oil companies and states of the region can work around or through the geopolitical rifts caused by local rivalries and extra-regional appetites. There is therefore a need to understand the ways in which the players in the trans-Saharan 'great game' interact with one another, an to identifies the effects these interactions may have in the field of energy, in terms of potential reserves and transport projects. The TSGP is presented as an illustration of this geopolitical dynamics. (author)

  5. The effect of education on the knowledge of environmental threats on health in students of elementary schools in Bushehr port

    Directory of Open Access Journals (Sweden)

    Maryam Ravanipour

    2006-02-01

    Full Text Available Background: More than one fourth of diseases around the world are caused by environmental threats. These threats have multifactorial effects on children's health. So, it needs collaboration between teachers, parents, students, and public health authorities to decrease them and improve health. Methods: A total of 18 primary schools were selected using random cluster sampling. After a need assessment analysis about environmental threads, the 3rd and 4th degree students of selected primary schools were invited to draw posters about air pollution, water sanitation, food contamination, natural disaster, solid waste pollution, and sea and beach pollution. Then, a booklet based on the initial need assessment about environmental threads was designed and used for a six weeks educational course. The students drew a second poster after the educational course taught by their teachers. The posters were scored for technical aspects and health concepts by independent examiners. Results: The mean score of students' knowledge about environmental threads increased after intervention (P<0.05. There was no difference between 4th graders and 5th graders, but girls showed a higher score than boys. Conclusion: In primary schools, booklet-based education was effective in promotion of the students' knowledge about environmental threads on health. Therefore, a booklet-based education, designed according to local need assessments, is recommended as a complementary education in primary schools.

  6. How much is our fairness worth? The effect of raising stakes on offers by Proposers and minimum acceptable offers in Dictator and Ultimatum Games.

    Directory of Open Access Journals (Sweden)

    Julie Novakova

    Full Text Available BACKGROUND: The aim of this study was to determine whether people respond differently to low and high stakes in Dictator and Ultimatum Games. We assumed that if we raised the stakes high enough, we would observe more self-orientated behavior because fairness would become too costly, in spite of a possible risk of a higher punishment. METHODS: A questionnaire was completed by a sample of 524 university students of biology. A mixed linear model was used to test the relation between the amount at stake (CZK 20, 200, 2,000, 20,000 and 200,000, i.e., approximately $1-$10,000 and the shares, as well as the subjects' gender and the design of the study (single vs. multiple games for different amounts. RESULTS: We have discovered a significant relationship between the amount at stake and the minimum acceptable offer in the Ultimatum Game and the proposed shares in both Ultimatum and Dictator Games (p = 0.001, p<0.001, p = 0.0034. The difference between playing a single game or more games with several amounts at stake did not influence the relation between the stakes and the offered and minimum acceptable shares. Women proved significantly more generous than men in their offers in the Dictator Game (p = 0.007. CONCLUSION: Our results suggest that people's behavior in the Dictator and Ultimatum Games depends on the amount at stake. The players tended to lower their relative proposed shares, as well as their relative minimum acceptable offers. We propose that the Responders' sense of equity and fair play depends on the stakes because of the costs of maintaining fairness. However, our results also suggest that the price of fairness is very high and that it is very difficult, probably even impossible, to buy the transition of Homo sociologicus into Homo economicus.

  7. Design and fabrication hazard stakes golf course polymeric foam material empty bunch (EFB) fiber reinforced

    Science.gov (United States)

    Zulfahmi; Syam, B.; Wirjosentono, B.

    2018-02-01

    A golf course with obstacles in the forms of water obstacle and lateral water obstacle marked with the stakes which are called golf course obstacle stake in this study. This study focused on the design and fabrication of the golf course obstacle stake with a solid cylindrical geometry using EFB fiber-reinforced polimeric foam composite materials. To obtain the EFB fiber which is free from fat content and other elements, EFB is soaked in the water with 1% (of the watre total volume) NaOH. The model of the mould designed is permanent mould that can be used for the further refabrication process. The mould was designed based on resin-compound paste materials with talc powder plus E-glass fiber to make the mould strong. The composition of polimeric foam materials comprised unsaturated resin Bqtn-Ex 157 (70%), blowing agent (10%), fiber (10%), and catalyst (10%). The process of casting the polimeric foam composit materials into the mould cavity should be at vertical casting position, accurate interval time of material stirring, and periodical casting. To find out the strength value of the golf course obstacle stake product, a model was made and simulated by using the software of Ansys workbench 14.0, an impact loading was given at the height of 400 mm and 460 mm with the variation of golf ball speed (USGA standard) v = 18 m/s, v = 35 m/s, v = 66.2 m/s, v = 70 m/s, and v = 78.2 m/s. The clarification showed that the biggest dynamic explicit loading impact of Fmax = 142.5 N at the height of 460 mm with the maximum golf ball speed of 78.2 m/s did not experience the hysteresis effect and inertia effect. The largest deformation area occurred at the golf ball speed v = 66.2 mm/s, that is 18.029 mm (time: 2.5514e-004) was only concentrated around the sectional area of contact point of impact, meaning that the golf course obstacle stakes made of EFB fiber-reinforced polymeric foam materials have the geometric functional strength that are able to absorb the energy of golf ball

  8. Teacher and headmaster attitudes towards benchmarking and high-stakes testing in adult teaching in Denmark

    DEFF Research Database (Denmark)

    Petersen, Karen Bjerg

    Based on research, surveys and interviews the paper traces teacher and headmaster attitudes towards the introduction of benchmarking and high-stakes language testing introduced in the wake of a neo-liberal education policy in adult teaching for migrants in Denmark in the 2000s. The findings show...... students, reduced use of both project work and non test related activities and stressful working conditions....... that the majority of teachers and headmasters reject benchmarking. Meanwhile, due to both headmasters and language teachers the introduction of high stakes language testing has had an immense impact on the organization, content and quality of adult language teaching. On the one side teachers do not necessarily...

  9. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  10. Energy and climate. Opportunities, threats, myths; Energie und Klima. Chancen, Risiken, Mythen

    Energy Technology Data Exchange (ETDEWEB)

    Luedecke, Horst-Joachim

    2013-05-01

    Germany reinvents itself with the energy policy turnaround as well as climate protection. In doing so, Germany holds a special position worldwide. The transformation of the electric power supply by wind turbines, photovoltaic power plants, biomass conversion plants and avoidance of CO{sub 2} have already been set up. What formerly employed the competent engineers, is interesting the entire society against the backdrop of current political decisions - since the electricity costs increase and a previously saved power supply are increasingly being questioned. The current energy policy turnaround and climate protection measures can only be sensible if there are benefits for the nature conservation, the security of supply with electrical power and the cost. Under this aspect, the author of the book under consideration reports on the opportunities, threats, advantages and disadvantages of the German route. The competitiveness of our country, the security against power outages, the tax burden, the cost of energy and finally the environment are at stake. The upcoming problems can not be solved by political wishful thinking but only with solid technology, economy and environmental protection.

  11. High-Stakes and Non-Stakes Testing States and the Transfer of Knowledge to Students' Advanced Placement Test, Advanced Placement U.S. History Test, and SAT Exam Scores

    Science.gov (United States)

    Lessler, Karen Jean

    2010-01-01

    The Federal education policy No Child Left Behind Act (NCLB) has initiated high-stakes testing among U.S. public schools. The premise of the NCLB initiative is that all students reach proficiency in reading and math by 2014. Under NCLB, individual state education departments were required to implement annual assessments in grades two through eight…

  12. Pharmacy students' test-taking motivation-effort on a low-stakes standardized test.

    Science.gov (United States)

    Waskiewicz, Rhonda A

    2011-04-11

    To measure third-year pharmacy students' level of motivation while completing the Pharmacy Curriculum Outcomes Assessment (PCOA) administered as a low-stakes test to better understand use of the PCOA as a measure of student content knowledge. Student motivation was manipulated through an incentive (ie, personal letter from the dean) and a process of statistical motivation filtering. Data were analyzed to determine any differences between the experimental and control groups in PCOA test performance, motivation to perform well, and test performance after filtering for low motivation-effort. Incentivizing students diminished the need for filtering PCOA scores for low effort. Where filtering was used, performance scores improved, providing a more realistic measure of aggregate student performance. To ensure that PCOA scores are an accurate reflection of student knowledge, incentivizing and/or filtering for low motivation-effort among pharmacy students should be considered fundamental best practice when the PCOA is administered as a low-stakes test.

  13. Beliefs about dangerousness of people with mental health problems: the role of media reports and personal exposure to threat or harm.

    Science.gov (United States)

    Reavley, N J; Jorm, A F; Morgan, A J

    2016-09-01

    To assess the associations between beliefs about the dangerousness of people with mental health problems and exposure to media reports of violence or personal experiences of fear, threat or harm. Telephone interviews were carried out with 5220 Australians aged 18+. Respondents heard a vignette of a person with depression or early schizophrenia and were asked whether they believed him to be dangerous. Other questions covered past 12-month recall of media reports of violence and mental health problems, contact with and experiences of fear, threat or harm by people with mental health problems. Multinomial logistic regression was used to assess the associations between beliefs about dangerousness and media and these types of contact with people with mental health problems. For the early schizophrenia vignette, recall of media reports and having felt afraid of someone were associated with beliefs about dangerousness. For the depression vignette, media reports about violence and mental health problems or the experiences of feeling afraid or having been threatened or harmed were not strongly associated with beliefs about dangerousness. For both vignettes, knowing someone with a mental health problem and having a higher level of education were associated with less belief in dangerousness. Media reports may play a greater role in forming attitudes in low prevalence disorders and further efforts to reduce any adverse impact of media reporting should focus on these disorders. The study also supports the effectiveness of contact with people with mental health problems in reducing beliefs about dangerousness.

  14. The Role of Policy Assumptions in Validating High-stakes Testing Programs.

    Science.gov (United States)

    Kane, Michael

    L. Cronbach has made the point that for validity arguments to be convincing to diverse audiences, they need to be based on assumptions that are credible to these audiences. The interpretations and uses of high stakes test scores rely on a number of policy assumptions about what should be taught in schools, and more specifically, about the content…

  15. Environment stakes and policies

    International Nuclear Information System (INIS)

    Tronquoy, Ph.

    2002-01-01

    This document devoted to the environment discusses on the following topics: the environmental policies, the threats for the environment (climatic change, water management and risks), the deforestation, the sustainable development of cities, the safety first principle, the energy challenge, the international cooperation, the North-South relations. (A.L.B.)

  16. EMERGING ANTIMICROBIAL RESISTANCE IN HOSPITAL A THREAT TO PUBLIC HEALTH

    Directory of Open Access Journals (Sweden)

    Vichal Rastogi

    2013-01-01

    Full Text Available Background: Antimicrobial resistance(AMR threatens the health of many throughout the world, since both old and new infectious diseases remain a formidable public health threat. When pathogenic microorganisms can multiply beyond some critical mass in the face of invading antimicrobials, treatment outcome is compromised. This phenomenon is referred as antimicrobial resistance (AMR. Objective: This retrospective study was conducted to assess the overall antimicrobial resistance in bacterial isolates from tertiary care hospitals as majority of patients here receive empirical antibiotics therapy. Method: This retrospective study was carried out in teaching hospital, Greater Noida to determine prevalence of multidrug resistance in patients in relation to empirical antibiotic therapy in hospital. Various samples (pus,urine,blood were collected for bacterial culture and antibiotic sensitivity. Results: Total 500 bacterial strains isolated from ICU, surgery, obstetrics & gynaecology and orthopaedics and their sensitivity pattern was compared in this study. The highest number of resistant bacterias were of pseudomonas sp. i.e. 21(33.87% followed by 16(25.80% of staphylococcus aureus, 12(19.35% of Escherichia coli, Klebseilla sp & Proteus vulgaris were 05(8.06% each & Citrobacter sp. 03(4.83%. Total 62(12.4% bacterial isolates were found to be resistant to multiple drugs. The 31 (50% of these resistant bacteria were prevalent in ICU, 12(19.35% in Surgery, 11(17.74% in Gynaecology, 08(12.90% in Orthopaedics.. All the bacterial strains were resistant to common antibiotics like Penicillin, Amoxicillin, Doxycycline & Cotrimoxazole and some were even resistant to Imipenem. Conclusion: Therefore we have outlined the nature of the antimicrobial resistance problem as an important health issue for national and international community. It is advised to avoid use of empirical antibiotics therapy.

  17. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    Science.gov (United States)

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  18. Design Optimization and Fatigue Analysis of Laser Stake Welded Connections

    Science.gov (United States)

    2008-06-01

    is ultimately envisioned that laser welding will be as common in the shipyard as other processes such -- as MIG, TIG and SMAW. Laser stake- welding of...input from conventional welding techniques can be detrimental to the polymer matrix composite material. In comparison, the laser welding process allows...more discrete frequencies. In the laser welding process , the photons are targeted on the work piece surface which needs to be welded . Highly

  19. T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study.

    Science.gov (United States)

    Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare; Realdon, Olivia; Jonsson, Gudberg K; Anguera, M Teresa

    2018-01-01

    Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally "deceptive" signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a) testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b) exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c) setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors' frequencies coded through the observation software, using SPSS (22). The aim was to describe shape and characteristics of behavior's distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns) of coded events (non-verbal behaviors) that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes situations, suggesting the

  20. T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Barbara Diana

    2018-03-01

    Full Text Available Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally “deceptive” signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors’ frequencies coded through the observation software, using SPSS (22. The aim was to describe shape and characteristics of behavior’s distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns of coded events (non-verbal behaviors that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes

  1. High School Students with Learning Disabilities: Mathematics Instruction, Study Skills, and High Stakes Tests

    Science.gov (United States)

    Steele, Marcee M.

    2010-01-01

    This article reviews characteristics of high school students with learning disabilities and presents instructional modifications and study skills to help them succeed in algebra and geometry courses and on high stakes mathematics assessments.

  2. Emotion at Stake—The Role of Stake Size and Emotions in a Power-to-Take Game Experiment in China with a Comparison to Europe

    Directory of Open Access Journals (Sweden)

    Ronald Bosman

    2017-03-01

    Full Text Available This paper experimentally investigates how monetary incentives and emotions influence behavior in a two-player power-to-take game (PTTG. In this game, one player can claim any part of the other's endowment (take rate, and the second player can respond by destroying any part of his or her own endowment. The experiment is run in China. We further compare our findings with the behavior of two European subject pools. Our results give new insights regarding emotion regulation. Even though stake size does not appear to matter for take rates and destruction rates, it does matter for the reaction function of the responder regarding the take rate. When stakes are high, there is less destruction for low and intermediate take rates, and more destruction for high take rates, compared to relatively low stakes. Under low incentives, ‘hot’ anger-type emotions are important for destruction, while ‘cool’ contempt becomes prominent under high monetary incentives. These results suggest emotion regulation in the high-stake condition. Moreover, emotions are found to fully mediate the impact of the take rate on destruction when stakes are low, whereas they only partially do so if stakes are high. Comparing the low-stakes data for China with existing European data, we find similarities in behavior, emotions and emotion intensities, as well as the full mediation of the take rate by emotions. We find some differences related to the type of emotions that are important for destruction. Whereas anger and joy are important in both, in addition, irritation and fear play a role in China, while this holds for contempt in the EU.

  3. Caucasus and the petroleum stakes of Caspian Sea

    International Nuclear Information System (INIS)

    Jalillosoltan, N.

    2001-01-01

    The splitting of the former USSR block in 1991 has generated a shock wave in the Caucasus area with the will of all ex-soviet republics to reach their complete independence. Because of the historical and geographical complexity of Caucasus, both geopolitical and human, this disorder has generated even more hazardous results, enhanced by the coveted oil and gas reserves of the Caspian Sea. This article analyses the petroleum stakes as factors of rivalry and instability (sovereignty of oil and gas fields, rivalries about the exploitation and transport of hydrocarbons), but also as factors of cooperation and re-composition. (J.S.)

  4. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  5. Social Perception of Hydrogen Technologies: The View of Spanish Stake holders

    International Nuclear Information System (INIS)

    Ferri Anglada, S.

    2013-01-01

    This technical report presents an overview of the social perception and vision of a sample of Spanish stake holders on hydrogen technologies. The study is based on the implementation of a survey, combining both quantitative and qualitative data. An ad hoc electronic survey was design to collect views and perceptions on several key factors regarding this innovative energy alternative. The group of experts participating (N=130) in the study, comes mainly from research centers, universities and private companies. The survey addresses three major themes: expert views, social acceptability, and contextual factors of hydrogen technologies. The aim is to capture both the current and the future scene as viewed by the experts on hydrogen technologies, identifying key factors in terms of changes, uncertainties, obstacles and opportunities. The objective is to identify potential key features for the introduction, development, promotion, implementation, and large-scale deployment of a highly successful energy proposal in countries such as Iceland, one of the pioneers in base its economy on hydrogen technologies. To conclude, this report illustrates the positive engagement of a sample of Spanish stake holders towards hydrogen technologies that may prove vital in the transition towards the Hydrogen Economy in Spain. (Author)

  6. Effect of Staking and Pruning on the Growth and Yield of Cucumber ...

    African Journals Online (AJOL)

    A field trial was conducted to evaluate the effect of pruning and staking on the vegetative growth and yield of cucumber ( Cucumis sativus L.). The experiment was a 3 x 2 factorial laid out in Randomized Complete Block Design (RCBD) with five replications. The results showed that vine length, number of flowers, total ...

  7. The nuclear: energy and environmental stakes and political and strategic context

    International Nuclear Information System (INIS)

    Lauvergeon, A.

    2003-01-01

    This document mentions the intervention of Anne Lauvergeon, at the colloquium Adapes, ''the nuclear: energy and environmental stakes and political and geo-strategic context''. Anne Lauvergeon is president of the Areva board. This speech takes stock on the energy resources and demand facing the economic development in a context of an environmental quality and especially the part of the nuclear energy in the future. (A.L.B.)

  8. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  9. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  10. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  11. Conceptualizing threats to tobacco control from international economic agreements: the Brazilian experience.

    Science.gov (United States)

    Drope, Jeffrey; McGrady, Benn; Bialous, Stella Aguinaga; Lencucha, Raphael; Silva, Vera Luiza da Costa E

    2017-10-19

    Using the results of dozens of interviews with key actors involved in tobacco control policymaking, we examine these actors' perceptions of threats to tobacco control policy efforts from international economic policies on trade and investment. We also evaluate, from a legal perspective, the genuine threats that exist or potential challenges that economic policies may pose to the Brazilian government's public health efforts. We find that most actors did not perceive these economic policies as a major threat to tobacco control. Objectively, we found that some threats do exist. For example, Brazil's attempt to ban most tobacco additives and flavorings continues to met resistance at the World Trade Organization.

  12. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  13. Students' Attitudes toward High-Stakes Testing and Its Effect on Educational Decisions

    Science.gov (United States)

    Moran, Aldo Alfredo

    2010-01-01

    With the recent increase in accountability due to No Child Left Behind, graduation rates and drop-out rates are important indicators of how well a school district is performing. High-stakes testing scores are at the forefront of a school's success and recognition as a school that is preparing and graduating students to meet society's challenging…

  14. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  15. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Science.gov (United States)

    Uhlmann, Eric Luis; Barnes, Christopher M

    2014-01-01

    High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  16. Selfish play increases during high-stakes NBA games and is rewarded with more lucrative contracts.

    Directory of Open Access Journals (Sweden)

    Eric Luis Uhlmann

    Full Text Available High-stakes team competitions can present a social dilemma in which participants must choose between concentrating on their personal performance and assisting teammates as a means of achieving group objectives. We find that despite the seemingly strong group incentive to win the NBA title, cooperative play actually diminishes during playoff games, negatively affecting team performance. Thus team cooperation decreases in the very high stakes contexts in which it is most important to perform well together. Highlighting the mixed incentives that underlie selfish play, personal scoring is rewarded with more lucrative future contracts, whereas assisting teammates to score is associated with reduced pay due to lost opportunities for personal scoring. A combination of misaligned incentives and psychological biases in performance evaluation bring out the "I" in "team" when cooperation is most critical.

  17. Is the Physical Being Taken out of Physical Education? On the Possible Effects of High-Stakes Testing on an Embattled Profession's Curriculum Goals

    Science.gov (United States)

    Seymour, Clancy; Garrison, Mark

    2015-01-01

    Building on recent discussions regarding how current national standards for physical education promote cognitive outcomes over physical outcomes, the authors explore how a new era in high-stakes testing is also contributing to an emphasis on the cognitive, over the physical. While high-stakes testing has been linked to reducing the amount of…

  18. Figuring out How to Be a Teacher in a High-Stakes Context: A Case Study of First-Year Teachers' Conceptual and Practical Development

    Science.gov (United States)

    Brown, Christopher P.; Bay-Borelli, Debra E.; Scott, Jill

    2015-01-01

    High-stakes education reforms across the United States and the globe continue to alter the landscape of teaching and teacher education. One key but understudied aspect of this reform process is the experiences of first-year teachers, particularly those who participated in these high-stakes education systems as students and as a…

  19. Outline of surface mass balance at Dome Fuji, East Antarctica, by the stake method from 1995 to 2006

    Directory of Open Access Journals (Sweden)

    Takao Kameda

    2008-06-01

    Full Text Available This paper describes observational results of surface mass balance (SMB at Dome Fuji (77°19'01″S, 39°42'11″E; 3810m a.s.l., East Antarctica from 1995 to 2006. The SMB was estimated using 36 bamboo stakes (grid of 6×6, placed at 20m intervals. The heights of the stake tops from the snow surface were measured at 0.5cm resolution twice monthly in 1995, 1996, 1997, and 2003, and once a year for the rest of the study period. The annual SMB from 1995 to 2006 at Dome Fuji was 27.3±1.5kgm^a^. This result agrees well with the annual SMB from AD 1260 to 1993 (26.4kgm^a^, estimated from volcanic signals in the Dome Fuji ice core. From 1995 to 2006, there were 37 incidences of negative or zero annual SMB, which was 8.6%. Compared with similar studies at Vostok, South Pole and Dome C, we found that a site with SMB over 190kgm^a^ is expected to have annual snow accumulation at the 95% confidence level. Sites from 1500 to 2500m above sea level fit the criteria on the Antarctic ice sheet. According to stake and snow pit observations at Vostok, we estimated that the probability of an annual layer missing (hiatus at Dome Fuji under present-day and glacial conditions are 9.4% and 11.4%, respectively. Variations of SMB measured by 36-stakes for 12 years were also analyzed.

  20. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    Science.gov (United States)

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  1. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  2. MODERN THREATS OF SOCIAL SAFETY OF THE EDUCATION ENVIRONMENT AND THEIR PREVENTION

    Directory of Open Access Journals (Sweden)

    Павел Александрович Кисляков

    2013-04-01

    Full Text Available Purpose: identify modern threats of safety of the school and substantiate the direction of their prevention.Methodology: a theoretical analysis of psychological and pedagogical literature on the issues of safety of students.Results: on the basis of theoretical and empirical analysis identified the following threats of social safety of the education environment: criminal threats, threats of extremism and terrorism, physical and mental abuse, interpersonal conflicts, addictive behavior of students. Substantiates the necessity the design of social safety protection, including space of health, space of tolerance, psychologically comfortable space without violence also providing appropriate training of educators.Practical implications: the system of education.DOI: http://dx.doi.org/10.12731/2218-7405-2013-2-2

  3. The Complex and Unequal Impact of High Stakes Accountability on Untested Social Studies

    Science.gov (United States)

    Pace, Judith L.

    2011-01-01

    This article contributes to research on the impact of high stakes accountability on social studies teaching where it is "not" tested by the state, and addresses the question of what is happening in middle and higher performing versus struggling schools (Wills, 2007). The author presents complex findings from a qualitative study in five…

  4. The Disproportionate Erosion of Local Control: Urban School Boards, High-Stakes Accountability, and Democracy

    Science.gov (United States)

    Trujillo, Tina M.

    2013-01-01

    This case study of an urban school board's experiences under high-stakes accountability demonstrates how the district leaders eschewed democratic governance processes in favor of autocratic behaviors. They possessed narrowly defined goals for teaching and learning that emphasized competitive, individualized means of achievement. Their decision…

  5. The stakes of iraqi petroleum: what is the role of France ?

    International Nuclear Information System (INIS)

    Sarkis, N.

    1995-01-01

    This work deals with some socio-economic and political aspects about the stakes of iraqi petroleum for France. After having described the history of iraqi petroleum, the author gives the estimation of the actual petroleum reserves, the production objective, the petroleum and gaseous projects and the exporting way. Then is given the economic and political role played by France: the increase of importation uses, the economic interests and the political responsibility. (O.L.). 10 tabs

  6. Food marketing to children and youth: threat or opportunity?

    National Research Council Canada - National Science Library

    McGinnis, J. Michael; Gootman, Jennifer Appleton; Kraak, Vivica I

    2006-01-01

    .... Yet the prevailing pattern of food and beverage marketing to children in America represents, at best, a missed opportunity, and at worst, a direct threat to the health prospects of the next generation. Childrenâ...

  7. Competing with peers: mentalizing-related brain activity reflects what is at stake.

    Science.gov (United States)

    Halko, Marja-Liisa; Hlushchuk, Yevhen; Hari, Riitta; Schürmann, Martin

    2009-06-01

    Competition imposes constraints for humans who make decisions. Concomitantly, people do not only maximize their personal profit but they also try to punish unfair conspecifics. In bargaining games, subjects typically accept equal-share offers but reject unduly small offers; competition affects this balance. Here we used functional magnetic resonance imaging (fMRI) to study adjustment to competition in a bargaining game where subjects competed against another person for a share of the stake. For medium-sized, but not for minimum offers, competition increased the likelihood of acceptance and thus shifted behavior towards maximizing personal profits, emphasizing the importance of financial incentives. Specifically for medium-sized offers, competition was associated with increased brain activation bilaterally in the temporo-parietal junction, a region associated with mentalizing. In the right inferior frontal region, competition-related brain activation was strongest in subjects whose high acceptance rates in the standard ultimatum game hinted at a profit-oriented approach. The results suggest a network of brain areas supporting decision making under competition, with incentive-dependent mentalizing engaged when the competitor's behavior is difficult to predict and when the stake is attractive enough to justify the effort.

  8. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  9. Achievement goal orientation and situational motivation for a low-stakes test of content knowledge.

    Science.gov (United States)

    Waskiewicz, Rhonda A

    2012-05-10

    To determine the extent of the relationship between students' inherent motivation to achieve in a doctor of pharmacy program and their motivation to achieve on a single low-stakes test of content knowledge. The Attitude Toward Learning Questionnaire (ATL) was administered to 66 third-year pharmacy students at the beginning of the spring 2011 semester, and the Student Opinion Scale (SOS) was administered to the same group immediately following completion of the Pharmacy Curricular Outcomes Assessment (PCOA). Significant differences were found in performance approach and work avoidance based on situational motivation scores. Situational motivation was also found to be directly correlated with performance and mastery approaches and inversely correlated with work avoidance. Criteria were met for predicting importance and effort from performance and mastery approaches and work avoidance scores of pharmacy students. The ability to predict pharmacy students' motivation to perform on a low-stakes standardized test of content knowledge increases the test's usefulness as a measure of curricular effectiveness.

  10. Philosophical Questions about Teaching Philosophy: What's at Stake in High School Philosophy Education?

    Science.gov (United States)

    Norris, Trevor

    2015-01-01

    What is at stake in high school philosophy education, and why? Why is it a good idea to teach philosophy at this level? This essay seeks to address some issues that arose in revising the Ontario grade 12 philosophy curriculum documents, significant insights from philosophy teacher education, and some early results of recent research funded by the…

  11. Existential and psychological problems connected with Threat Predicting Process

    Directory of Open Access Journals (Sweden)

    Mamcarz Piotr

    2014-01-01

    Full Text Available The aim of the article is to present a very important phenomenon affecting human integrity and homeostasis that is Threat Prediction Process. This process can be defined as “experiencing apprehension concerning results of potential/ actual dangers,” (Mamcarz, 2015 oscillating in terminological area of anxiety, fear, stress, restlessness. Moreover, it highlights a cognitive process distinctive for listed phenomenon’s. The process accompanied with technological and organization changes increases number of health problems affecting many populations. Hard work conditions; changing life style; or many social and political threats have influence on people’s quality of life that are even greater and more dangerous than physical and psychological factors, which, in turn, have much more consequences for human normal functioning. The present article is based on chosen case studies of a qualitative analysis of threat prediction process

  12. Accountable care organizations and radiology: threat or opportunity?

    Science.gov (United States)

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  13. Phytophthora Species, New Threats to the Plant Health in Korea

    Directory of Open Access Journals (Sweden)

    Ik-Hwa Hyun

    2014-12-01

    Full Text Available Given the lack of a resistant genetic pool in host plants, the introduction of exotic invasive pathogens can result in epidemics that affect a specific ecosystem and economy. Plant quarantine, which is designed to protect endemic plant resources, is a highly invaluable safeguard that should keep biosecurity with increasing international trade and global transportation. A total of 34 species of plant pathogens including Phytophthora infestans were documented as introduced from other countries into Korea from 1900 to 2010. The genus Phytophthora, classified in oomycetes, includes more than 120 species that are mostly recognized worldwide as highly invasive plant pathogens. After 2000, over 50 new species of Phytophthora were identified internationally as plant pathogens occurring in crops and forest trees. In Korea, Phytophthora is also one of the most serious plant pathogens. To date, 22 species (about one-fifth of known species of the genus have been identified and reported as plant pathogens in the country. The likelihood of new exotic Phytophthora species being introduced into Korea continues to increase, thus necessitating intensive plant quarantine inspections. As new potential threats to plant health in Korea, six Phytophthora species, namely, P. alni, P. inundata, P. kernoviae, P. pinifolia, P. quercina, and P. ramorum, are discussed in this review with focus on history, disease, biology, management, and plant quarantine issues.

  14. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  15. Tetanus: A Potential Public Health Threat in Times of Disaster.

    Science.gov (United States)

    Finkelstein, Paige; Teisch, Laura; Allen, Casey J; Ruiz, Gabriel

    2017-06-01

    for trauma and critical patients to become familiar with the protocols for treatment and immunization of patients that have tetanus-prone wounds, as well as recognize the potential for outbreaks in the settings of major natural disasters. Finkelstein P , Teisch L , Allen CJ , Ruiz G . Tetanus: a potential public health threat in times of disaster. Prehosp Disaster Med. 2017;32(3):339-342.

  16. Multiple Threats to Child Health from Fossil Fuel Combustion: Impacts of Air Pollution and Climate Change.

    Science.gov (United States)

    Perera, Frederica P

    2017-02-01

    Approaches to estimating and addressing the risk to children from fossil fuel combustion have been fragmented, tending to focus either on the toxic air emissions or on climate change. Yet developing children, and especially poor children, now bear a disproportionate burden of disease from both environmental pollution and climate change due to fossil fuel combustion. This commentary summarizes the robust scientific evidence regarding the multiple current and projected health impacts of fossil fuel combustion on the young to make the case for a holistic, child-centered energy and climate policy that addresses the full array of physical and psychosocial stressors resulting from fossil fuel pollution. The data summarized here show that by sharply reducing our dependence on fossil fuels we would achieve highly significant health and economic benefits for our children and their future. These benefits would occur immediately and also play out over the life course and potentially across generations. Going beyond the powerful scientific and economic arguments for urgent action to reduce the burning of fossil fuels is the strong moral imperative to protect our most vulnerable populations. Citation: Perera FP. 2017. Multiple threats to child health from fossil fuel combustion: impacts of air pollution and climate change. Environ Health Perspect 125:141-148; http://dx.doi.org/10.1289/EHP299.

  17. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  18. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  19. Negotiating the Literacy Block: Constructing Spaces for Critical Literacy in a High Stakes Setting

    Science.gov (United States)

    Paugh, Patricia; Carey, Jane; King-Jackson, Valerie; Russell, Shelley

    2007-01-01

    This article focuses on the evolution of the classroom literacy block as a learning space where teachers and students renegotiated activities for independent vocabulary and word work within a high-stakes reform environment. When a second grade classroom teacher and literacy support specialist decided to co-teach, they invited all students in the…

  20. Academically Buoyant Students Are Less Anxious about and Perform Better in High-Stakes Examinations

    Science.gov (United States)

    Putwain, David W.; Daly, Anthony L.; Chamberlain, Suzanne; Sadreddini, Shireen

    2015-01-01

    Background: Prior research has shown that test anxiety is negatively related to academic buoyancy, but it is not known whether test anxiety is an antecedent or outcome of academic buoyancy. Furthermore, it is not known whether academic buoyancy is related to performance on high-stakes examinations. Aims: To test a model specifying reciprocal…

  1. The role of genomics in the identification, prediction, and prevention of biological threats.

    Directory of Open Access Journals (Sweden)

    W Florian Fricke

    2009-10-01

    Full Text Available In all likelihood, it is only a matter of time before our public health system will face a major biological threat, whether intentionally dispersed or originating from a known or newly emerging infectious disease. It is necessary not only to increase our reactive "biodefense," but also to be proactive and increase our preparedness. To achieve this goal, it is essential that the scientific and public health communities fully embrace the genomic revolution, and that novel bioinformatic and computing tools necessary to make great strides in our understanding of these novel and emerging threats be developed. Genomics has graduated from a specialized field of science to a research tool that soon will be routine in research laboratories and clinical settings. Because the technology is becoming more affordable, genomics can and should be used proactively to build our preparedness and responsiveness to biological threats. All pieces, including major continued funding, advances in next-generation sequencing technologies, bioinformatics infrastructures, and open access to data and metadata, are being set in place for genomics to play a central role in our public health system.

  2. Assessing the Biological Threat Posed by Suicide Bombers

    Science.gov (United States)

    2016-02-01

    the test by about 350’, it is clear some aerosol particles “ surfed ” the shockwave from the blast and were carried a distance upwind. Had the sampling...projectiles implantation in victims of suicide bombings and implications for health and emergency care provideres: the 7/7 experience, Ann R Coll Surg Engl...Ebola in East Africa and Implications for Global Health and Security, Global Policy 2013. (8) Ustun, C.; Ozgurler, O., Ebola: A Significant Threat as

  3. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  4. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  5. The impact of high-stakes school admission exams on study achievements: quasi-experimental evidence from Slovakia

    Czech Academy of Sciences Publication Activity Database

    Federičová, Miroslava; Münich, Daniel

    2017-01-01

    Roč. 30, č. 4 (2017), s. 1069-1092 ISSN 0933-1433 Institutional support: Progres-Q24 Keywords : high-stakes exams * students’ motivation * achievement Subject RIV: AH - Economics OBOR OECD: Applied Economics , Econometrics Impact factor: 1.136, year: 2016

  6. Examining a Public Montessori School’s Response to the Pressures of High-Stakes Accountability

    Directory of Open Access Journals (Sweden)

    Corrie Rebecca Block

    2015-11-01

    Full Text Available In order to succeed in the current school assessment and accountability era, a public Montessori school is expected to achieve high student scores on standardized assessments. A problem for a public Montessori elementary school is how to make sense of the school’s high-stakes assessment scores in terms of its unique educational approach. This case study examined a public Montessori elementary school’s efforts as the school implemented the Montessori Method within the accountability era. The research revealed the ways the principal, teachers, and parents on the school council modified Montessori practices, curriculum, and assessment procedures based on test scores. A quality Montessori education is designed to offer children opportunities to develop both cognitive skills and affective components such as student motivation and socio-emotional skills that will serve them beyond their public school experiences. Sadly, the high-stakes testing environment influences so much of public education today. When quality education was measured through only one narrow measure of success the result in this school was clearly a restriction of priorities to areas that were easily assessed.

  7. Perceived Threat and Corroboration: Key Factors That Improve a Predictive Model of Trust in Internet-based Health Information and Advice

    Science.gov (United States)

    Harris, Peter R; Briggs, Pam

    2011-01-01

    Background How do people decide which sites to use when seeking health advice online? We can assume, from related work in e-commerce, that general design factors known to affect trust in the site are important, but in this paper we also address the impact of factors specific to the health domain. Objective The current study aimed to (1) assess the factorial structure of a general measure of Web trust, (2) model how the resultant factors predicted trust in, and readiness to act on, the advice found on health-related websites, and (3) test whether adding variables from social cognition models to capture elements of the response to threatening, online health-risk information enhanced the prediction of these outcomes. Methods Participants were asked to recall a site they had used to search for health-related information and to think of that site when answering an online questionnaire. The questionnaire consisted of a general Web trust questionnaire plus items assessing appraisals of the site, including threat appraisals, information checking, and corroboration. It was promoted on the hungersite.com website. The URL was distributed via Yahoo and local print media. We assessed the factorial structure of the measures using principal components analysis and modeled how well they predicted the outcome measures using structural equation modeling (SEM) with EQS software. Results We report an analysis of the responses of participants who searched for health advice for themselves (N = 561). Analysis of the general Web trust questionnaire revealed 4 factors: information quality, personalization, impartiality, and credible design. In the final SEM model, information quality and impartiality were direct predictors of trust. However, variables specific to eHealth (perceived threat, coping, and corroboration) added substantially to the ability of the model to predict variance in trust and readiness to act on advice on the site. The final model achieved a satisfactory fit: χ2 5 = 10

  8. One health security: an important component of the global health security agenda.

    Science.gov (United States)

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  9. Laser welded steel sandwich panel bridge deck development : finite element analysis and stake weld strength tests.

    Science.gov (United States)

    2009-09-01

    This report summarizes the analysis of laser welded steel sandwich panels for use in bridge structures and : static testing of laser stake welded lap shear coupons. Steel sandwich panels consist of two face sheets : connected by a relatively low-dens...

  10. Billions at stake in climate finance: four key lessons

    Energy Technology Data Exchange (ETDEWEB)

    Newell, Peter [University of East Anglia (United Kingdom); Roberts, J. Timmons [Brown University (United States); Boyd, Emily [University of Leeds (United Kingdom); Huq, Saleemul

    2009-11-15

    How can we break through the impasse on the road to Copenhagen? As the climate talks stall over the size of emissions cuts and who pays for them, it is increasingly clear that funding will be key to breaking the deadlock. Guaranteeing adequate levels of climate finance will be a deal maker or breaker for the poorest nations as the December summit approaches. But on the brink of a new chapter in climate funding, with unprecedented flows at stake, donor countries need to learn from decades of aid experience – mistakes as well as successes. Failure to do this risks wasting a great opportunity to kickstart low-carbon, climate-resilient development for the world's poor.

  11. Oil dependence. Myths and realities of a strategic stake

    International Nuclear Information System (INIS)

    Chaliand, G.; Jafalian, A.

    2005-04-01

    Using a series of regional studies, this collective book proposes to evaluate the strategic dimensions of the oil dependence and to determine its geopolitical impacts in the Middle East, Russia, China, USA and Europe. Content: the oil stakes at the beginning of the 21. century; in the center of the oil scene: the Middle East; oil dependence and US foreign policy: beyond myths; the Russian oil, instrument of influence and of alliances re-knitting; China and oil: security feelings and strategic approach; towards a European supply strategy; beyond petroleum: what alternatives; 150 years of petroleum history; the energy dependence; energy economy; automotive fuels and pollution abatement; limitation of greenhouse gas emissions; glossary; bibliography; index; Web links. (J.S.)

  12. Of Mother Tongues and Other Tongues: The Stakes of Linguistically Inclusive Pedagogy in Minority Contexts

    Science.gov (United States)

    Taylor, Lisa K.

    2008-01-01

    This article addresses two key challenges that globalization poses to literacy research: the need for new models of literacy and literacy education, and the stakes of adopting multiliteracies pedagogies in different contexts--that is, the tensions between competing hegemonic discourses of collective identity in the public sphere of ethnolinguistic…

  13. Markets, Managerialism and Teachers' Work: The Invisible Hand of High Stakes Testing in England

    Science.gov (United States)

    Stevenson, Howard; Wood, Phil

    2013-01-01

    High stakes testing has been long established in the English school system. In this article, we seek to demonstrate how testing has become pivotal to securing the neo-liberal restructuring of schools, that commenced during the Thatcher era, and is reaching a critical point at the current time. Central to this project has been the need to assert…

  14. What are the stakes of the hydroelectric power? Supplement: report on the renewable energies

    International Nuclear Information System (INIS)

    2003-01-01

    The document presents the regulation and the stakes concerning the hydroelectricity development in France: contribution to the greenhouse effect fight, the environment preservation, possible uses. It proposes then, a grid of a socio-economical evaluation of the projects. In this framework, the impacts of the little hydroelectric power and the possible corrective measures are described. (A.L.B.)

  15. Health Care System in Sudan: Review and Analysis of Strength, Weakness, Opportunity, and Threats (SWOT Analysis

    Directory of Open Access Journals (Sweden)

    Ebrahim M. A. Ebrahim

    2017-04-01

    Full Text Available Background: The Republic of the Sudan located in north-east of Africa and is considered to be a lower-middle income country. The country has well established healthcare system with many drawbacks mainly due to economic and managerial reasons followed by prolonged political instability and sanctions. Objective: The aim of this study is to give an insight over the health services system in Sudan and to analyze the strength, weakness, opportunities, and threats (SWOT. Materials and Methods: The search was done from two electronic databases: MEDLINE/Pubmed and from public search engines: Google Scholar and Google with key Search words used mainly as “Healthcare system in Sudan“. Additionally, SWOT analysis of healthcare system in Sudan was carried out based on the Roemer's model of health service system. Results: The Sudanese healthcare system was analyzed for different components of the system: The system in Sudan has full package of strategic plans and policies be it in a long term or short. Despite this there is poor implementation and organization along with frail health information system. The main external factors that drawback the system is the overall economic instability which resulted in cutting of the health expenditure. Conclusion: The Sudan is a rich country in terms of natural resources and population. Its health service system has strengths and weaknesses. It needs to build on its qualified human work force, stress on its well-designed short and long-term strategies on health care system and the partnership with external funding institutions, while overcoming the challenges on creating the proper health information system, economic support system and centralization of health service and professionals.

  16. Rationality on the rise: Why relative risk aversion increases with stake size

    OpenAIRE

    Fehr-Duda, Helga; Bruhin, Adrian; Epper, Thomas F.; Schubert, Renate

    2008-01-01

    How does risk tolerance vary with stake size? This important question cannot be adequately answered if framing effects, nonlinear probability weighting, and heterogeneity of preference types are neglected. We show that, contrary to gains, no coherent change in relative risk aversion is observed for losses. The increase in relative risk aversion over gains cannot be captured by the curvature of the utility function. It is driven predominantly by a change in probability weighting of a majority ...

  17. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  18. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  19. The global threat of antimicrobial resistance: science for intervention

    Directory of Open Access Journals (Sweden)

    I. Roca

    2015-07-01

    Full Text Available In the last decade we have witnessed a dramatic increase in the proportion and absolute number of bacterial pathogens resistant to multiple antibacterial agents. Multidrug-resistant bacteria are currently considered as an emergent global disease and a major public health problem. The B-Debate meeting brought together renowned experts representing the main stakeholders (i.e. policy makers, public health authorities, regulatory agencies, pharmaceutical companies and the scientific community at large to review the global threat of antibiotic resistance and come up with a coordinated set of strategies to fight antimicrobial resistance in a multifaceted approach. We summarize the views of the B-Debate participants regarding the current situation of antimicrobial resistance in animals and the food chain, within the community and the healthcare setting as well as the role of the environment and the development of novel diagnostic and therapeutic strategies, providing expert recommendations to tackle the global threat of antimicrobial resistance.

  20. [Personalized medicine, privatized medicine? legal and public health stakes].

    Science.gov (United States)

    Rial-Sebbag, Emmanuelle

    2014-11-01

    Personalized medicine is booming. It tends to provide a medical management "tailored" for groups of patients, or for one unique patient, but also to identify risk groups to develop public health strategies. In this context, some radicalization phenomenon can emerge, leading to not only personalized medicine but also privatized medicine, which can lead to a capture of the medical public resource. If the "privatization" of medicine is not limited to producing adverse effects, several potentially destabilizing phenomena for patients still remain. First, some objective factors, like the adjustment of scientific prerequisites, are emerging from personalized medicine practices (clinical trial, public health policy) and are interfering with the medical doctor/patient relationship. Another risk emerges for patients concomitantly to their demand for controlling their own health, in terms of patients' security although these risks are not clearly identified and not effectively communicated. These practices, related to a privatized medicine, develop within the healthcare system but also outside, and the government and legislators will have to take into account these new dimensions in drafting their future regulations and policies. © 2014 médecine/sciences – Inserm.

  1. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  2. Multiple Threats to Child Health from Fossil Fuel Combustion: Impacts of Air Pollution and Climate Change

    Science.gov (United States)

    Perera, Frederica P.

    2016-01-01

    Background: Approaches to estimating and addressing the risk to children from fossil fuel combustion have been fragmented, tending to focus either on the toxic air emissions or on climate change. Yet developing children, and especially poor children, now bear a disproportionate burden of disease from both environmental pollution and climate change due to fossil fuel combustion. Objective: This commentary summarizes the robust scientific evidence regarding the multiple current and projected health impacts of fossil fuel combustion on the young to make the case for a holistic, child-centered energy and climate policy that addresses the full array of physical and psychosocial stressors resulting from fossil fuel pollution. Discussion: The data summarized here show that by sharply reducing our dependence on fossil fuels we would achieve highly significant health and economic benefits for our children and their future. These benefits would occur immediately and also play out over the life course and potentially across generations. Conclusion: Going beyond the powerful scientific and economic arguments for urgent action to reduce the burning of fossil fuels is the strong moral imperative to protect our most vulnerable populations. Citation: Perera FP. 2017. Multiple threats to child health from fossil fuel combustion: impacts of air pollution and climate change. Environ Health Perspect 125:141–148; http://dx.doi.org/10.1289/EHP299 PMID:27323709

  3. Environmental Pollution: An Under-recognized Threat to Children's Health, Especially in Low- and Middle-Income Countries.

    Science.gov (United States)

    Suk, William A; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R; Sly, Leith; Sly, Peter D; Stein, Renato T; van den Berg, Martin; Zar, Heather; Landrigan, Philip J

    2016-03-01

    Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children's health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease.

  4. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  5. The Contradictions of High-Stakes Accountability "Success": A Case Study of Focused Leadership and Performance Agency

    Science.gov (United States)

    Black, William R.

    2008-01-01

    This article seeks to advance the discussion of the availability of contemporary notions of school leadership for school leaders working within high-stakes accountability reform environment that produce discourses of urgency and legitimize practices of performance that implicitly favour centralized, neo-Tayloristic managerial approaches. Drawing…

  6. Thinking about the threat of nuclear war: relevance to mental health

    International Nuclear Information System (INIS)

    Goldenberg, S.; LaCombe, S.; Levinson, D.; Parker, K.R.; Ross, C.; Sommers, F.

    1985-01-01

    Ontario students in grades 7-13 responded to open-ended and multiple-choice questions about future concerns, particularly unemployment, job/career plans, and the nuclear threat. Although worries about nuclear war were more frequent than those in other areas, their expression was associated with a sense of social efficacy rather than with feelings of helplessness

  7. Stakes and modalities of the climatic risk covering

    International Nuclear Information System (INIS)

    Marteau, D.

    2006-01-01

    Several econometric works show that climatic volatility is at the first rank of the risk factors in several economic sectors like energy, textile, agriculture and food, tourism, leisure, building industries etc. However, climate remains an underestimated economic factor for several reasons: lack of awareness about the comparative stakes of climate risks management and market risks management, difficulties in the measurement of climate risk exposure, weak knowledge of covering techniques for private contract and organized markets, and unsolved question of risk sharing between shareholders and managers. This document analyzes the sensitivity of companies with respect to climate risk and describes the 5 steps of implementation of a climate covering policy: risk exposure measurement, risk bearing or transfer decision, definition of the optimum covering profile, choice of markets and covering instruments, efficiency measurement. A practical example is shown with its related questions. (J.S.)

  8. Group Differences in Test-Taking Behaviour: An Example from a High-Stakes Testing Program

    Science.gov (United States)

    Stenlund, Tova; Eklöf, Hanna; Lyrén, Per-Erik

    2017-01-01

    This study investigated whether different groups of test-takers vary in their reported test-taking behaviour in a high-stakes test situation. A between-group design (N = 1129) was used to examine whether high and low achievers, as well as females and males, differ in their use of test-taking strategies, and in level of reported test anxiety and…

  9. Examining a Public Montessori School's Response to the Pressures of High-Stakes Accountability

    Science.gov (United States)

    Block, Corrie Rebecca

    2015-01-01

    A public Montessori school is expected to demonstrate high student scores on standardized assessments to succeed in the current school accountability era. A problem for a public Montessori elementary school is how to make sense of the school's high-stakes assessment scores in terms of Montessori's unique educational approach. This case study…

  10. Application of strengths, weaknesses, opportunities and threats analysis in the development of a health technology assessment program.

    Science.gov (United States)

    Gibis, B; Artiles, J; Corabian, P; Meiesaar, K; Koppel, A; Jacobs, P; Serrano, P; Menon, D

    2001-10-01

    There has been recent interest in developing a health technology assessment (HTA) function in Estonia. A group of individuals knowledgeable about HTA in Canada, Germany, Romania and Spain, along with representatives of the University of Tartu, Estonia, was convened by the Institute of Health Economics in Edmonton, Canada, to consider options for such a function. In a one-day workshop strengths, weaknesses, opportunities and threats (SWOT) analyses of HTA were conducted, first at a 'global' level, and then of the Estonian situation. The 'global' SWOT analysis yielded a large number of items that pertain to institutionalized HTA in a generic sense, i.e. not based on any individual HTA agency. The 'Estonian' SWOT yielded a subset of items, which pertain to development of HTA in that country. Ten actionable steps were then developed on the basis of this subset, which could be used to initiate the creation of an HTA body in Estonia.

  11. Counter-regulating on the Internet: Threat elicits preferential processing of positive information.

    Science.gov (United States)

    Greving, Hannah; Sassenberg, Kai; Fetterman, Adam

    2015-09-01

    The Internet is a central source of information. It is increasingly used for information search in self-relevant domains (e.g., health). Self-relevant topics are also associated with specific emotions and motivational states. For example, individuals may fear serious illness and feel threatened. Thus far, the impact of threat has received little attention in Internet-based research. The current studies investigated how threat influences Internet search. Threat is known to elicit the preferential processing of positive information. The self-directed nature of Internet search should particularly provide opportunities for such processing behavior. We predicted that during Internet search, more positive information would be processed (i.e., allocated more attention to) and more positive knowledge would be acquired under threat than in a control condition. Three experiments supported this prediction: Under threat, attention is directed more to positive web pages (Study 1) and positive links (Study 2), and more positive information is acquired (Studies 1 and 3) than in a control condition. Notably, the effect on knowledge acquisition was mediated by the effect on attention allocation during an actual Internet search (Study 1). Thus, Internet search under threat leads to selective processing of positive information and dampens threatened individuals' negative affect. (c) 2015 APA, all rights reserved).

  12. The Legal Side of Campus Threat Assessment and Management: What Student Counselors Need to Know

    Science.gov (United States)

    Nolan, Jeffrey J.; Moncure, Thomas M., Jr.

    2012-01-01

    This article identifies what student mental health professionals need to know about legal issues of relevance to threat assessment and management. The article summarizes the common law duties and the common law and statutory standards of care that are likely to apply to the work of college and university threat assessment and management teams. The…

  13. High-stakes conflicts and the link between theory and practice : celebrating the work of Ellen Giebels

    NARCIS (Netherlands)

    Oostinga, Miriam S.D.; Rispens, Sonja; Taylor, Paul J.; Ufkes, Elze G.

    2018-01-01

    In this tribute to the 2012 recipient of the IACM's Jeffrey Rubin's Theory-to-Practice Award, we celebrate the work of Ellen Giebels. We highlight her groundbreaking research on influence tactics in crisis negotiations and other high-stakes conflict situations, showing how her focus on theoretical

  14. High-Stakes Conflicts and the Link between Theory and Practice : Celebrating the Work of Ellen Giebels

    NARCIS (Netherlands)

    Oostinga, Miriam S.D.; Rispens, Sonja; Taylor, Paul J.; Ufkes, Elze G.

    2018-01-01

    In this tribute to the 2012 recipient of the IACM's Jeffrey Rubin's Theory-to-Practice Award, we celebrate the work of Ellen Giebels. We highlight her groundbreaking research on influence tactics in crisis negotiations and other high-stakes conflict situations, showing how her focus on theoretical

  15. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  16. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  17. Management of radioactive materials and wastes: status, stakes and perspectives

    International Nuclear Information System (INIS)

    Champion, Didier; Devin, Patrick; Tanguy, Loic; Bernard, Herve; Minon, Jean-Paul; Leclaire, Arnaud; Gilli, Ludivine; Lheureux, Yves; Pescatore, Claudio; Barbey, Pierre; Schneider, Thierry; Gay, Didier; Forest, Isabelle; Hemidy, Pierre-Yves; Baglan, Nicolas; Desnoyers, Bruno; Pieraccini, Michel; Poncet, Philippe; Seguin, Bertille; Calvez, Marianne; Leclerc, Elisabeth; Bancelin, Estelle; Fillion, Eric; Segura, Yannick; Vernaz, Etienne; Granier, Guy; De Preter, Peter; Petitfrere, Michael; Laye, Frederic; Nakamura, Takashi; Gin, Stephane; Lebaron-Jacobs, Laurence; Dinant, Sophie; Vacquier, Blandine; Crochon, Philippe; Griffault, Lise; Smith, Graham

    2013-10-01

    These technical days were organized by the Environment section of the French Society of Radiation Protection (SFRP). Time was given to some exchange about the societal aspects of radioactive waste management as well as about the legal context but the most part of the debates delt with the actual management modalities of the different types of wastes, both in France and in foreign countries, and with the related stakes, in particular in terms of impact. This document brings together the presentations (slides) of the following talks: - Contributions of radiation protection to the long-term safety management of radioactive wastes (Jean-Paul MINON - ONDRAF); - The national inventory of radioactive materials and wastes (Arnaud LECLAIRE - ANDRA); - The high activity, medium activity-long living wastes in debate - a co-building approach (ANCCLI/Clis of Bure/IRSN) to share stakes, enlighten, and develop thought (Ludivine GILLI - IRSN, Yves LHEUREUX - ANCCLI); - Social aspects of Radioactive Waste Management - The International Learning (Claudio PESCATORE - AEN/OCDE); - Citizens involvement and ACRO's point of view on radioactive wastes management (Pierre BARBEY - ACRO); - New CIPR recommendations about the geologic disposal of long-living radioactive wastes (Thierry SCHNEIDER - CEPN); - Overview of processes under the views of radiation protection principles (Didier GAY - IRSN); - The national plan of radioactive materials and wastes management (Loic TANGUY - ASN); - Joint convention on spent fuel management safety and on radioactive waste management safety - status and main stakes (Isabelle FOREST - ASN); - Transport of radioactive wastes (Bruno DESNOYERS - AREVA); - Optimisation and limitation of the environmental impacts of very-low level wastes - valorisation and processes selection (Michel PIERACCINI - EDF), Philippe PONCET - AREVA); - Management of hospital wastes - Example of Montpellier's University Regional Hospital (Bertille SEGUIN - CHRU de Montpellier); - Waste

  18. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  19. Changes in coping behavior and the relationship to personality, health threat communication and illness perceptions from the diagnosis of diabetes: a 2-year prospective longitudinal study

    Directory of Open Access Journals (Sweden)

    Valerie L. Lawson

    2013-08-01

    Full Text Available Coping behavior is of critical importance in diabetes because of its impact upon self-care and hence eventual medical outcome. We examined how coping behavior and its relationship to personality, diabetes health threat communication (DHTC and illness representations changes after diagnosis of diabetes. Newly diagnosed diabetic patients were assessed after diagnosis and at 6, 12 and 24 months using the DHTC, Illness Perceptions and Coping inventory questionnaires. Personality traits were assessed at baseline. Active coping, planning, positive reinterpretation and growth (PRG, seeking emotional and instrumental (social support decreased over the 2 years from diagnosis while passive acceptance increased. Openness/intellect and conscientiousness traits were associated with active coping and seeking instrumental support. Openness/intellect also associated with planning and PRG. These relationships did not vary over time. Perceived threat and serious consequences were associated with active coping but the effect diminished over time. Illness coherence (understanding of diabetes, personal and treatment control were associated with active coping, planning and seeking instrumental support and did not change over time. The coping strategies most commonly employed by diabetic patients are adaptive. Coping behavior changes over the 2 years from diagnosis. Promoting better understanding of diabetes, perceptions of personal control and treatment effectiveness are more likely than perception of health threat to sustain adaptive problem focused coping behavior.

  20. "I'm Just Going through the Motions": High-Stakes Accountability and Teachers' Access to Intrinsic Rewards

    Science.gov (United States)

    Rooney, Erin

    2015-01-01

    This article explores teachers' experiences under high-stakes accountability and shows how the narrowing of curriculum depleted teachers' intrinsic work rewards. The article analyzes data from an ethnographic study of teachers' work in two high-poverty urban public schools. The study shows that as instructional mandates emphasized a narrowed…

  1. Global Health Solidarity.

    Science.gov (United States)

    West-Oram, Peter G N; Buyx, Alena

    2017-07-01

    For much of the 20th century, vulnerability to deprivations of health has often been defined by geographical and economic factors. Those in wealthy, usually 'Northern' and 'Western', parts of the world have benefited from infrastructures, and accidents of geography and climate, which insulate them from many serious threats to health. Conversely, poorer people are typically exposed to more threats to health, and have lesser access to the infrastructures needed to safeguard them against the worst consequences of such exposure. However, in recent years the increasingly globalized nature of the world's economy, society and culture, combined with anthropogenic climate change and the evolution of antibiotic resistance, has begun to shift the boundaries that previously defined the categories of person threatened by many exogenous threats to health. In doing so, these factors expose both new and forgotten similarities between persons, and highlight the need for global cooperative responses to the existential threats posed by climate change and the evolution of antimicrobial resistance. In this article, we argue that these emerging health threats, in demonstrating the similarities that exist between even distant persons, provides a catalyst for global solidarity, which justifies, and provides motivation for, the establishment of solidaristic, cooperative global health infrastructures.

  2. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies

    Science.gov (United States)

    Mackey, Tim K.; Nayyar, Gaurvika

    2016-01-01

    Background Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. Sources of data A review was conducted of the English literature with search terms ‘online pharmacies’, ‘Internet pharmacies’, ‘cyber pharmacies’, ‘rogue pharmacies’, and ‘e-pharmacies’ using PubMed, JSTOR, and Google Scholar from 1999–2005. Areas of agreement Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Areas of controversy Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Growing points Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. Areas timely for developing research There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. PMID:27151957

  3. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies.

    Science.gov (United States)

    Mackey, Tim K; Nayyar, Gaurvika

    2016-06-01

    Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. A review was conducted of the English literature with search terms 'online pharmacies', 'Internet pharmacies', 'cyber pharmacies', 'rogue pharmacies', and 'e-pharmacies' using PubMed, JSTOR, and Google Scholar from 1999-2005. Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. Vector-borne disease intelligence: strategies to deal with disease burden and threats

    Czech Academy of Sciences Publication Activity Database

    Braks, M.; Medlock, J. M.; Hubálek, Zdeněk; Hjertqvist, M.; Perrin, Y.; Lancelot, R.; Duchyene, E.; Hendrickx, G.; Stroo, A.; Heyman, P.; Sprong, H.

    2014-01-01

    Roč. 2, č. 280 (2014), s. 280 ISSN 2296-2565 Institutional support: RVO:68081766 Keywords : disease burden * emerging diseases * one health * surveillance * threat * vector-borne diseases Subject RIV: EE - Microbiology, Virology

  5. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  6. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  7. The impact of high-stakes school admission exams on study achievements: quasi-experimental evidence from Slovakia

    Czech Academy of Sciences Publication Activity Database

    Federičová, Miroslava; Münich, Daniel

    2017-01-01

    Roč. 30, č. 4 (2017), s. 1069-1092 ISSN 0933-1433 R&D Projects: GA ČR(CZ) GBP402/12/G130 Institutional support: RVO:67985998 Keywords : high-stakes exams * students’ motivation * achievement Subject RIV: AH - Economics OBOR OECD: Applied Economics , Econometrics Impact factor: 1.136, year: 2016

  8. A Case Study of Co-Teaching in an Inclusive Secondary High-Stakes World History I Classroom

    Science.gov (United States)

    van Hover, Stephanie; Hicks, David; Sayeski, Kristin

    2012-01-01

    In order to provide increasing support for students with disabilities in inclusive classrooms in high-stakes testing contexts, some schools have implemented co-teaching models. This qualitative case study explores how 1 special education teacher (Anna) and 1 general education history teacher (John) make sense of working together in an inclusive…

  9. We Save, We Go to College. Creating a Financial Stake in College: Report III of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  10. Vigilant attention to threat, sleep patterns, and anxiety in peripubertal youth.

    Science.gov (United States)

    Ricketts, Emily J; Price, Rebecca B; Siegle, Greg J; Silk, Jennifer S; Forbes, Erika E; Ladouceur, Cecile D; Harvey, Allison G; Ryan, Neal D; Dahl, Ronald E; McMakin, Dana L

    2018-05-02

    Vigilant attention to threat is commonly observed in anxiety, undergoes developmental changes in early adolescence, and has been proposed to interfere with sleep initiation and maintenance. We present one of the first studies to use objective measures to examine associations between vigilant attention to threat and difficulties initiating and maintaining sleep in an early adolescent anxious sample. We also explore the moderating role of development (age, puberty) and sex. Participants were 66 peripubertal youth (ages 9-14) with a primary anxiety disorder and 24 healthy control subjects. A dot-probe task was used to assess attentional bias to fearful relative to neutral face stimuli. Eye-tracking indexed selective attentional bias to threat, and reaction time bias indexed action readiness to threat. Sleep was assessed via actigraphy (e.g. sleep onset delay, wake after sleep onset, etc.), parent report (Children's Sleep Habits Questionnaire), and child report (Sleep Self-Report). The Pediatric Anxiety Rating Scale assessed anxiety severity. Eye-tracking initial threat fixation bias (β = .33, p = .001) and threat dwell time bias (β = .22, p = .041) were positively associated with sleep onset latency. Reaction time bias was positively associated with wake after sleep onset (β = .24, p = .026) and parent-reported sleep disturbance (β = .25, p = .019). Anxiety (severity, diagnosis) was not associated with these outcomes. Sex (β = -.32, p = .036) moderated the relation between initial threat fixation bias and sleep onset latency, with a positive association for males (p = .005), but not for females (p = .289). Age and pubertal status did not moderate effects. Vigilant attention to threat is related to longer sleep onset and reduced sleep maintenance. These associations are not stronger in early adolescents with anxiety. Implications for early intervention or prevention that targets vigilant attention to threat to impact sleep disturbance, and

  11. International economy. 82, controlling greenhouse effect: the stake of the international public policy

    International Nuclear Information System (INIS)

    Godard, O.; Oliveira-Martins, J.; Sgard, J.

    2000-01-01

    The greenhouse effect is one of the first stake of public policy which needs to be considered at the worldwide level. The climate changes shade doubts on the economic growth strategies adopted by all countries, and, if no major effort is made in the mastery of energy demand, worldwide greenhouse gas emissions will rapidly reach dangerous thresholds. This book gives a status of the research carried out on the economical impact of these policies. (J.S.)

  12. Environmental Pollution: An Under-recognized Threat to Children’s Health, Especially in Low- and Middle-Income Countries

    Science.gov (United States)

    Suk, William A.; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O.; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R.; Sly, Leith; Sly, Peter D.; Stein, Renato T.; van den Berg, Martin; Zar, Heather; Landrigan, Philip J.

    2016-01-01

    Summary Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children’s health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease. PMID:26930243

  13. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  14. How many stakes are required to measure the mass balance of a glacier?

    Science.gov (United States)

    Fountain, A.G.; Vecchia, A.

    1999-01-01

    Glacier mass balance is estimated for South Cascade Glacier and Maclure Glacier using a one-dimensional regression of mass balance with altitude as an alternative to the traditional approach of contouring mass balance values. One attractive feature of regression is that it can be applied to sparse data sets where contouring is not possible and can provide an objective error of the resulting estimate. Regression methods yielded mass balance values equivalent to contouring methods. The effect of the number of mass balance measurements on the final value for the glacier showed that sample sizes as small as five stakes provided reasonable estimates, although the error estimates were greater than for larger sample sizes. Different spatial patterns of measurement locations showed no appreciable influence on the final value as long as different surface altitudes were intermittently sampled over the altitude range of the glacier. Two different regression equations were examined, a quadratic, and a piecewise linear spline, and comparison of results showed little sensitivity to the type of equation. These results point to the dominant effect of the gradient of mass balance with altitude of alpine glaciers compared to transverse variations. The number of mass balance measurements required to determine the glacier balance appears to be scale invariant for small glaciers and five to ten stakes are sufficient.

  15. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  16. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  17. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  19. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    Energy Technology Data Exchange (ETDEWEB)

    Goix, Sylvaine [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Lévêque, Thibaut [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); ADEME (French Agency for Environment and Energy Management), 20 Avenue du Grésillé, BP 90406, 49004 Angers Cedex 01 (France); Xiong, Tian-Tian [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Schreck, Eva [Géosciences Environnement Toulouse (GET), Observatoire Midi Pyrénées, Université de Toulouse, CNRS, IRD, 14 Avenue E. Belin, F-31400 Toulouse (France); and others

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.

  20. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment.

    Science.gov (United States)

    Boevé, Anja J; Meijer, Rob R; Albers, Casper J; Beetsma, Yta; Bosker, Roel J

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration.

  1. Ideas for Refining Children's Savings Account Proposals. Creating a Financial Stake in College: Report IV of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings…

  2. Experience-based knowledge in nuclear and radiological emergency preparedness - involvement of national stake holders. Report from the EURANOS project; Erfaringsbasert kunnskap i norsk atomberedskap - medvirkning fra beroerte parter. Rapport fra EURANOS-prosjektet

    Energy Technology Data Exchange (ETDEWEB)

    Bay-Larsen, I.; Oughton, D.; Liland, A.; Eikelmann, I.M.; Hansen, H.S.

    2009-05-15

    The report identifies and summarises the most important experiences related to long term rehabilitation of contaminated areas after the Chernobyl accident, as phrased by representatives from the agricultural sector (including reindeer herding), primary health care, academia, NGOs, local and regional authorities, as well as national authorities with responsibilities for emergency preparedness within their sector. It also includes recommendations for future collaboration to ensure competence and stake holder involvement in Norwegian nuclear and radiological emergency preparedness. (Author)

  3. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. New threats to health data privacy.

    Science.gov (United States)

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  5. New threats to health data privacy

    Directory of Open Access Journals (Sweden)

    Li Fengjun

    2011-11-01

    Full Text Available Abstract Background Along with the rapid digitalization of health data (e.g. Electronic Health Records, there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  6. Why Policymakers Should Care about Children's Savings. Creating a Financial Stake in College: Report I of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  7. Teaching under the New Taylorism: High-Stakes Testing and the Standardization of the 21st Century Curriculum

    Science.gov (United States)

    Au, Wayne

    2011-01-01

    The application of the principles of scientific management within the structure, organization, and curriculum of public schools in the US became dominant during the early 1900s. Based upon research evidence from the modern day era of high-stakes testing in US public education, the fundamental logics guiding scientific management have resurfaced…

  8. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  9. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  10. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  11. Analysis of strengths, weaknesses, opportunities, and threats in the development of a health technology assessment program in Turkey.

    Science.gov (United States)

    Kahveci, Rabia; Meads, Catherine

    2008-01-01

    The Turkish healthcare system is currently undergoing reform, and efficient use of resources has become a key factor in determining the allocation of resources. The objective of this study was to analyze strengths, weaknesses, opportunities, and threats (SWOT) in the development of a health technology assessment (HTA) program in Turkey. A SWOT analysis was performed using a literature review and interviews with key people in the Turkish Ministry of Health and Ministry of Labor and Social Security. Regarding recent reforms in health care, investments for information network and databank are the strengths, but the traditional "expert-based" decision making, poor availability of data, and poor quality of data could be seen as some of the weaknesses. Another major weakness is lack of general awareness of HTA. Increasing demand for transparency in decision making, demand for evidence, and demand for credibility by decision makers are some of the opportunities, and current healthcare reforms, i.e., restructuring of healthcare and general health insurance, could also be seen as major opportunities. These opportunities unfortunately could be threatened by lack of funding, and resources are challenged by large, recent national investments. There is a good opportunity for Turkey to use the skills in HTA currently being developed through activities in Europe and the Americas to assist in the development of a much more cost-effective and transparent healthcare system in Turkey.

  12. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  13. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  14. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  15. Experimental Investigation on Electric Current-Aided Laser Stake Welding of Aluminum Alloy T-Joints

    Directory of Open Access Journals (Sweden)

    Xinge Zhang

    2017-11-01

    Full Text Available In the present study, aluminum alloy T-joints were welded using the laser stake-welding process. In order to improve the welding quality of the T-joints, an external electric current was used to aid the laser stake-welding process. The effects of the process parameters on the weld morphology, mechanical properties, and microstructure of the welded joints were analyzed and discussed in detail. The results indicate that the aided electric current should be no greater than a certain maximum value. Upon increasing the aided electric current, the weld width at the skin and stringer faying surface obviously increased, but there was an insignificant change in the penetration depth. Furthermore, the electric current and pressing force should be chosen to produce an expected weld width at the faying surface, whereas the laser power and welding speed should be primarily considered to obtain an optimal penetration depth. The tensile shear specimens failed across the faying surface or failed in the weld zone of the skin. The specimens that failed in the weld of the skin could resist a higher tensile shear load compared with specimens that failed across the faying surface. The microstructural observations and microhardness results demonstrated that the tensile shear load capacity of the aluminum alloy welded T-joint was mainly determined by the weld width at the faying surface.

  16. Invasive lionfish (Pterois volitans): a potential human health threat for ciguatera fish poisoning in tropical waters.

    Science.gov (United States)

    Robertson, Alison; Garcia, Ana C; Quintana, Harold A Flores; Smith, Tyler B; Castillo, Bernard F; Reale-Munroe, Kynoch; Gulli, Joseph A; Olsen, David A; Hooe-Rollman, Jennifer I; Jester, Edward L E; Klimek, Brian J; Plakas, Steven M

    2013-12-27

    Invasive Indo-Pacific lionfish (Pterois volitans) have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP). More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas.

  17. Invasive Lionfish (Pterois volitans: A Potential Human Health Threat for Ciguatera Fish Poisoning in Tropical Waters

    Directory of Open Access Journals (Sweden)

    Alison Robertson

    2013-12-01

    Full Text Available Invasive Indo-Pacific lionfish (Pterois volitans have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP. More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas.

  18. Invasive Lionfish (Pterois volitans): A Potential Human Health Threat for Ciguatera Fish Poisoning in Tropical Waters

    Science.gov (United States)

    Robertson, Alison; Garcia, Ana C.; Flores Quintana, Harold A.; Smith, Tyler B.; Castillo, Bernard F.; Reale-Munroe, Kynoch; Gulli, Joseph A.; Olsen, David A.; Hooe-Rollman, Jennifer I.; Jester, Edward L. E.; Klimek, Brian J.; Plakas, Steven M.

    2013-01-01

    Invasive Indo-Pacific lionfish (Pterois volitans) have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP). More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas. PMID:24378919

  19. Information report on Proliferation geo-strategic stakes

    International Nuclear Information System (INIS)

    2009-11-01

    This large report, notably based on interviews of many representatives of international institutions and politicians, ambassadors and researchers of different countries, all involved or specialized in nuclear and defence issues, starts with a description of the evolution of the international and geo-strategic context from the Cold War to a period of a new nuclear proliferation, with, in between, a period of stabilisation between the USA and the USSR. It also questions the various forms of proliferation which could be ballistic, biological, chemical, and cybernetic. Then, it analyses the role which mass destruction weapons have in international relationships, making a distinction between countries possessing such weapons (USA, Russia, China, France, Great-Britain), Israel which has been a newcomer for thirty years, the new actors (India, Pakistan, Iran, North Korea) with their own and different motivations, and the possible new actors (Libya, Syria). It comments the meaning of the ballistic threat and of the anti-missile defence. The third part of this report deals with the dissemination of proliferating technologies, describing the proliferation networks and the failure of actions against state-based proliferations, questioning the reality of the associated risks (discussion about the impact of September 11 attacks, about a chemical and biological terrorist threat which is realistic as well as difficult to be implemented, and about cybernetic attacks). The fourth part comments the impact of the international community on proliferation, outlining the different efficiencies of the international agreements and institutions (Chemical Weapons Convention, IAEA, Non Proliferation Treaty, Biological Weapons Convention, The Hague Code of Conduct), commenting the opportunities associated with other texts (those about nuclear free areas, or those produced by exporter groups), and discussing the attitude of the international community with respect to proliferation, and the

  20. Introducing Computer-Based Testing in High-Stakes Exams in Higher Education: Results of a Field Experiment

    Science.gov (United States)

    Boevé, Anja J.; Meijer, Rob R.; Albers, Casper J.; Beetsma, Yta; Bosker, Roel J.

    2015-01-01

    The introduction of computer-based testing in high-stakes examining in higher education is developing rather slowly due to institutional barriers (the need of extra facilities, ensuring test security) and teacher and student acceptance. From the existing literature it is unclear whether computer-based exams will result in similar results as paper-based exams and whether student acceptance can change as a result of administering computer-based exams. In this study, we compared results from a computer-based and paper-based exam in a sample of psychology students and found no differences in total scores across the two modes. Furthermore, we investigated student acceptance and change in acceptance of computer-based examining. After taking the computer-based exam, fifty percent of the students preferred paper-and-pencil exams over computer-based exams and about a quarter preferred a computer-based exam. We conclude that computer-based exam total scores are similar as paper-based exam scores, but that for the acceptance of high-stakes computer-based exams it is important that students practice and get familiar with this new mode of test administration. PMID:26641632

  1. It's All About the Money (For Some): Consequences of Financially Contingent Self-Worth.

    Science.gov (United States)

    Park, Lora E; Ward, Deborah E; Naragon-Gainey, Kristin

    2017-05-01

    Financial success is an important goal, yet striving for it is often associated with negative outcomes. One reason for this paradox is that financial pressures may be tied to basing self-worth on financial success. Studies 1a to 1c developed a measure of Financial Contingency of Self-Worth (Financial CSW), and found that it predicted more financial social comparisons, financial hassles, stress, anxiety, and less autonomy. In response to a financial (vs. academic) threat, higher Financial CSW participants experienced less autonomy, perceived financial problems more negatively, and disengaged from their financial problems (Study 2). When given an opportunity to self-affirm, however, Financial CSW participants did not show diminished autonomy in response to a financial (vs. academic) threat (Study 3). Finally, participants with higher Financial CSW were less likely to make extravagant spending decisions following a financial (vs. health) threat (Study 4). Together, these studies demonstrate the many consequences of staking self-worth on financial success.

  2. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  3. Planetary health: protecting human health on a rapidly changing planet.

    Science.gov (United States)

    Myers, Samuel S

    2018-12-23

    The impact of human activities on our planet's natural systems has been intensifying rapidly in the past several decades, leading to disruption and transformation of most natural systems. These disruptions in the atmosphere, oceans, and across the terrestrial land surface are not only driving species to extinction, they pose serious threats to human health and wellbeing. Characterising and addressing these threats requires a paradigm shift. In a lecture delivered to the Academy of Medical Sciences on Nov 13, 2017, I describe the scale of human impacts on natural systems and the extensive associated health effects across nearly every dimension of human health. I highlight several overarching themes that emerge from planetary health and suggest advances in the way we train, reward, promote, and fund the generation of health scientists who will be tasked with breaking out of their disciplinary silos to address this urgent constellation of health threats. I propose that protecting the health of future generations requires taking better care of Earth's natural systems. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Medical Providers as Global Warming and Climate Change Health Educators: A Health Literacy Approach

    Science.gov (United States)

    Villagran, Melinda; Weathers, Melinda; Keefe, Brian; Sparks, Lisa

    2010-01-01

    Climate change is a threat to wildlife and the environment, but it also one of the most pervasive threats to human health. The goal of this study was to examine the relationships among dimensions of health literacy, patient education about global warming and climate change (GWCC), and health behaviors. Results reveal that patients who have higher…

  5. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  6. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  7. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  8. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  9. Public Health Autonomy: A Critical Reappraisal.

    Science.gov (United States)

    Zimmerman, Frederick J

    2017-11-01

    The ethical principle of autonomy is among the most fundamental in ethics, and it is particularly salient for those in public health, who must constantly balance the desire to improve health outcomes by changing behavior with respect for individual freedom. Although there are some areas in which there is a genuine tension between public health and autonomy-childhood vaccine mandates, for example-there are many more areas where not only is there no tension, but public health and autonomy come down to the same thing. These areas of overlap are often rendered invisible by a thin understanding of autonomy. Better integrating newer theoretical insights about autonomy into applied ethics can make discussions of public health ethics more rigorous, incisive, and effective. Even more importantly, bringing modern concepts of autonomy into public health ethics can showcase the many areas in which public health and autonomy have the same goals, face the same threats, and can be mutually advanced by the same kinds of solutions. This article provides a schema for relational autonomy in a public health context and gives concrete examples of how autonomy can be served through public-health interventions. It marshals insights from sociology, psychology, and philosophy to advance a theory of autonomy and coercion that recognizes three potential threats to autonomy: threats to choice sets, threats to knowledge, and threats to preferences. © 2017 The Hastings Center.

  10. Stakes at the edge of participation: Where words and things are the entirely serious title of a problem

    DEFF Research Database (Denmark)

    Jönsson, Li; Ulv Lenskjold, Tau

    2015-01-01

    language and discourse. Drawing on examples from the recent research project Urban Animals and Us (UA&Us), we suggest that experimental prototypes hold the promise of material enactments of relations that enable a re-articulation of what it means to have a stake in a socio-material event. In the specific...

  11. Does Structural Inequality Begin with a Bank Account? Creating a Financial Stake in College: Report II of IV

    Science.gov (United States)

    Elliott, William, III

    2012-01-01

    "Creating a Financial Stake in College" is a four-part series of reports that focuses on the relationship between children's savings and improving college success. This series examines: (1) why policymakers should care about savings, (2) the relationship between inequality and bank account ownership, (3) the connections between savings and college…

  12. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  13. Rapid Assessment of Stakeholder Concerns about Public Health. An Introduction to a Fast and Inexpensive Approach Applied on Health Concerns about Intensive Animal Production Systems.

    NARCIS (Netherlands)

    Kraaij-Dirkzwager, Marleen; van der Ree, Joost; Lebret, Erik

    2017-01-01

    To effectively manage environmental health risks, stakeholders often need to act collectively. Stakeholders vary in their desire to act due to many factors, such as knowledge, risk perception, interests, and worldviews. Understanding their perceptions of the issues at stake is crucial to support the

  14. Rapid Assessment of Stakeholder Concerns about Public Health : An Introduction to a Fast and Inexpensive Approach Applied on Health Concerns about Intensive Animal Production Systems

    NARCIS (Netherlands)

    Kraaij-Dirkzwager, Marleen; van der Ree, Joost; Lebret, Erik

    2017-01-01

    To effectively manage environmental health risks, stakeholders often need to act collectively. Stakeholders vary in their desire to act due to many factors, such as knowledge, risk perception, interests, and worldviews. Understanding their perceptions of the issues at stake is crucial to support the

  15. Perceived Threat of Malaria and the Use of Insecticide Treated Bed ...

    African Journals Online (AJOL)

    Using multiple qualitative methods, this study investigated the perceived threat and perceived susceptibility of children under five years of age to malaria, and willingness of the caregivers to use the ITNs in the prevention of malaria in selected rural and urban areas of Nigeria. The health belief model (HBM) is the theoretical ...

  16. RUSSIA'S ECONOMIC SECURITY: THREATS TO NATIONAL INTERESTS AND THEIR REFLECTION

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2014-01-01

    Full Text Available The relevance of this study due to the fact that at the present time the situation inRussiais complemented by the negative consequences of market reforms in the economy. According to statistical studies in the country with infl ation of about 10% per year among the total population of more than 20% of people with incomes below the subsistence minimum, and the income gap between the highest-income populations and low-income groups more than 12 times. The inequitable distribution of material and spiritual wealth, unemployment (over 9%, ignoring the legitimate rights and interests of a particular person and their direct violation, corruption, alcoholism, drug addiction largely led to the reproduction of aggression, violence in the country. The recession has limited the ability of the material support of the institutions of culture, education, health. The majority of the population is a feeling of uncertainty, future uncertainty, anxiety, loss of landmarks.Objectives The purpose of this work is the identifi cation and characterization of threats to economic security of theRussian Federationat the present time, and to develop recommendations for the prevention of threats to the national interests ofRussia.Method’s. The methodological basis of this article was legal, comparative and economic-statistical methods of analysis. Results. In the framework of the submitted article, the authors found that threats to the economic security ofRussiaare potential dangers that can occur when inept and ineffi cient use of economic resources ofRussiaon the domestic and foreign markets. Major threats to the economic security of theRussian Federationare: bankruptcy, weak absorption lines; corruption; threats to small business development; investment crisis, the massive outfl ow of capital; the crisis in the social sphere; food addiction; the crisis of industrial policy, as well as strengthening the role and place of TNCs.Conclusions and Relevance. The practical

  17. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  18. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  19. EVALUASI PROGRAM PEMBELAJARAN IPA SMP MENGGUNAKAN MODEL COUNTENANCE STAKE

    Directory of Open Access Journals (Sweden)

    Astin Lukum

    2015-06-01

    THE EVALUATION OF SCIENCE TEACHING ON JUNIOR HIGH SCHOOL USING STAKE’S COUNTENANCE MODEL Abstract The purpose of the study was to describe the science learning program on junior high school in Bone Bolanga district based on the Regulation of Minister of Education and Culture of the Republic of Indonesia, Number 65 of 2013 about Processing Standard of Primary and Secondary Education. This study used Stake’s Countanance evaluation model. The data were collected using observation, interview and documentation techniques. The conclusion was: (1 the planning of science learning was categorized fair (68%, it was found that lesson plan was not in accordance with the learning processing standard. (2 The implementation of science learning was categorized fair (57%, that unconformitted with learning processing implementation standard. (3 Student learning outcomes have not met the completeness of minimum criteria (KKM that categorized enough (65% and (4 There were the contingency of planing learning proces and outcome. Keywords: Program Evaluation, Stake's Countenance, Science Learning

  20. Disease-threat model explains acceptance of genetically modified products

    Directory of Open Access Journals (Sweden)

    Prokop Pavol

    2013-01-01

    Full Text Available Natural selection favoured survival of individuals who were able to avoid disease. The behavioural immune system is activated especially when our sensory system comes into contact with disease-connoting cues and/or when these cues resemble disease threat. We investigated whether or not perception of modern risky technologies, risky behaviour, expected reproductive goals and food neophobia are associated with the behavioural immune system related to specific attitudes toward genetically modified (GM products. We found that respondents who felt themselves more vulnerable to infectious diseases had significantly more negative attitudes toward GM products. Females had less positive attitudes toward GM products, but engaging in risky behaviours, the expected reproductive goals of females and food neophobia did not predict attitudes toward GM products. Our results suggest that evolved psychological mechanisms primarily designed to protect us against pathogen threat are activated by modern technologies possessing potential health risks.

  1. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  2. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  3. Sistemas de tutoramento e condução do tomateiro visando produção de frutos para consumo in natura Tomato plant staking and training systems for fresh fruit production

    Directory of Open Access Journals (Sweden)

    Bruno G. Marim

    2005-12-01

    Full Text Available Os sistemas de tutoramento e condução influem no desenvolvimento da planta do tomateiro e na qualidade do fruto produzido. Para avaliar a influência de três sistemas de tutoramento e dois de condução da planta do tomateiro na produção classificada de frutos comercializáveis, foram conduzidos dois experimentos, de agosto a dezembro/1999 (exp. 1 e de 2000 (exp. 2 em Viçosa (MG. O delineamento foi em blocos ao acaso com três repetições, no esquema fatorial 3x2, tutoramento e condução, respectivamente. Avaliaram-se os seguintes métodos de tutoramento: T1, tradicional (V invertido, T2, triangular e T3, vertical e duas formas de condução, com uma e duas hastes por planta. Independentemente do tratamento, as plantas foram podadas acima do sexto cacho. Observaram-se diferenças entre os sistemas de tutoramento, condução e entre os anos de cultivo em relação às características avaliadas, sendo que ocorreu interação entre estes efeitos apenas para as características produção de frutos comercializáveis e produção total. O tutoramento vertical proporcionou aumento na produção de frutos de tamanho grande e diminuição na produção de frutos de tamanho médio e frutos não comercializáveis, quando comparado com os outros métodos de tutoramento. Independentemente do sistema de tutoramento, o tomateiro cultivado com uma haste produziu mais frutos de tamanho grande, de maior valor comercial, enquanto as plantas conduzidas com duas hastes produziram mais frutos de tamanho médio e pequeno.The main reason for staking and training tomato plants is to keep plants and fruits off the ground to reduce losses and to improve the quality of the production. To evaluate the influence of three plant staking and two training systems of the tomato production for fresh market, two experiments were conducted during the period of August 1999 (exp.1 and 2000 (exp.2 in Viçosa, Brazil. The experimental design was a randomized complete block

  4. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  5. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  6. The Big Society in an age of austerity: threats and opportunities for Health Consumer and Patients' Organizations in England.

    Science.gov (United States)

    Baggott, Rob; Jones, Kathryn

    2015-12-01

    Health consumer and patients' organizations (HCPOs) seek to influence policy. But how are they affected by developments in the policy context and political environment? The article draws on original research into HCPOs in the UK by the authors, including a major survey undertaken in 1999 and interviews with HCPOs and policymakers between 2000 and 2003 as well as a further survey in 2010. It also draws on a review of key government policies on health and the voluntary sector since 1997. Developments in the political environment and policy context have created both opportunities and threats for HCPOs as they seek to influence policy. These include policies to promote choice and competition in public services; support for a greater role for the voluntary sector and civil society in health and welfare (including the current government's 'Big Society' idea); NHS reorganization; changes to the system of patient and public involvement; and austerity measures. Devolution of powers within the UK with regard to health policy and the rising profile of the EU in health matters have also had implications for HCPOs. This analysis raises key issues for future research in the UK and elsewhere, such as how will HCPOs be able to maintain independence in an increasingly competitive environment? And how will they fare in an era of retrenchment? There are also challenges for HCPOs in relation to maintaining relationships in a new institutional setting characterized by multilevel governance. © 2014 John Wiley & Sons Ltd.

  7. Risk of Zika virus transmission in the Euro-Mediterranean area and the added value of building preparedness to arboviral threats from a One Health perspective.

    Science.gov (United States)

    Escadafal, Camille; Gaayeb, Lobna; Riccardo, Flavia; Pérez-Ramírez, Elisa; Picard, Marie; Dente, Maria Grazia; Fernández-Pinero, Jovita; Manuguerra, Jean-Claude; Jiménez-Clavero, Miguel-Ángel; Declich, Silvia; Victoir, Kathleen; Robert, Vincent

    2016-12-03

    In the alarming context of risk of Zika virus (ZIKV) transmission in the Euro-Mediterranean area, there is a need to examine whether capacities to detect, diagnose and notify ZIKV infections in the region are in place and whether ongoing capacity-building initiatives are filling existing gaps.The MediLabSecure network, created in 2014, comprises 55 laboratories of virology and medical entomology and 19 public health institutions in 19 countries in the Balkans, North-Africa, the Middle-East and the Black Sea regions. It aims to set up awareness, risk assessment, monitoring and control of emerging and re-emerging vector-borne viruses. We here examine the actions and strategies that MediLabSecure has been implementing and how they will contribute to the prevention and control of the ZIKV threat in the Euro-Mediterranean area.Capacity-building for arbovirus diagnostics is a major objective of the project and follows a methodological rather than disease-driven approach. This enables the implementation of laboratory trainings on techniques that are common to several arboviruses, including ZIKV, and putting into action appropriate diagnostic tools in the target region.Moreover, by its One Health approach and the interaction of its four sub-networks in human virology, animal virology, medical entomology and public health, MediLabSecure is fostering intersectoral collaboration, expertise and sharing of information. The resulting exchanges (methodological, communication and operational) across disciplines and across countries, dedicated research on intersectoral collaboration and increasing diagnostic capacities are providing new paths and tools to public health professionals to face emerging viral threats such as a ZIKV epidemic in the Euro-Mediterranean region.

  8. Risk of Zika virus transmission in the Euro-Mediterranean area and the added value of building preparedness to arboviral threats from a One Health perspective

    Directory of Open Access Journals (Sweden)

    Camille Escadafal

    2016-12-01

    Full Text Available Abstract In the alarming context of risk of Zika virus (ZIKV transmission in the Euro-Mediterranean area, there is a need to examine whether capacities to detect, diagnose and notify ZIKV infections in the region are in place and whether ongoing capacity-building initiatives are filling existing gaps. The MediLabSecure network, created in 2014, comprises 55 laboratories of virology and medical entomology and 19 public health institutions in 19 countries in the Balkans, North-Africa, the Middle-East and the Black Sea regions. It aims to set up awareness, risk assessment, monitoring and control of emerging and re-emerging vector-borne viruses. We here examine the actions and strategies that MediLabSecure has been implementing and how they will contribute to the prevention and control of the ZIKV threat in the Euro-Mediterranean area. Capacity-building for arbovirus diagnostics is a major objective of the project and follows a methodological rather than disease-driven approach. This enables the implementation of laboratory trainings on techniques that are common to several arboviruses, including ZIKV, and putting into action appropriate diagnostic tools in the target region. Moreover, by its One Health approach and the interaction of its four sub-networks in human virology, animal virology, medical entomology and public health, MediLabSecure is fostering intersectoral collaboration, expertise and sharing of information. The resulting exchanges (methodological, communication and operational across disciplines and across countries, dedicated research on intersectoral collaboration and increasing diagnostic capacities are providing new paths and tools to public health professionals to face emerging viral threats such as a ZIKV epidemic in the Euro-Mediterranean region.

  9. High-­Stakes Schooling: What We Can Learn from Japan's Experiences with Testing, Accountability, and Education Reform

    Science.gov (United States)

    Bjork, Christopher

    2015-01-01

    If there is one thing that describes the trajectory of American education, it is this: more high-stakes testing. In the United States, the debates surrounding this trajectory can be so fierce that it feels like we are in uncharted waters. As Christopher Bjork reminds us in this study, however, we are not the first to make testing so central to…

  10. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  11. Agro-fuels, a cartography of stakes

    International Nuclear Information System (INIS)

    2008-09-01

    This document proposes a dashboard of the main issues regarding agro-fuels. Nine sheets propose basic information and data on these issues: 1- agro-fuel production and consumption in the world (ethanol, vegetable oils, perspective for demand in the transport sector), 2- energy efficiency and greenhouse gas emissions (energy assessments and greenhouse effect of agro-fuels, discrepancies of results between first-generation European agro-fuels, case of agro-fuels produced in Southern countries), 3- needed surfaces in Europe (land use and cultivable areas for agro-fuel production in Europe and in France, competition between food and energy crops), 4- deforestation in the South (relationship between agriculture, deforestation and agro-fuels, between deforestation and greenhouse gas emissions), 5- impacts on biodiversity (use of pesticides and fertilizers, large scale cultivations and single-crop farming, cultivation of fallow land and permanent meadows, deforestation in the South, relationship between agro-fuels and GMOs), 6- impacts on water, soil and air (water quality and availability, soil erosion, compaction and fertility loss, air quality), 7- food-related and social stakes (issue of food security, social impacts of agro-fuel production with pressure on family agriculture and issues of land property), 8- public supports and economic efficiency (public promotion of agro-fuels, agro-fuel and oil prices, assessment of the 'avoided' CO 2 ton), and 9- perspectives for second-generation agro-fuels (definitions and processes, benefits with respect to first-generation fuels, possible impacts on the environment, barriers to their development)

  12. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  13. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  14. Diving in or Guarding the Tower: Mina Shaughnessy's Resistance and Capitulation to High-Stakes Writing Tests at City College

    Science.gov (United States)

    Molloy, Sean

    2012-01-01

    Mina Shaughnessy continues to exert powerful influences over Basic Writing practices, discourses and pedagogy thirty-five years after her death: Basic Writing remains in some ways trapped by Shaughnessy's legacy in what Min-Zhan Lu labeled as essentialism, accommodationism and linguistic innocence. High-stakes writing tests, a troubling hallmark…

  15. Companies and energy transition: The stakes of mobility. A case study in the cities of Lille and Lyon

    Directory of Open Access Journals (Sweden)

    Lejoux Patricia

    2014-07-01

    Full Text Available Regarding energy transition in the area of mobility, the literature gives prominence to two types of actor which appear to play leading roles: public authorities and households. However, the role played by companies in this energy transition appears to have attracted only marginal attention. Nonetheless, companies influence mobility through the transport of goods, professional travel and commuter trips they generate. If they participate in the growth of this mobility, might they not also contribute to reducing it? What is the viewpoint held by companies regarding these questions? The aim of this article is to highlight the stakes of this energy transition in the domain of mobility in order to represent the viewpoint of companies. The results show that company managers are effectively concerned by the stakes of energy transition in the domain of mobility and that they have already taken measures in favour of more sustainable mobility. But this is more for economic (increased transport costs and social (recruitment problems, turnover linked to the increased cost of car mobility reasons than for environmental ones (reduction of greenhouse gas emissions.

  16. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  17. Climate change and ecological public health.

    Science.gov (United States)

    Goodman, Benny

    2015-02-17

    Climate change has been identified as a serious threat to human health, associated with the sustainability of current practices and lifestyles. Nurses should expand their health promotion role to address current and emerging threats to health from climate change and to address ecological public health. This article briefly outlines climate change and the concept of ecological public health, and discusses a 2012 review of the role of the nurse in health promotion.

  18. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  19. The European Union Joint Procurement Agreement for cross-border health threats: what is the potential for this new mechanism of health system collaboration?

    Science.gov (United States)

    Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut

    2017-01-01

    The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.

  20. Maladaptive social information processing in childhood predicts young men's atypical amygdala reactivity to threat.

    Science.gov (United States)

    Choe, Daniel Ewon; Shaw, Daniel S; Forbes, Erika E

    2015-05-01

    -cognitive characteristics are associated with the development of neural threat processing and adult adjustment. © 2014 Association for Child and Adolescent Mental Health.

  1. Microplastic pollution, a threat to marine ecosystem and human health: a short review.

    Science.gov (United States)

    Sharma, Shivika; Chatterjee, Subhankar

    2017-09-01

    Human populations are using oceans as their household dustbins, and microplastic is one of the components which are not only polluting shorelines but also freshwater bodies globally. Microplastics are generally referred to particles with a size lower than 5 mm. These microplastics are tiny plastic granules and used as scrubbers in cosmetics, hand cleansers, air-blasting. These contaminants are omnipresent within almost all marine environments at present. The durability of plastics makes it highly resistant to degradation and through indiscriminate disposal they enter in the aquatic environment. Today, it is an issue of increasing scientific concern because these microparticles due to their small size are easily accessible to a wide range of aquatic organisms and ultimately transferred along food web. The chronic biological effects in marine organisms results due to accumulation of microplastics in their cells and tissues. The potential hazardous effects on humans by alternate ingestion of microparticles can cause alteration in chromosomes which lead to infertility, obesity, and cancer. Because of the recent threat of microplastics to marine biota as well as on human health, it is important to control excessive use of plastic additives and to introduce certain legislations and policies to regulate the sources of plastic litter. By setup various plastic recycling process or promoting plastic awareness programmes through different social and information media, we will be able to clean our sea dustbin in future.

  2. Eliminating Adversary Weapons of Mass Destruction: What's at Stake?

    National Research Council Canada - National Science Library

    Hersman, Rebecca K

    2004-01-01

    .... Unfortunately, the current preoccupation with intelligence might mask other issues and shortcomings in the American ability to eliminate the threat posed by weapons of mass destruction in the hands of its enemies...

  3. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  4. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  5. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  6. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  7. Administrative Challenges to the Integration of Oral Health With Primary Care: A SWOT Analysis of Health Care Executives at Federally Qualified Health Centers.

    Science.gov (United States)

    Norwood, Connor W; Maxey, Hannah L; Randolph, Courtney; Gano, Laura; Kochhar, Komal

    Inadequate access to preventive oral health services contributes to oral health disparities and is a major public health concern in the United States. Federally Qualified Health Centers play a critical role in improving access to care for populations affected by oral health disparities but face a number of administrative challenges associated with implementation of oral health integration models. We conducted a SWOT (strengths, weaknesses, opportunities, and threats) analysis with health care executives to identify strengths, weaknesses, opportunities, and threats of successful oral health integration in Federally Qualified Health Centers. Four themes were identified: (1) culture of health care organizations; (2) operations and administration; (3) finance; and (4) workforce.

  8. Positive Perception of Aging and Performance in a Memory Task: Compensating for Stereotype Threat?

    Science.gov (United States)

    Fernández-Ballesteros, Rocío; Bustillos, Antonio; Huici, Carmen

    2015-01-01

    BACKGROUND/STUDY CONTEXT: The aim of this research is to explore whether segments of seniors might be immune to aging stereotypes of the older adult group. Stereotype threat research indicates that older adults show low memory recall under conditions of stereotype threat. Stereotype internalization theory (Levy, 2009) predicts that a positive perception of aging has favorable effects on the behavior and health of older people. A total of 112 older adult participants (62% women, aged 55 to 78) attending the University Programme for Older Adults were assigned to one of two conditions: stereotype threat condition and positive information condition. A control group was included from participants in the same program (n = 34; 61% women, aged 55 to 78). Individual differences in self-perception of aging were considered as continuous variable. Participants with better self-perception of aging showed better memory performance than those with poorer self-perception of aging in the stereotype threat condition and control condition. However, no differences were found in the positive information condition between participants with high and low self-perception of aging. These results indicate that positive self-perception of aging moderates the effects of stereotype threat, and that positive information promotes better memory performance for those older adults with a poorer self-perception of aging. As expected, individuals with a positive perception of their own aging were less vulnerable to the activation of a negative older adult stereotype in the stereotype threat condition.

  9. A stake in the business.

    Science.gov (United States)

    Sullivan, Chris T

    2005-09-01

    When Chris Sullivan and three friends opened the first Outback Steakhouse in March 1988, in Tampa, Florida, they were hoping it would be successful enough to spawn a few more and maybe some other kinds of restaurants as well. Since then, their chain of Australia-themed restaurants has grown to some 900 locations and counting-plus another 300 or so "concept" restaurants that operate from under Outback's corporate umbrella. Growth like that doesn't happen accidentally, Sullivan says, but it certainly wasn't part of the original plan. In this first-person account, Outback's chairman describes the organization's formula for growth and development, which is consciously rooted in the founders' belief in putting people first. They've created an organizational model in which field managers make most of the decisions, garner the rewards, and live with the consequences. Specifically, the founders believe that the most effective way to make customers happy is to first take care of the people who cook for them, serve them, and supervise operations at the restaurants. Outback servers have fewer tables to worry about than those at other restaurant chains; the cooks have bigger, cooler, better-equipped kitchens; and the supervisors work their way up the ranks toward an equity stake in the restaurant or region they run. There are no administrative layers between field managers and the executives at headquarters. Giving employees good working conditions and the chance to become owners has proved to be good business: Turnover among hourly employees is low, and Outback and its subsidiaries opened 120 restaurants last year, increasing sales by 20.1%. The company must grow in order to keep offering career opportunities to its workers; in turn, those opportunities ensure that Outbackers remain committed to making customers happy and the company successful.

  10. Sequencing the threat and recommendation components of persuasive messages differentially improves the effectiveness of high- and low-distressing imagery in an anti-alcohol message in students.

    Science.gov (United States)

    Brown, Stephen L; West, Charlotte

    2015-05-01

    Distressing imagery is often used to improve the persuasiveness of mass-reach health promotion messages, but its effectiveness may be limited because audiences avoid attending to content. Prior self-affirmation or self-efficacy inductions have been shown to reduce avoidance and improve audience responsiveness to distressing messages, but these are difficult to introduce into a mass-reach context. Reasoning that a behavioural recommendation may have a similar effect, we reversed the traditional threat-behavioural recommendation health promotion message sequence. 2 × 2 experimental design: Factor 1, high- and low-distress images; Factor 2, threat-recommendation and recommendation-threat sequences. Ninety-one students were exposed to an identical text message accompanied by high- or low-distress imagery presented in threat-recommendation and recommendation-threat sequences. For the high-distress message, greater persuasion was observed for the recommendation-threat than the threat-recommendation sequence. This was partially mediated by participants' greater self-exposure to the threat component of the message, which we attribute to the effect of sequence in reducing attentional avoidance. For the low-distress message, greater persuasion was observed for the threat-recommendation sequence, which was not mediated by reading time allocated to the threat. Tailoring message sequence to suit the degree of distress that message developers wish to induce provides a tool that could improve persuasive messages. These findings provide a first step in this process and discuss further steps needed to consolidate and expand these findings. Statement of contribution What is already known on this subject? Health promotion messages accompanied by distressing imagery might, under some circumstances, persuade individuals to engage in healthier behaviour. Audiences can respond defensively to distressing imagery, but may be less inclined to do so when an easily followed behavioural

  11. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  12. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  13. Social threat appeals in commercial advertising: the moderating impact of perceived level of self-efficacy and self-esteem on advertising effectiveness

    OpenAIRE

    Faseur, Tine; Cauberghe, Veroline; Hudders, Liselot

    2015-01-01

    This study investigates the impact of the level of fear evoked by an advertisement (for deodorant) framing a threatening social situation. Where the effectiveness of threat appeals has been investigated extensively in health communication, this study focuses on the impact of social threat appeals in a commercial setting. The study investigates the moderating impact of self-esteem on the interaction effect between the level of fear (evoked by a social threat ad) and perceived level of self-eff...

  14. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  15. Rich, poor share stake in poverty, pollution link

    International Nuclear Information System (INIS)

    DeCanio, S.J.

    1993-01-01

    A dirty environment and poverty go together, and this link between environmental protection and economic development is creating a new basis for international cooperation, says Stephen J. DeCanio of the University of California at Santa Barbara. open-quotes Both developed and developing countries have a stake in solving the development/environment impasse,close quotes DeCanio adds. open-quotes Furthermore, the link between these problems offers a fresh opportunity to make progress on both fronts.close quotes He says environmental protection expenditures by developed countries can be used to promote the sustainable economic growth of those countries struggling to escape from poverty. The money could be collected in several ways, he notes: from various types of environmental taxes, such as a carbon tax; from environmental user fees; from open-quotes debt-for natureclose quotes swaps; and from tradable emissions permits. Such mechanisms transfer resources to developing countries, where they can be applied to economic development-a desired objective, according to DeCanio. open-quotes The benefits of equitable worldwide growth and development outweigh any temporary loss of wealth developed countries may experience as a result of environmental transfers,close quotes he asserts

  16. Breast-related stereotype threat contributes to a symptom cluster in women with breast cancer.

    Science.gov (United States)

    Li, Jie; Gao, Wei; Yu, Li-Xiang; Zhu, Song-Ying; Cao, Feng-Lin

    2017-05-01

    To investigate the prevalence of breast-related stereotype threat and its effects on a symptom cluster consisting of anxiety, depression and fatigue and on each symptom. The stereotype that breasts are a sign of women's femininity results in patients with breast cancer fearing diminished femininity and rejection, which may induce psychological problems that co-occur as a symptom cluster. Cross-sectional study. A total of 131 patients with breast cancer postmastectomy completed the study. A question measuring breast-related stereotype threat, the Hospital Anxiety and Depression Scale and the Functional Assessment of Chronic Illness Therapy-Fatigue Scale were used to assess their breast-related stereotype threat and symptoms of anxiety, depression and fatigue. Of the 131 patients who answered the breast-related stereotype threat question, 86 (65·6%) reported breast-related stereotype threat. They did not differ significantly in social and clinical characteristics compared with those without the stereotype, but did report significantly higher levels of the symptom cluster and each symptom (anxiety, depression and fatigue). The odds ratios of the stereotype were significant for the symptom cluster, depression and fatigue (odds ratios = 2·52-3·98, p stereotype threat was common in patients with breast cancer. There was about a twofold increase in their risk of experiencing the symptom cluster and symptoms of depression and fatigue. In clinical practice, breast-related stereotype threat should be measured together with prevalent symptoms (e.g. anxiety, depression and fatigue) in patients with breast cancer. Our findings will aid the development of interventions for improving the mental health of women with breast cancer. © 2016 John Wiley & Sons Ltd.

  17. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  18. Biofuels: stakes, perspectives and researches; Biocarburants: enjeux, perspectives et recherches

    Energy Technology Data Exchange (ETDEWEB)

    Appert, O.; Ballerin, D.; Montagne, X.

    2004-07-01

    The French institute of petroleum (IFP) is a major intervener of the biofuels sector, from the production to the end-use in engines. In this press conference, the IFP takes stock of the technological, environmental and economical stakes of today and future biofuel production processes and of their impact on transports. This document gathers 2 presentations dealing with: IFP's research strategy on biofuels (transparencies: context; today's processes: ethanol, ETBE, bio-diesel; tomorrows processes: biomass to liquid; perspectives), bio-diesel fuel: the Axens process selected by Diester Industrie company for its Sete site project of bio-diesel production unit. The researches carried out at the IFP on biofuels and biomass are summarized in an appendix: advantage and drawbacks of biofuels, the ethanol fuel industry, the bio-diesel industry, biomass to liquid fuels, French coordinated research program, statistical data of biofuel consumption in France, Spain and Germany. (J.S.)

  19. Avian Influenza Virus (H5N1): a Threat to Human Health

    OpenAIRE

    Peiris, J. S. Malik; de Jong, Menno D.; Guan, Yi

    2007-01-01

    Pandemic influenza virus has its origins in avian influenza viruses. The highly pathogenic avian influenza virus subtype H5N1 is already panzootic in poultry, with attendant economic consequences. It continues to cross species barriers to infect humans and other mammals, often with fatal outcomes. Therefore, H5N1 virus has rightly received attention as a potential pandemic threat. However, it is noted that the pandemics of 1957 and 1968 did not arise from highly pathogenic influenza viruses, ...

  20. Emergence of visceral leishmaniasis in Sri Lanka: a newly established health threat.

    Science.gov (United States)

    Siriwardana, H V Y D; Karunanayake, P; Goonerathne, L; Karunaweera, N D

    2017-09-01

    Sri Lanka is a new focus of human cutaneous leishmaniasis caused by a genetic variant of usually visceralizing parasite Leishmania donovani. Over 3000 cases have been reported to our institution alone, during the past two decades. Recent emergence of visceral leishmaniasis is of concern. Patients suspected of having visceral leishmaniasis (n = 120) fulfilling at least two of six criteria (fever > 2 weeks, weight loss, tiredness affecting daily functions, splenomegaly, hepatomegaly and anemia) were studied using clinic-epidemiological, immunological and haematological parameters. Seven cases (four progressive, treated (group A) and 3 non- progressive, potentially asymptomatic and observed (group B) were identified. Clinical cases were treated with systemic sodium stibogluconate or amphotericin B and all were followed up at the leishmaniasis clinic of University of Colombo for 3 years with one case followed up for 9 years. All treated cases responded well to anti leishmanial treatment. Relapses were not noticed. Clinical features subsided in all non-progressive cases and did not develop suggestive clinical features or change of laboratory parameters. Visceral leishmaniasis cases have been originated from different districts within the country. Majority had a travel history to identified local foci of cutaneous leishmaniasis. Visceral leishmaniasis is recognized as an emerging health threat in Sri Lanka. At least a proportion of locally identified strains of L. donovani possess the ability to visceralize. Apparent anti leishmanial sensitivity is encouraging. Timely efforts in disease containment will be important in which accurate understanding of transmission characteristics, increased professional and community awareness, improved diagnostics and availability of appropriate treatment regimens.

  1. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  2. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  3. National Strategy for Countering Biological Threats: Diplomacy and International Programs

    Science.gov (United States)

    2010-03-18

    Regulations provide a framework for im- proving disease surveillance and reporting worldwide. In this regard, I continue to be concerned that Indonesia is not...State’s Biosecurity Engagement Program ( BEP ) is working to reduce the threat of bioterrorism through coop- erative activities to prevent terrorist...public and animal health worldwide. Since 2006, the BEP program has matured into a $37-million-a- year effort, focused on regions and countries where

  4. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  5. Astrology Pseudoscience and a Discussion About Its Threats to Society

    Directory of Open Access Journals (Sweden)

    Tevfik UYAR

    2016-05-01

    Full Text Available Astrology, a pseudoscience, is highly popular in Turkey. Astrologers, who are its practitioners, produce discourses in the scientific field at the media and at their own platforms. Furthermore, it is possible to find some instances of astrology related activities in Turkish universities. In this article, demarcation of science from pseudoscience and the pseudoscientific status of astrology were discussed in a first place. Next, threats of astrological discourse within economic, educational and medical fields and their threats to society were expressed with some examples. Instances of the astrological activities within higher education institutions, such as an astrology-based master degree thesis, the astrology certificate programs, and an astrology column in an official medical school magazine were evaluated, and it was put forward that they contributed to increase the level of threat and it was also claimed that the existence of astrological activities in the universities contradicts the main purpose and principles of the higher education. In conclusion, some regulatory actions like the implementation of the scientific literacy and demarcation problem to each level of educational curriculum, a general policy for excluding the pseudoscience from higher education institutions and a recommended health warning at the top of the astrology were suggested.

  6. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  7. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  8. The effects of stereotype threat and contextual cues on alcohol users' inhibitory control.

    Science.gov (United States)

    Pennington, Charlotte R; Qureshi, Adam; Monk, Rebecca L; Heim, Derek

    2016-03-01

    Previous research indicates that users of illicit substances exhibit diminished cognitive function under stereotype threat. Advancing this research, the current study aimed to examine the effects of stereotype threat on alcohol users' inhibitory control. It also examined whether drinkers demonstrate a greater approach bias towards alcohol-related relative to neutral stimuli. Fifty-five participants were assigned randomly to a stereotype threat condition, in which they were primed with a negative stereotype linking drinking behavior to cognitive decline, or a non-threat control condition. All participants then completed a modified version of the Cued Go/No-Go Association Test that exposed participants to alcohol-related and neutral pictorial stimuli and sound cues. Stereotype threatened participants demonstrated a speed-accuracy trade off, taking significantly longer to respond to go-trials with equivalent accuracy to the control condition. They also showed reduced response accuracy to both alcohol-related and neutral stimuli in reversed instruction trials. Participants in the control condition were both more accurate and quicker to respond to alcohol-related stimuli compared to neutral stimuli. These results suggest that awareness of negative stereotypes pertaining to alcohol-related impulsivity may have a harmful effect on inhibitive cognitive performance. This may have implications for public health campaigns and for methodological designs with high levels of procedural signaling with respect to not inadvertently inducing stereotype threat and impacting impulsivity. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. The creation of a pedagogy of promise: Examples of educational excellence in high-stakes science classrooms

    Science.gov (United States)

    McCollough, Cherie A.

    The current reform movement in education has two forces that appear contradictory in nature. The first is an emphasis on rigor and accountability that is assessed through high-stakes testing. The second is the recommendation to have student centered approaches to teaching and learning, especially those that emphasize inquiry methodology and constructivist pedagogy. Literature reports that current reform efforts involving accountability through high-stakes tests are detrimental to student learning and are contradictory to student-centered teaching approaches. However, by focusing attention on those teachers who "teach against the grain" and raise the achievement levels of students from diverse backgrounds, instructional strategies and personal characteristics of exemplary teachers can be identified. This mixed-methods research study investigated four exemplary urban high school science teachers in high-stakes (TAKS) tested science classrooms. Classroom observations, teacher and student interviews, pre-/postcontent tests and the Constructivist Learning Environment Survey (CLES) (Johnson & McClure, 2004) provided the main data sources. The How People Learn (National Research Council, 2000) theoretical framework provided evidence of elements of inquiry-based, student-centered teaching. Descriptive case analysis (Yin, 1994) and quantitative analysis of pre/post tests and the CLES revealed the following results. First, all participating teachers included elements of learner-centeredness, knowledge-centeredness, assessment-centeredness and community-centeredness in their teaching as recommended by the National Research Council, (2000), thus creating student-centered classroom environments. Second, by establishing a climate of caring where students felt supported and motivated to learn, teachers managed tensions resulting from the incorporation of student-centered elements and the accountability-based instructional mandates outlined by their school district and state

  10. Public authority responses to marine stinger public health risks: a scenario analysis of the Irukandji health threat in controlled spaces at public beaches in Australia.

    Science.gov (United States)

    Crowley-Cyr, Lynda

    2012-12-01

    This scenario analysis was undertaken to anticipate the likelihood of public authority liability for negligence arising from harm associated with the relatively new phenomenon of the Irukandji marine stinger health threat in Australia. The tort of negligence is about allocating liability for wrongs typically committed by one person or entity against another. The author questions whether a person who enters a marine stinger enclosure at one of Australia's patrolled and flagged beaches and suffers serious injury from an Irukandji sting can seek compensation or damages in negligence against government. It is argued that as the law currently stands, an injured bather without adequate warning could successfully sue a local authority for creating a false perception of safety and therefore inducing risky behaviour. Changes in ecology and climate variability are relevant considerations. This is a novel issue not previously dealt with in Australian courts.

  11. A Better Leveled Playing Field for Assessing Satisfactory Job Performance of Superintendents on the Basis of High-Stakes Testing Outcomes

    Science.gov (United States)

    Young, I. Phillip; Cox, Edward P.; Buckman, David G.

    2014-01-01

    To assess satisfactory job performance of superintendents on the basis of school districts' high-stakes testing outcomes, existing teacher models were reviewed and critiqued as potential options for retrofit. For these models, specific problems were identified relative to the choice of referent groups. An alternate referent group (statewide…

  12. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  13. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  14. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  15. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  16. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  17. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  18. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist

    Science.gov (United States)

    Perera, Frederica

    2017-01-01

    Fossil-fuel combustion by-products are the world’s most significant threat to children’s health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO2), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases—all of which may be “seeded“ in utero and affect health and functioning immediately and over the life course. By impairing children’s health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the

  19. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist.

    Science.gov (United States)

    Perera, Frederica

    2017-12-23

    Fossil-fuel combustion by-products are the world's most significant threat to children's health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO₂), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases-all of which may be "seeded" in utero and affect health and functioning immediately and over the life course. By impairing children's health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the neurodevelopmental

  20. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  1. Countries in transition and the developing countries in the negotiation on the climatic change. Stakes of the Kyoto conference

    International Nuclear Information System (INIS)

    Blanchard, O.; Cavard, D.; Faudry, D.; Girod, J.; Menanteau, P.; Viguier, L.

    1997-10-01

    This document presents the positions of the countries in transition and the developing countries in the phase of the negotiations on the climatic change between 1994 and 1997, then takes stock on the pilot phase of the actions of the associated implementation. The negotiations stakes and the frame of the discussions are also presented. (A.L.B.)

  2. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  3. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  4. Insider Threat: Preventing Direct Action Attacks Within the United States Army

    Science.gov (United States)

    2017-06-09

    Intelligence Agency, 2012. Joint Chiefs of Staff. Joint Publication (JP) 3-07.2, Antiterrorism. Washington, DC: Government Printing Office, 2010. 81...Federal Bureau of Investigation GEN General (Army rank, O-10) HIPAA Health Insurance Portability and Accountability Act of 1996 INSCOM Intelligence and...commanders, and the intelligence community to prevent insider threats from developing into direct action attacks, this study sought to answer the

  5. Men's Health: Prevent the Top Threats

    Science.gov (United States)

    ... to reduce stress — or learn to deal with stress in healthy ways. Don't wait to visit the doctor until something is seriously wrong. Your doctor can be your best ally for preventing health problems. Follow your doctor's ...

  6. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  7. Climate change threats to population health and well-being: the imperative of protective solutions that will last

    Directory of Open Access Journals (Sweden)

    Tord Kjellstrom

    2013-04-01

    Full Text Available Background: The observational evidence of the impacts of climate conditions on human health is accumulating. A variety of direct, indirect, and systemically mediated health effects have been identified. Excessive daily heat exposures create direct effects, such as heat stroke (and possibly death, reduce work productivity, and interfere with daily household activities. Extreme weather events, including storms, floods, and droughts, create direct injury risks and follow-on outbreaks of infectious diseases, lack of nutrition, and mental stress. Climate change will increase these direct health effects. Indirect effects include malnutrition and under-nutrition due to failing local agriculture, spread of vector-borne diseases and other infectious diseases, and mental health and other problems caused by forced migration from affected homes and workplaces. Examples of systemically mediated impacts on population health include famine, conflicts, and the consequences of large-scale adverse economic effects due to reduced human and environmental productivity. This article highlights links between climate change and non-communicable health problems, a major concern for global health beyond 2015. Discussion: Detailed regional analysis of climate conditions clearly shows increasing temperatures in many parts of the world. Climate modelling indicates that by the year 2100 the global average temperature may have increased by 34°C unless fundamental reductions in current global trends for greenhouse gas emissions are achieved. Given other unforeseeable environmental, social, demographic, and geopolitical changes that may occur in a plus-4-degree world, that scenario may comprise a largely uninhabitable world for millions of people and great social and military tensions. Conclusion: It is imperative that we identify actions and strategies that are effective in reducing these increasingly likely threats to health and well-being. The fundamental preventive

  8. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  9. Genomic analysis of diversity, population structure, virulence, and antimicrobial resistance in Klebsiella pneumoniae, an urgent threat to public health

    Science.gov (United States)

    Holt, Kathryn E.; Wertheim, Heiman; Zadoks, Ruth N.; Baker, Stephen; Whitehouse, Chris A.; Dance, David; Jenney, Adam; Connor, Thomas R.; Hsu, Li Yang; Severin, Juliëtte; Brisse, Sylvain; Cao, Hanwei; Wilksch, Jonathan; Gorrie, Claire; Schultz, Mark B.; Edwards, David J.; Nguyen, Kinh Van; Nguyen, Trung Vu; Dao, Trinh Tuyet; Mensink, Martijn; Minh, Vien Le; Nhu, Nguyen Thi Khanh; Schultsz, Constance; Kuntaman, Kuntaman; Newton, Paul N.; Moore, Catrin E.; Strugnell, Richard A.; Thomson, Nicholas R.

    2015-01-01

    Klebsiella pneumoniae is now recognized as an urgent threat to human health because of the emergence of multidrug-resistant strains associated with hospital outbreaks and hypervirulent strains associated with severe community-acquired infections. K. pneumoniae is ubiquitous in the environment and can colonize and infect both plants and animals. However, little is known about the population structure of K. pneumoniae, so it is difficult to recognize or understand the emergence of clinically important clones within this highly genetically diverse species. Here we present a detailed genomic framework for K. pneumoniae based on whole-genome sequencing of more than 300 human and animal isolates spanning four continents. Our data provide genome-wide support for the splitting of K. pneumoniae into three distinct species, KpI (K. pneumoniae), KpII (K. quasipneumoniae), and KpIII (K. variicola). Further, for K. pneumoniae (KpI), the entity most frequently associated with human infection, we show the existence of >150 deeply branching lineages including numerous multidrug-resistant or hypervirulent clones. We show K. pneumoniae has a large accessory genome approaching 30,000 protein-coding genes, including a number of virulence functions that are significantly associated with invasive community-acquired disease in humans. In our dataset, antimicrobial resistance genes were common among human carriage isolates and hospital-acquired infections, which generally lacked the genes associated with invasive disease. The convergence of virulence and resistance genes potentially could lead to the emergence of untreatable invasive K. pneumoniae infections; our data provide the whole-genome framework against which to track the emergence of such threats. PMID:26100894

  10. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  11. Steering committee for the management of the post-accidental phase of a nuclear accident or of a radiological situation (CODIRPA) - Work-group nr 4. Response to health challenges after a radiological accident - Final report March 2011

    International Nuclear Information System (INIS)

    2011-03-01

    The first part of this report presents the context of preparation to the response to a radiological accident in France. It proposes a synthetic presentation of scenarios, of the different accident phases, of management principles based on areas and stakes as they are presented in the emergency phase exit guide. It also indicates public health challenges related to the different studied scenarios. The second part proposes a chronological synthesis of actions to be undertaken after an accident in order to face public health stakes. The third part proposes a detailed presentation of the implementation and sequence of actions to be undertaken depending on the studied scenarios: medical and psychological care, census, health risk assessment, health information

  12. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  13. Policy Implications for Continuous Employment Decisions of High School Principals: An Alternative Methodological Approach for Using High-Stakes Testing Outcomes

    Science.gov (United States)

    Young, I. Phillip; Fawcett, Paul

    2013-01-01

    Several teacher models exist for using high-stakes testing outcomes to make continuous employment decisions for principals. These models are reviewed, and specific flaws are noted if these models are retrofitted for principals. To address these flaws, a different methodology is proposed on the basis of actual field data. Specially addressed are…

  14. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  15. THE IMPACT OF ANXIETY UPON COGNITION: PERSPECTIVES FROM HUMAN THREAT OF SHOCK STUDIES

    Directory of Open Access Journals (Sweden)

    Oliver Joe Robinson

    2013-05-01

    Full Text Available Anxiety disorders constitute a sizeable worldwide health burden with profound social and economic consequences. The symptoms are wide-ranging; from hyperarousal to difficulties with concentrating. This latter effect falls under the broad category of altered cognitive performance; in this review we examine studies quantifying such impacts of anxiety on cognition. Specifically, we focus on the translational threat of unpredictable shock paradigm, a method previously used to characterize emotional responses and defensive mechanisms that is now emerging as valuable tool for examining the interaction between anxiety and cognition. In particular, we compare the impact of threat of shock on cognition in humans to that of pathological anxiety disorders. We highlight that both threat of shock and anxiety disorders promote mechanisms associated with harm avoidance across multiple levels of cognition (from perception to attention to learning and executive function – a ‘hot’ cognitive function which can be both adaptive and maladaptive depending upon the circumstances. This mechanism comes at a cost to other functions such as working memory, but leaves some functions, such as planning, unperturbed. We also highlight a number of cognitive effects that differ across anxiety disorders and threat of shock. These discrepant effects are largely seen in ‘cold’ cognitive functions involving control mechanisms and may reveal boundaries between adaptive (e.g. response to threat and maladaptive (e.g. pathological anxiety. We conclude by raising a number of unresolved questions regarding the role of anxiety in cognition that may provide fruitful avenues for future research.

  16. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  17. Actions for prevention and control of health threats related to maritime transport in European Union.

    Science.gov (United States)

    Hadjichristodoulou, Christos; Mouchtouri, Varvara A; Guglielmetti, Paolo; Lemos, Cinthia Menel; Nichols, Gordon; Paux, Thierry; Schlaich, Clara; Cornejo, Miguel Davila; Martinez, Carmen Varela; Dionisio, Mauro; Rehmet, Sybille; Jaremin, Bogdan; Kremastinou, Jenny

    2013-01-01

    Actions at European Union level for International Health Regulations (IHR) 2005 implementation and maritime transport were focused on two European projects implemented between 2006 and 2011. Situation analysis and needs assessment were conducted, a Manual including European standards and best practice and training material was developed and training courses were delivered. Ship-to-port and port-to-port communication web-based network and database for recording IHR Ship Sanitation Certificates (SSC) were established. Fifty pilot inspections based on the Manual were conducted on passenger ships. A total of 393 corrective actions were implemented according to recommendations given to Captains during pilot inspections. The web-based communication network of competent authorities at ports in EU Member States was used to manage 13 events/outbreaks (dengue fever, Legionnaires' disease, gastroenteritis, meningitis, varicella and measles). The European information database system was used for producing and recording 1018 IHR SSC by 156 inspectors in 6 countries in accordance with the WHO Handbook for inspection of ships and issuance of SSC. Implementation of corrective actions after pilot inspections increased the level of compliance with the hygiene standards in passenger ships sailing within the EU waters and improved hygiene conditions. The communication tool contributed to improvement of outbreak identification and better management through rapid sharing of public health information, allowing a more timely and coordinated response. After the implementation of actions on passenger ships, the European Commission co-funded a Joint action that will expand the activities to all types of ships and chemical, biological and radio-nuclear threats (deliberate acts/accidental). Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  19. Mission Assurance, Threat Alert, Disaster Resiliency and Response (MATADRR) Product Reference Guide

    Science.gov (United States)

    2014-06-01

    the world. Keystone implants the Google Earth KML ( Keyhole Markup Language) publishing interface to consume the Keystone Work Product sharing. Client...multiple Cores; display, close and archive incidents and work products; and monitor the health and status of the Core. Agreement Services are...to protect forces, mitigate threats, close protection gaps, and provide increased situational awareness by linking the disparate physical

  20. High Stakes Principalship--Sleepless Nights, Heart Attacks and Sudden Death Accountabilities: Reading Media Representations of the United States Principal Shortage.

    Science.gov (United States)

    Thomson, Pat; Blackmore, Jill; Sachs, Judyth; Tregenza, Karen

    2003-01-01

    Subjects a corpus of predominantly United States news articles to deconstructive narrative analysis and finds that the dominant media representation of principals' work is one of long hours, low salary, high stress, and sudden death from high stakes accountabilities. Notes that the media picture may perpetuate the problem, and that it is at odds…

  1. Dwelling thermal renovation: which stakes, which solutions?

    International Nuclear Information System (INIS)

    Delduc, Paul; Demeulenaere, Laurence; Verdure, Mathieu; Ayong Le Kama, Alain; Fuk Chun Wing, Dimitri; Kiefer, Noemie; Mauroux, Amelie; Charlier, Dorothee; Hini, Sihame; Pinto Silva, Kleber; Giraudet, Louis Gaetan; Nauleau, Marie-Laure; Daussin-Benichou, Jeanne-Marie; Teissier, Olivier; Finidori, Esther; Grandjean, Alain; Allibe, Benoit; Gadrat, Pierre; Couriol, Aude; Menard, Francois; Rouquette, Celine; Houriez, Guillaume; Francois, Dominique; Aubert, Celine; Canardon, Daniel

    2015-01-01

    This publication proposes three sets of contributions. The first one addresses context and stakes. The contributions propose: a literature review on household behaviour and investments in energy efficiency, a focus on the key role of dwellings in energy transition through a comparative study of the four pathways of the National Debate for Energy Transition, and a discussion about consensus and uncertainties regarding the determining factors of heating temperature in dwellings. The second set addresses public policies and their assessment: improvement of the technical-economical assessment of the benefit of dwelling energetic renovations, discussion of the organisation and results of a survey on dwelling, equipment, and energy needs and uses, an analysis of several measures aimed at reaching objectives of energy efficiency of dwellings, a discussion of renovation works quality, a discussion of the impact of the sustainable development tax credit on thermal renovation, the optimisation of energy renovation in co-properties by third party financing, some foreign examples of policies in favour of dwelling thermal renovation. The third set of contributions addresses the needed technical, organisational and market evolutions: how the building sector can face the challenges of energy transition, the possibilities to propose innovative solutions adapted to existing housing buildings, and a comparative analysis of material and building equipment costs and market structures in Europe. Other texts are proposed in appendix: the origin of the Phebus survey, a description of incentive arrangements, and a map of climate zones in France

  2. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  3. StakeMeter: value-based stakeholder identification and quantification framework for value-based software systems.

    Science.gov (United States)

    Babar, Muhammad Imran; Ghazali, Masitah; Jawawi, Dayang N A; Bin Zaheer, Kashif

    2015-01-01

    Value-based requirements engineering plays a vital role in the development of value-based software (VBS). Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ) approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called 'StakeMeter'. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error.

  4. StakeMeter: value-based stakeholder identification and quantification framework for value-based software systems.

    Directory of Open Access Journals (Sweden)

    Muhammad Imran Babar

    Full Text Available Value-based requirements engineering plays a vital role in the development of value-based software (VBS. Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called 'StakeMeter'. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error.

  5. StakeMeter: Value-Based Stakeholder Identification and Quantification Framework for Value-Based Software Systems

    Science.gov (United States)

    Babar, Muhammad Imran; Ghazali, Masitah; Jawawi, Dayang N. A.; Zaheer, Kashif Bin

    2015-01-01

    Value-based requirements engineering plays a vital role in the development of value-based software (VBS). Stakeholders are the key players in the requirements engineering process, and the selection of critical stakeholders for the VBS systems is highly desirable. Based on the stakeholder requirements, the innovative or value-based idea is realized. The quality of the VBS system is associated with the concrete set of valuable requirements, and the valuable requirements can only be obtained if all the relevant valuable stakeholders participate in the requirements elicitation phase. The existing value-based approaches focus on the design of the VBS systems. However, the focus on the valuable stakeholders and requirements is inadequate. The current stakeholder identification and quantification (SIQ) approaches are neither state-of-the-art nor systematic for the VBS systems. The existing approaches are time-consuming, complex and inconsistent which makes the initiation process difficult. Moreover, the main motivation of this research is that the existing SIQ approaches do not provide the low level implementation details for SIQ initiation and stakeholder metrics for quantification. Hence, keeping in view the existing SIQ problems, this research contributes in the form of a new SIQ framework called ‘StakeMeter’. The StakeMeter framework is verified and validated through case studies. The proposed framework provides low-level implementation guidelines, attributes, metrics, quantification criteria and application procedure as compared to the other methods. The proposed framework solves the issues of stakeholder quantification or prioritization, higher time consumption, complexity, and process initiation. The framework helps in the selection of highly critical stakeholders for the VBS systems with less judgmental error. PMID:25799490

  6. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  7. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  8. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  9. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  10. PUBLIC HEALTH Health problems flow freely across borders ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    25 oct. 2010 ... For four decades, IDRC has supported research across the developing world that has saved lives and reduced illness by tackling threats to public health such as infections diseases, tobacco, dilapidated health systems, and degraded environments.

  11. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  12. Systematic Evaluation Strategies for Innovative Programs in Health Professions Education: Need, Function and Components.

    Science.gov (United States)

    Taft, Thomas B., Jr.; Logan, Nelson S.

    As change occurs in various health sciences programs, evaluational strategies should be developed so that adaptive decisions may be made. Evaluation models taking into account inputs, methodology, and outputs (Stake, 1967, and Astin and Panes, 1971) need examination. Alternative measurement instruments for formative and summative evaluations,…

  13. [Health agencies and biomedicine: a new technocratic legitimity and a strategy to share power].

    Science.gov (United States)

    Byk, Christian

    2014-06-01

    The role of health agencies in the field of biomedicine does not appear today anymore as a question of systemic approach but much more as a question of implementing the bioethical principles acknowledged in the legislation and by the different stake-holders of the biomedical techniques.

  14. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  15. What does social research say about high-stakes tests?

    Directory of Open Access Journals (Sweden)

    Rafael Feito Alonso

    2017-03-01

    Full Text Available High-stake tests, which students need to pass in order to gain a Secondary education certificate, have aroused a lot of controversy whenever they have been implemented. Especially in the USA these tests have produced a dramatic shrinking of school knowledge as they have been focused into questions posed by the very tests. At the same time, there has been a critical modification of the learning processes due to the fact that these tests encourage students to pay more attention to factual knowledge, which is far away from hands-on learning, debating in class or working in teams. In spite of certain discrepancies, by and large, research casts serious doubts about whether these tests are conductive to better academic performance. Nevertheless, the dropout rate is on the rise. More often than not, school principals have been found preventing struggling students to sit the exams. A review of the research into this matter allows us to put into context the debate surrounding external exams posed by the current education law (LOMCE: Law for the Improvement of Educational Quality passed by the parliamentary majority of the Popular Party in Spain in 2013.

  16. Zoonotic pathogens from feral swine that pose a significant threat to public health.

    Science.gov (United States)

    Brown, V R; Bowen, R A; Bosco-Lauth, A M

    2018-06-01

    The natural fecundity of suids, great ability to adapt to new habitats and desire for local hunting opportunities leading to translocation of feral pigs to regions where they are not yet established have all been instrumental in the home range expansion of feral swine. Feral swine populations in the United States continue to expand, wreaking havoc on agricultural lands, further compromising threatened and endangered species, and posing a microbiological threat to humans, domestic livestock and companion animals. This manuscript thoroughly reviews zoonotic diseases of concern including brucellosis, bovine tuberculosis, leptospirosis, enteric pathogens, both Salmonella spp. and shiga toxin-producing Escherichia coli, and hepatitis E. These pathogens are not a comprehensive list of microbes that are capable of infecting both humans and feral swine, but rather have been selected as they are known to infect US feral swine, direct transmission between wild suids and humans has previously been documented, or they have been shown to be readily transmitted during processing or consumption of feral swine pork. Humans that interact directly or indirectly with feral swine are at much higher risk for the development of a number of zoonotic pathogens. Numerous case reports document transmission events from feral swine and wild boar to humans, and the resulting diseases may be mild and self-limiting, chronic or fatal. Individuals that interact with feral swine should take preventative measures to minimize the risk of disease transmission and all meat should be thoroughly cooked. Additionally, public health campaigns to increase knowledge of the risks associated with feral swine are imperative. © 2018 Blackwell Verlag GmbH.

  17. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats.

    Science.gov (United States)

    Riccardo, Flavia; Shigematsu, Mika; Chow, Catherine; McKnight, C Jason; Linge, Jens; Doherty, Brian; Dente, Maria Grazia; Declich, Silvia; Barker, Mike; Barboza, Philippe; Vaillant, Laetitia; Donachie, Alastair; Mawudeku, Abla; Blench, Michael; Arthur, Ray

    2014-01-01

    The Early Alerting and Reporting (EAR) project, launched in 2008, is aimed at improving global early alerting and risk assessment and evaluating the feasibility and opportunity of integrating the analysis of biological, chemical, radionuclear (CBRN), and pandemic influenza threats. At a time when no international collaborations existed in the field of event-based surveillance, EAR's innovative approach involved both epidemic intelligence experts and internet-based biosurveillance system providers in the framework of an international collaboration called the Global Health Security Initiative, which involved the ministries of health of the G7 countries and Mexico, the World Health Organization, and the European Commission. The EAR project pooled data from 7 major internet-based biosurveillance systems onto a common portal that was progressively optimized for biological threat detection under the guidance of epidemic intelligence experts from public health institutions in Canada, the European Centre for Disease Prevention and Control, France, Germany, Italy, Japan, the United Kingdom, and the United States. The group became the first end users of the EAR portal, constituting a network of analysts working with a common standard operating procedure and risk assessment tools on a rotation basis to constantly screen and assess public information on the web for events that could suggest an intentional release of biological agents. Following the first 2-year pilot phase, the EAR project was tested in its capacity to monitor biological threats, proving that its working model was feasible and demonstrating the high commitment of the countries and international institutions involved. During the testing period, analysts using the EAR platform did not miss intentional events of a biological nature and did not issue false alarms. Through the findings of this initial assessment, this article provides insights into how the field of epidemic intelligence can advance through an

  18. Getting to the Heart of Masculinity Stressors: Masculinity Threats Induce Pronounced Vagal Withdrawal During a Speaking Task.

    Science.gov (United States)

    Kramer, Brandon L; Himmelstein, Mary S; Springer, Kristen W

    2017-12-01

    Previous work has found that traditional masculinity ideals and behaviors play a crucial role in higher rates of morbidity and mortality for men. Some studies also suggest that threatening men's masculinity can be stressful. Over time, this stress can weigh on men's cardiovascular and metabolic systems, which may contribute to men's higher rates of cardiometabolic health issues. The purpose of this study is to explore how masculinity threats affect men's heart rate and heart rate variability reactivity (i.e., vagal withdrawal) to masculinity feedback on a social speaking task. Two hundred and eighty-five undergraduate males were randomly assigned to one of six conditions during a laboratory-based speech task. They received one of two feedback types (masculinity or control) and one of three feedback levels (low, high, or dropping) in order to assess whether masculinity threats influence heart rate reactivity and vagal withdrawal patterns during the speech task. Men who receive low masculinity feedback during the speech task experienced more pronounced vagal withdrawal relative to those who received the control. Masculinity threats can induce vagal withdrawal that may accumulate over the life course to contribute to men's relatively worse cardiometabolic health.

  19. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  20. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  1. Trans-Saharan geopolitics. The game and the stakes; Geopolitique transsaharienne. Le jeu et l'enjeu

    Energy Technology Data Exchange (ETDEWEB)

    Chegrouche, L. [Universite Paris 1, 75 (France)

    2010-02-15

    The geopolitics of energy exports from the trans-Saharan region are similar to the Caspian great game' at the end of the last century. In North/West Africa as in West/Central Asia, the question of control over hydrocarbon reserves and lines of access to those reserves lies at the source of various conflicts. Rivalries are expressed through open and complex conflicts in which powers confront one another over oil-rich zones through proxy ethnic, religious or cultural groups, as dictated by the colossal economic interests at stake. The increasing number of conflicts - the Niger Delta, Darfur, the Azawak, etc. - is an illustration of this. The shock waves from this rivalry undermine regional peace and security, as well as the security of international energy supplies. The question here is to understand the game and the stakes of this trans-Saharan chess-board, to study its principal features and its energetic consequences. The national oil companies and states of the region can work around or through the geopolitical rifts caused by local rivalries and extra-regional appetites. There is therefore a need to understand the ways in which the players in the trans-Saharan 'great game' interact with one another, an to identifies the effects these interactions may have in the field of energy, in terms of potential reserves and transport projects. The TSGP is presented as an illustration of this geopolitical dynamics. (author)

  2. Geopolitics of petroleum; Geopolitiques du petrole

    Energy Technology Data Exchange (ETDEWEB)

    Sebille-Lopez, Ph

    2006-01-15

    The unexpected rise of oil prices since 2004 reveals some structural weaknesses of oil markets in front of the evolution of demand. It conceals considerable stakes, more political than strategic, like the securing of oil and petroleum product supplies of big consumers like the USA and China. This demand generates deep changes in the relations between the different actors, from Venezuela to Russia, from the Caspian sea to the Arab-Persian gulf, from the Mediterranean sea to the gulf of Guinea. Terrorists, who try to destabilize markets using threats on petroleum infrastructures, add-up a risk dimension to the uncertainties. The author proposes a world tour of the main production areas, along the 'oil roads' where the main strategic manoeuvres take place. He shades light on the main power stakes: pressure, tensions, threats and deals, alliances, ruptures and potential conflicts. The complex and multiple motivations are explained. (J.S.)

  3. Geopolitics of petroleum

    International Nuclear Information System (INIS)

    Sebille-Lopez, Ph.

    2006-01-01

    The unexpected rise of oil prices since 2004 reveals some structural weaknesses of oil markets in front of the evolution of demand. It conceals considerable stakes, more political than strategic, like the securing of oil and petroleum product supplies of big consumers like the USA and China. This demand generates deep changes in the relations between the different actors, from Venezuela to Russia, from the Caspian sea to the Arab-Persian gulf, from the Mediterranean sea to the gulf of Guinea. Terrorists, who try to destabilize markets using threats on petroleum infrastructures, add-up a risk dimension to the uncertainties. The author proposes a world tour of the main production areas, along the 'oil roads' where the main strategic manoeuvres take place. He shades light on the main power stakes: pressure, tensions, threats and deals, alliances, ruptures and potential conflicts. The complex and multiple motivations are explained. (J.S.)

  4. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  5. Inequalities in health--future threats to equity.

    Science.gov (United States)

    Gunning-Schepers, L J; Stronks, K

    1999-01-01

    In discussions about equity there is a tendency to focus on the inequalities in health status that appear to be the result of the material and immaterial consequences of a lower income, professional or social status in society. If we look at publications such as the Black Report in the UK or Ongelijke gezondheid in The Netherlands, we have to accept that despite our universal access to healthcare and the existence in many Western countries of social security measures that preclude 'real' poverty, considerable differences in health continue to exist between socioeconomic groups. This is corroborated for many other European countries in the research carried out by a concerted action led by Mackenbach. These inequalities in health have been referred to in many countries as inequities, meaning that society finds them unjust and expects them to be 'avoidable' or amenable to policy interventions. However, the research on the causal networks underlying the occurrence and the avoidability of inequalities in health remains sparse and intervention studies seem to focus on policy measures that can be evaluated, but which will most likely have a limited impact on the inequalities measured at the population level. Thus the research community leaves policymakers with very little evidence on which to build policy initiatives that are nevertheless requested by many governments. The third element, which needs to be addressed in this context, is the ominous inequality in access to healthcare. Since the debate on equity in health has rightly been initiated in the context of a broader, more intersectoral approach to health policy, very little attention has been paid, so far, to the issue of universal access to quality healthcare services. This is because in the second half of this century most Western (European) countries have created a healthcare system with universal access, financed either through taxation or through social insurance schemes. It is these financing systems that will

  6. One health: The interface between veterinary and human health

    Directory of Open Access Journals (Sweden)

    Kshitiz Shrestha

    2018-01-01

    Full Text Available One Health is an emerging global key concept integrating human and animal health through international research and policy. The complex relationships between the human and animal have resulted in a human-animal-environment interface since prehistorical times. The people, animals, plants, and the environment are so intrinsically linked that prevention of risks and the mitigation of effects of crises that originate at the interface between humans, animals, and their environments can only improve health and wellbeing. The “One Health” approach has been successfully implemented in numerous projects around the world. The containment of pandemic threats such as avian influenza and severe acute respiratory syndrome within months of outbreak are few examples of successful applications of the One Health paradigm. The paper begins with a brief overview of the human-animal interface and continues with the socio-economic and public health impact caused by various zoonotic diseases such as Middle East respiratory syndrome, Influenza, and Ebola virus. This is followed by the role of “One Health” to deal the global problem by the global solution. It emphasizes the interdisciplinary collaboration, training for health professionals and institutional support to minimize global health threats due to infectious diseases. The broad definition of the concept is supposed to lead multiple interpretations that impede the effective implementation of One Health approach within veterinary profession, within the medical profession, by wildlife specialists and by environmentalists, while on the other side, it gives a value of interdisciplinary collaboration for reducing threats in human-animal-environment interface.

  7. Wireless security in mobile health.

    Science.gov (United States)

    Osunmuyiwa, Olufolabi; Ulusoy, Ali Hakan

    2012-12-01

    Mobile health (m-health) is an extremely broad term that embraces mobile communication in the health sector and data packaging. The four broad categories of wireless networks are wireless personal area network, wireless metropolitan area network, wireless wide area network, and wireless local area network. Wireless local area network is the most notable of the wireless networking tools obtainable in the health sector. Transfer of delicate and critical information on radio frequencies should be secure, and the right to use must be meticulous. This article covers the business opportunities in m-health, threats faced by wireless networks in hospitals, and methods of mitigating these threats.

  8. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  9. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  10. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  11. Scenarios for transition towards a low-carbon world in 2050: What's at stake for heavy industries?

    International Nuclear Information System (INIS)

    2008-11-01

    Launched in 2004, the study Scenarios for transition towards a low-carbon world in 2050: What's at stake for heavy industries explores how major industrial sectors will be impacted by a carbon constraint stabilizing atmospheric CO 2 concentration at 450 ppm. By means of an innovative hybrid modelling platform and ongoing dialogue between researchers and industrialists, the study produces conclusions concerning both general climate policy as well as the economic response of industrial sectors - specifically of the steel, aluminium, cement, and sheet glass sectors, as well as of the energy sector. (authors)

  12. Seven thematic sheets 'solar and building' to understand the stakes of solar for the building industry

    International Nuclear Information System (INIS)

    2016-01-01

    In order to highlight the interest of solar energy for building for commissioning clients and public authorities, in terms of quality and competitiveness, this document proposes seven sheets which respectively address: the positive energy building, the development of solar energy in buildings with local authorities, photovoltaic self-consumption, the competitiveness of solar PV, an offer of quality by professionals of the solar PV, the competitiveness of solar heating. Each sheet proposes an overview of stakes, technical solutions, and local or professional commitment, and formulates some proposals for the future

  13. Energy policy: the stakes of a global overview. Synthesis of the afternoon works

    International Nuclear Information System (INIS)

    Destot, M.

    1999-10-01

    This document is a report of the debates that took place at the French national assembly in October 1999 concerning the French energy policy and more particularly the new electricity and gas directives, the energy choices, the development of renewable energies, the building of the future EPR European Pressurized water reactor, the development of more efficient transportation systems, the reduction of air pollution and the fight against the greenhouse effect, and the mastery of energy consumptions. This synthesis of the afternoon works reports on the point of views exchanged during the last round table of the day about the stakes of the opening of the European energy market (internationalization and decentralization of the electricity and natural gas markets). (J.S.)

  14. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  15. Tailoring fear appeals to lower-educated adolescents: The influence of modality and type of threat

    NARCIS (Netherlands)

    Burgers, C.F.; Veldhuis, J.

    2013-01-01

    Research on smoking behavior suggests that less well-educated adolescents are most susceptible to taking up smoking. This paper reports on an experiment that investigates the effects of adapting fear appeals to this target group. Threats were manipulated in terms of content (long-term health versus

  16. The stakes of the park management in the lasting quality

    International Nuclear Information System (INIS)

    Caseau, P.

    1996-01-01

    The goal of this paper is to surround the stakes of the management in the lasting quality and not to give a table of problems. The actual situation shows two characteristics; the profit margins in the nuclear industry are very small, the economic growth is small too. The advantage of the operating park on any other kind electric source is extremely strong. So it is important to keep the actual park even if operating and maintenance costs increase. If a forty years life time allows to go until 2020 and fifty years until 2030 it is possible to consider that the comparison 'installed park cost/any other production mean cost' leads to keep the actual park until 2015-2025. The first reason is an economic reason. The second reason is connected to what will happen after, that is to say the replacement conditions.To be able to define in the best conditions a new park, devoted to last 60 years or more, that is the second reason to manage the actual park in the lasting quality. (N.C)

  17. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  18. The impact of high-stakes, state-mandated student performance assessment on 10th grade English, mathematics, and science teachers' instructional practices

    Science.gov (United States)

    Vogler, Kenneth E.

    The purpose of this study was to determine if the public release of student results on high-stakes, state-mandated performance assessments influence instructional practices, and if so in what manner. The research focused on changes in teachers' instructional practices and factors that may have influenced such changes since the public release of high-stakes, state-mandated student performance assessment scores. The data for this study were obtained from a 54-question survey instrument given to a stratified random sample of teachers teaching at least one section of 10th grade English, mathematics, or science in an academic public high school within Massachusetts. Two hundred and fifty-seven (257) teachers, or 62% of the total sample, completed the survey instrument. An analysis of the data found that teachers are making changes in their instructional practices. The data show notable increases in the use of open-response questions, creative/critical thinking questions, problem-solving activities, use of rubrics or scoring guides, writing assignments, and inquiry/investigation. Teachers also have decreased the use of multiple-choice and true-false questions, textbook-based assignments, and lecturing. Also, the data show that teachers felt that changes made in their instructional practices were most influenced by an "interest in helping my students attain MCAS assessment scores that will allow them to graduate high school" and by an "interest in helping my school improve student (MCAS) assessment scores," Finally, mathematics teachers and teachers with 13--19 years of experience report making significantly more changes than did others. It may be interpreted from the data that the use of state-mandated student performance assessments and the high-stakes attached to this type of testing program contributed to changes in teachers' instructional practices. The changes in teachers' instructional practices have included increases in the use of instructional practices deemed

  19. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  20. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  1. The strategic industrial sectors of the green economy: stakes and perspectives

    International Nuclear Information System (INIS)

    Albertini, Jean-Paul; Larrieu, Catherine; Griot, Alain

    2013-03-01

    Proposing a transverse analysis and a synthesis, the first part of this voluminous report discusses the evolution of the context since 2009 for the green industry sector, outlines and comments the development stakes for the different sectors, analyses and comments their main evolutions for the last three years, outlines the development potential and perspectives of these activities in France, and proposes an overview of strategic policies implemented in the field of green economy in different countries (USA, Germany, United Kingdom, Japan, China, South Korea). The second part addresses the evolution and perspectives of each sector: energy production from renewable sources (biofuels, biomass, marine energies, wind energy, geothermal energy, solar energy), optimization of natural energy consumption (building with low environmental impact, green chemistry, hydrogen and fuel cells, biomaterials, optimization of industrial processes, smart grids, energy storage, low-carbon vehicles), natural resource life cycle management (CO 2 capture and storage, water, purification and ecologic engineering, metrology and instrumentation, recycling and waste valorization)

  2. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  3. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  4. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  5. Health anxiety and attentional bias: the time course of vigilance and avoidance in light of pictorial illness information.

    Science.gov (United States)

    Jasper, Fabian; Witthöft, Michael

    2011-12-01

    Cognitive-behavioral models of health anxiety stress the importance of selective attention not only towards internal but also towards external health threat related stimuli. Yet, little is known about the time course of this attentional bias. The current study investigates threat related attentional bias in participants with varying degrees of health anxiety. Attentional bias was assessed using a visual dot-probe task with health-threat and neutral pictures at two exposure durations, 175ms and 500ms. A baseline condition was added to the dot-probe task to dissociate indices of vigilance towards threat and difficulties to disengage from threat. Substantial positive correlations of health anxiety, anxiety sensitivity, and absorption with difficulties to disengage from threat were detected at 500ms exposure time. At an early stage (i.e., at 175ms exposure time), we found significant positive correlations of health anxiety and absorption with orientation towards threat. Results suggest a vigilance avoidance pattern of selective attention associated with pictorial illness related stimuli in health anxiety. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  7. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  8. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  9. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  10. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  11. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  12. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  13. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  14. The cyber security of French nuclear installations: stakes and opportunities

    International Nuclear Information System (INIS)

    Marquez, Thierry

    2016-01-01

    Notably due to the development of the number of connected objects, nuclear installations, their supply chain and all the actors of the chain value are exposed to cyber risks, even if a recent study noticed that successful cyber attacks involving nuclear plants are rare, but real. Thus, the threat is actual and growing, and the IAEA is already working with Interpol on this issue. The author then describes how French actors (EDF, Areva, CEA) have introduced cyber-resilience to better anticipate and identify actual threats and critical vulnerabilities in order to protect infrastructures. He comments some strengthened regulatory measures introduced for the French nuclear sector, and continuous improvements brought in the field of cyber security. He shows that handling these risks is also an opportunity to develop crisis management tools through the development of a specific know-how which also has an industrial value

  15. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  16. Thorny roses: The motivations and economic consequences of holding equity stakes in financial institutions for China’s listed nonfinancial firms

    Directory of Open Access Journals (Sweden)

    Liping Xu

    2017-06-01

    Full Text Available The reforms of China’s financial system have significantly changed the country’s financial sector. One noteworthy phenomenon is that many nonfinancial firms have obtained equity stakes in financial institutions. This study investigates the motivations behind and economic consequences of this recent proliferation of investments in financial institutions by nonfinancial listed firms. We find that the motivations for holding equity stakes in financial institutions include alleviating the pressure of industry competition, reducing transaction costs, and diversification to reduce risk. These investments, however, have double-edged effects on the performance of the investing firms. While their investment income increases, their operating income and overall return on assets decrease, as the investment income cannot compensate for the decrease in other operating income. The investing firms’ cost of debt also increases, their cash-holding decreases, and stock price performance does not improve after investing in financial institutions. These effects contrast with the enthusiasm nonfinancial listed firms have for investing in financial institutions. The empirical findings in this study can inform financial industry regulators and decision-makers in listed firms. We advise nonfinancial firms to be cautious when considering investing in financial institutions.

  17. [Health education at the health workshops of Cahors: challenges].

    Science.gov (United States)

    Théry, Céline

    2013-01-01

    There have been significant developments in health education over recent years. Focusing on France, the purpose of this paper is to examine the role of health education in reducing social inequalities based on the example of the Atelier santé ville de Cahors (Cahors Health Workshop). The paper addresses the following questions: What are the results and outcomes of the workshop? What kind of health education issues are at stake in the territorial approach to policy-making in an urban context? We examined the methods underlying the health education measures taken in the Cahors Health Workshop, which involve project-based approaches and the promotion of community health. Health education aimed at improving health is central to issues such as listening and speaking, the development of autonomy and the responsibilization of urban actors. Based on a rigorous methodology and the underlying values, health education in the Cahors Health Workshop places local residents, elected representatives and health professionals at the heart of the health care process (from the diagnostic process to the assessment process) and contributes to the reduction of social inequalities in health while facilitating access to information and health care. The goal of health education is to encourage individuals to be responsible for their own health in order to empower them to make informed choices adapted to the demands of their environment.

  18. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  19. Let's Poem: The Essential Guide to Teaching Poetry in a High-Stakes, Multimodal World (Middle through High School). Language & Literacy Practitioners Bookshelf

    Science.gov (United States)

    Dressman, Mark

    2010-01-01

    This cutting-edge guide presents multiple approaches to teaching poetry at the middle and high school levels. The author provides field-tested activities with detailed how-to instructions, as well as advice for how educators can "justify" their teaching within a high-stakes curriculum environment. "Let's Poem" will show pre- and inservice teachers…

  20. The Validity of Value-Added Estimates from Low-Stakes Testing Contexts: The Impact of Change in Test-Taking Motivation and Test Consequences

    Science.gov (United States)

    Finney, Sara J.; Sundre, Donna L.; Swain, Matthew S.; Williams, Laura M.

    2016-01-01

    Accountability mandates often prompt assessment of student learning gains (e.g., value-added estimates) via achievement tests. The validity of these estimates have been questioned when performance on tests is low stakes for students. To assess the effects of motivation on value-added estimates, we assigned students to one of three test consequence…

  1. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  2. 2009 public meetings: To inform and exchange ideas on the issues at stake

    CERN Multimedia

    Association du personnel

    2009-01-01

    The summer holidays are over. And like every year around this time the Staff Association comes to meet you in your Departments to inform you about the topics currently being discussed at CERN. We count very much on the exchange of views and opinions between you and us that takes place during these meetings. Once again in 2009 there are a wide range of topics to be discussed. If the stakes are generally high, this year and the next ones they are huge. This is an additional reason for the need to see a maximum number of motivated candidates stand at the forthcoming elections for the Staff Council in November 2009. For all these reasons and to help us prepare optimally for these critical deadlines, we invite all of you to attend our public meetings.

  3. The influence of socio-cultural interpretations of pregnancy threats on health-seeking behavior among pregnant women in urban Accra, Ghana.

    Science.gov (United States)

    Dako-Gyeke, Phyllis; Aikins, Moses; Aryeetey, Richmond; McCough, Laura; Adongo, Philip Baba

    2013-11-19

    Although antenatal care coverage in Ghana is high, there exist gaps in the continued use of maternity care, especially utilization of skilled assistance during delivery. Many pregnant women seek care from different sources aside the formal health sector. This is due to negative perceptions resulting from poor service quality experiences in health facilities. Moreover, the socio-cultural environment plays a major role for this care-seeking behavior. This paper seeks to examine beliefs, knowledge and perceptions about pregnancy and delivery and care-seeking behavior among pregnant women in urban Accra, Ghana. A qualitative study with 6 focus group discussions and 13 in-depth interviews were conducted at Taifa-Kwabenya and Madina sub-districts, Accra. Participants included mothers who had delivered within the past 12 months, pregnant women, community members, religious and community leaders, orthodox and non-orthodox healthcare providers. Interviews and discussions were audio-taped, transcribed and coded into larger themes and categories. Evidence showed perceived threats, which are often given socio-cultural interpretations, increased women's anxieties, driving them to seek multiple sources of care. Crucially, care-seeking behavior among pregnant women indicated sequential or concurrent use of biomedical care and other forms of care including herbalists, traditional birth attendants, and spiritual care. Use of multiple sources of care in some cases disrupted continued use of skilled provider care. Furthermore, use of multiple forms of care is encouraged by a perception that facility-based care is useful only for antenatal services and emergencies. It also highlights the belief among some participants that care from multiple sources are complementary to each other. Socio-cultural interpretations of threats to pregnancy mediate pregnant women's use of available healthcare services. Efforts to encourage continued use of maternity care, especially skilled birth

  4. What's at Stake in the Lives of People with Intellectual Disability? Part I: The Power of Naming, Defining, Diagnosing, Classifying, and Planning Supports

    Science.gov (United States)

    Schalock, Robert L.; Luckasson, Ruth

    2013-01-01

    This article focuses on the power of naming, defining, diagnosing, classifying, and planning supports for people with intellectual disability. The article summarizes current thinking regarding these five functions, states the essential question addressed by the respective function, and provides an overview of the high stakes involved for people…

  5. Driving culture change to empower the Aboriginal and Torres Strait Islander Child and Youth Health (ATSIHW) workforce

    OpenAIRE

    Atkins, Heidi

    2018-01-01

    Introduction: ATSIHW face significant unique workforce challenges which hinder efforts to improve health for their communities.Practice change: Extensive consultation led to the Qld Child and Youth Clinical Network (QCYCN) establishing a statewide governance model to drive workforce culture change.Aim: To empower ATSIHW to drive change within their workforce & lead an integrated cultural shift toward respect & equity, enabling better health outcomes for ATSI communities.Targeted stake...

  6. The Power Stakes Between those who Finance itThe New Managerial Models

    Directory of Open Access Journals (Sweden)

    Solomia Andres

    2009-10-01

    Full Text Available The paper presents the conceptual background and aspects concerning the governing that means the system by which the organizations are leaded and controlled, covering the ensemble of dispositions that allow the insurance that the objectives wanted by the managers are legitimate and the means put to work are adapted to reach these objectives. Considering that the presented models (Stareholder and Stakeholder are stakes of power between those who lead and those that finance the organization, the convergence of the European and international governing models and systems that involve the existence of some superior governing models, economically, socially and political efficient, the approach of these issues presents special interest being a challenge to Romanian economy. The globalization gives a plus to the convergence - pleading for the Stareholder model and the cultural differences plead for the resort to one of the Stakeholder model's variants.

  7. Failure to differentiate between threat-related and positive emotion cues in healthy adults with childhood interpersonal or adult trauma.

    Science.gov (United States)

    Chu, Denise A; Bryant, Richard A; Gatt, Justine M; Harris, Anthony W F

    2016-07-01

    Enhanced threat-related processing is associated with both elevated anxiety and childhood exposure to trauma. Given the paucity of evidence regarding the effects of childhood and adult trauma exposure on subsequent psychophysiological processes in the absence of psychopathology, we investigated the relative impacts of childhood interpersonal and non-interpersonal trauma, as well as adult trauma exposure on neural processing of threat in healthy adults. We measured peak amplitudes of the N170 face-sensitive visual ERP component response to non-conscious and conscious Angry (threat) versus Happy (non-threat, positive) and Neutral (non-threat baseline) faces at temporo-occipital sites (right-T6; left-T5) in 489 psychiatrically asymptomatic adults (aged 18-70 years, 54% women, 94% right-handed). N170 peak amplitude differences between Angry vs Happy or Neutral faces were calculated and subjected to hierarchical multiple regression analysis, with trauma types (childhood interpersonal, childhood non-interpersonal and adult trauma) entered as predictors of interest. After controlling for sociodemographic and health factors, N170 peak amplitudes for non-conscious Angry vs Happy faces were inversely associated with childhood interpersonal trauma at T6 and adult trauma exposure at T5. Post-hoc repeated measures ANOVA indicated that unlike adults without trauma exposure, trauma-exposed adults failed to show significantly reduced N170 responses to Happy relative to Angry faces during non-conscious processing. This suggests that childhood interpersonal and adult trauma exposure are associated with a failure to differentiate between non-threat or positive and threat-related emotion cues. This is consistent with generalised hypervigilance seen in PTSD, and suggests trauma exposure is associated with a generalized heightened responsivity to non-conscious non-threat or positive as well as threat-related emotion cues in psychiatrically healthy adults. Copyright © 2016 Elsevier Ltd

  8. Health risk perception, optimistic bias, and personal satisfaction.

    Science.gov (United States)

    Bränström, Richard; Brandberg, Yvonne

    2010-01-01

    To examine change in risk perception and optimistic bias concerning behavior-linked health threats and environmental health threats between adolescence and young adulthood and how these factors related to personal satisfaction. In 1996 and 2002, 1624 adolescents responded to a mailed questionnaire. Adolescents showed strong positive optimistic bias concerning behaviorlinked risks, and this optimistic bias increased with age. Increase in optimistic bias over time predicted increase in personal satisfaction. The capacity to process and perceive potential threats in a positive manner might be a valuable human ability positively influencing personal satisfaction and well-being.

  9. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  10. Investigating m-Health Acceptance from a Protection Motivation Theory Perspective: Gender and Age Differences.

    Science.gov (United States)

    Guo, Xitong; Han, Xiaocui; Zhang, Xiaofei; Dang, Yuanyuan; Chen, Chun

    2015-08-01

    Mobile health (m-health) services are becoming increasingly important and widely accepted. However, empirical studies on potential users' m-health acceptance behavior remain underexplored. Indeed, m-health adoption is not only a technology acceptance behavior, but also a health-related behavior. Based on the Protection Motivation Theory, this article explores users' m-health adoption behavior from the perspectives of threat appraisal and coping appraisal, and also examines the moderating role of gender and age through a survey of potential users. The survey was conducted among 500 potential m-health service participants. Our results show that threat appraisal and coping appraisal factors influence adoption intention through attitude. It is also found that gender and age play different moderating roles with threat appraisal and coping appraisal factors. Gender and age play different roles between threat appraisal and coping appraisal factors in the acceptance of m-health. Implications for research and practice are discussed.

  11. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  12. Patterns in response to chronic terrorism threats: A construct of emotional, cognitive, and behavioral responses among Israeli citizens.

    Science.gov (United States)

    Cohen-Louck, Keren; Saka, Yael

    2017-10-01

    Israeli citizens are exposed to unpredictable and chronic terrorism threats that significantly jeopardize their personal sense of safety. The purpose of the present study is to present how Israeli discourse is structured with regard to emotional, cognitive, and behavioral responses to chronic terrorism threats and to understand the range of responses as well as map the risk and protective factors of this existential threat. Semistructured in-depth interviews were conducted with 40 Israeli adults (22 women and 18 men). Qualitative analysis revealed three patterns of responses to ongoing terrorism: emotional, cognitive, and behavioral. Emotional responses include fear, worry, sense of empathy, and detachment. Cognitive responses include situational assessment and pursuit of solutions, the use of traumatic imagining, beliefs in fate and luck, and optimism. Behavioral responses include looking for information, alertness, and habituation. The findings also revealed another response, which combines cognitive and behavioral responses. Some of the responses are innovative and unique to the threat of terrorism. Mapping the responses revealed mental health risk factors, as well as protective factors that can help structure personal and national resilience. These findings have implications on the treatment and prevention of personal and social pathologies, and how to effectively cope with terrorism threats. Copyright © 2016 John Wiley & Sons, Ltd.

  13. Oceans and Human Health: Linking Ocean, Organism, and Human Health for Sustainable Management of Coastal Ecosystems

    Science.gov (United States)

    Sandifer, P. A.; Trtanj, J.; Collier, T. K.

    2012-12-01

    Scientists and policy-makers are increasingly recognizing that sustainable coastal communities depend on healthy and resilient economies, ecosystems, and people, and that the condition or "health" of the coastal ocean and humans are intimately and inextricably connected. A wealth of ecosystem services provided by ocean and coastal environments are crucial for human survival and well being. Nonetheless, the health of coastal communities, their economies, connected ecosystems and ecosystem services, and people are under increasing threats from health risks associated with environmental degradation, climate change, and unwise land use practices, all of which contribute to growing burdens of naturally-occurring and introduced pathogens, noxious algae, and chemical contaminants. The occurrence, frequency, intensity, geographic range, and number and kinds of ocean health threats are increasing, with concomitant health and economic effects and eroding public confidence in the safety and wholesomeness of coastal environments and resources. Concerns in the research and public health communities, many summarized in the seminal 1999 NRC Report, From Monsoons to Microbes and the 2004 final report of the US Commission on Ocean Policy, resulted in establishment of a new "meta-discipline" known as Oceans and Human Health (OHH). OHH brings together practitioners in oceanography, marine biology, ecology, biomedical science, medicine, economics and other social sciences, epidemiology, environmental management, and public health to focus on water- and food-borne causes of human and animal illnesses associated with ocean and coastal systems and on health benefits of seafood and other marine products. It integrates information across multiple disciplines to increase knowledge of ocean health risks and benefits and communicate such information to enhance public safety. Recognizing the need for a comprehensive approach to ocean health threats and benefits, Congress passed the Oceans and

  14. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  15. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  16. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  17. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  18. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  19. High-Stakes Systematic Reviews: A Case Study From the Field of Teen Pregnancy Prevention.

    Science.gov (United States)

    Goesling, Brian; Oberlander, Sarah; Trivits, Lisa

    2016-08-19

    Systematic reviews help policy makers and practitioners make sense of research findings in a particular program, policy, or practice area by synthesizing evidence across multiple studies. However, the link between review findings and practical decision-making is rarely one-to-one. Policy makers and practitioners may use systematic review findings to help guide their decisions, but they may also rely on other information sources or personal judgment. To describe a recent effort by the U.S. federal government to narrow the gap between review findings and practical decision-making. The Teen Pregnancy Prevention (TPP) Evidence Review was launched by the U.S. Department of Health and Human Services (HHS) in 2009 as a systematic review of the TPP literature. HHS has used the review findings to determine eligibility for federal funding for TPP programs, marking one of the first attempts to directly link systematic review findings with federal funding decisions. The high stakes attached to the review findings required special considerations in designing and conducting the review. To provide a sound basis for federal funding decisions, the review had to meet accepted methodological standards. However, the review team also had to account for practical constraints of the funding legislation and needs of the federal agencies responsible for administering the grant programs. The review team also had to develop a transparent process for both releasing the review findings and updating them over time. Prospective review authors and sponsors must recognize both the strengths and limitations of this approach before applying it in other areas. © The Author(s) 2016.

  20. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  1. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  2. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  3. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    Science.gov (United States)

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  4. What Recent History Has Taught Us About Responding to Emerging Infectious Disease Threats.

    Science.gov (United States)

    Paules, Catharine I; Eisinger, Robert W; Marston, Hilary D; Fauci, Anthony S

    2017-12-05

    Presidential administrations face any number of unexpected crises during their tenure, and global pandemics are among the most challenging. As of January 2017, one of the authors had served under 5 presidents as the director of the National Institute of Allergy and Infectious Diseases at the National Institutes of Health. During each administration, the government faced unexpected pandemics, ranging from the HIV/AIDS pandemic, which began during the Reagan administration, to the recent Zika outbreak in the Americas, which started during the Obama administration. These experiences underscored the need to optimize preparation for and response to these threats whenever and wherever they emerge. This article recounts selected outbreaks occurring during this period and highlights lessons that were learned that can be applied to the infectious disease threats that will inevitably be faced in the current presidential administration and beyond.

  5. Threats to security and ischaemic heart disease deaths: the case of homicides in Mexico.

    Science.gov (United States)

    Lee, Eileen H; Bruckner, Tim A

    2017-02-01

    Ischaemic heart disease (IHD) ranks as the leading cause of death worldwide. Whereas much attention focuses on behavioural and lifestyle factors, less research examines the role of acute, ambient stressors. An unprecedented rise in homicides in Mexico over the past decade and the attendant media coverage and publicity have raised international concern regarding its potential health sequelae. We hypothesize that the rise in homicides in Mexico acts as an ecological threat to security and elevates the risk of both transient ischaemic events and myocardial infarctions, thereby increasing IHD deaths. We applied time-series methods to monthly counts of IHD deaths and homicides in Mexico for 156 months spanning January 2000 to December 2012. Methods controlled for strong temporal patterns in IHD deaths, the unemployment rate and changes in the population size at risk. After controlling for trend and seasonality in IHD deaths, a 1-unit increase in the logged count of homicides coincides with a 7% increase in the odds of IHD death in that same month (95% confidence interval: 0.04 - 0.10). Inference remains robust to additional sensitivity checks, including a state-level fixed effects analysis. Our findings indicate that the elevated level of homicides in Mexico serves as a population-level stressor that acutely increases the risk of IHD death. This research adds to the growing literature documenting the role of ambient threats, or perceived threats, to security on cardiovascular health. © The Author 2016; all rights reserved. Published by Oxford University Press on behalf of the International Epidemiological Association

  6. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  7. Inquiry-Based Instruction and High Stakes Testing

    Science.gov (United States)

    Cothern, Rebecca L.

    Science education is a key to economic success for a country in terms of promoting advances in national industry and technology and maximizing competitive advantage in a global marketplace. The December 2010 Program for International Student Assessment (PISA) ranked the United States 23rd of 65 countries in science. That dismal standing in science proficiency impedes the ability of American school graduates to compete in the global market place. Furthermore, the implementation of high stakes testing in science mandated by the 2007 No Child Left Behind (NCLB) Act has created an additional need for educators to find effective science pedagogy. Research has shown that inquiry-based science instruction is one of the predominant science instructional methods. Inquiry-based instruction is a multifaceted teaching method with its theoretical foundation in constructivism. A correlational survey research design was used to determine the relationship between levels of inquiry-based science instruction and student performance on a standardized state science test. A self-report survey, using a Likert-type scale, was completed by 26 fifth grade teachers. Participants' responses were analyzed and grouped as high, medium, or low level inquiry instruction. The unit of analysis for the achievement variable was the student scale score average from the state science test. Spearman's Rho correlation data showed a positive relationship between the level of inquiry-based instruction and student achievement on the state assessment. The findings can assist teachers and administrators by providing additional research on the benefits of the inquiry-based instructional method. Implications for positive social change include increases in student proficiency and decision-making skills related to science policy issues which can help make them more competitive in the global marketplace.

  8. "It's Important for Them to Know Who They Are": Teachers' Efforts to Sustain Students' Cultural Competence in an Age of High-Stakes Testing

    Science.gov (United States)

    Zoch, Melody

    2017-01-01

    This article examines how four urban elementary teachers designed their literacy instruction in ways that sought to sustain students' cultural competence--maintaining their language and cultural practices while also gaining access to more dominant ones--amid expectations to prepare students for high-stakes testing. A large part of their teaching…

  9. Sophisticated Epistemologies of Physics versus High-Stakes Tests: How Do Elite High School Students Respond to Competing Influences about How to Learn Physics?

    Science.gov (United States)

    Yerdelen-Damar, Sevda; Elby, Andrew

    2016-01-01

    This study investigates how elite Turkish high school physics students claim to approach learning physics when they are simultaneously (i) engaged in a curriculum that led to significant gains in their epistemological sophistication and (ii) subject to a high-stakes college entrance exam. Students reported taking surface (rote) approaches to…

  10. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  11. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  12. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  13. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  14. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  15. Moving towards global health equity: Opportunities and threats: An ...

    African Journals Online (AJOL)

    MESKE

    time in recent history. ... Results: Equity has been a long quest in public health and global health equity could be seen as part of ... Sub-Saharan Africa will remain an enduring preoccupation ..... In recent years, “Equity as a shared vision for health and ..... skilled workers is evolving as a policy position in the US and Europe.

  16. High Stakes Trigger the Use of Multiple Memories to Enhance the Control of Attention

    Science.gov (United States)

    Reinhart, Robert M.G.; Woodman, Geoffrey F.

    2014-01-01

    We can more precisely tune attention to highly rewarding objects than other objects in our environment, but how our brains do this is unknown. After a few trials of searching for the same object, subjects' electrical brain activity indicated that they handed off the memory representations used to control attention from working memory to long-term memory. However, when a large reward was possible, the neural signature of working memory returned as subjects recruited working memory to supplement the cognitive control afforded by the representations accumulated in long-term memory. The amplitude of this neural signature of working memory predicted the magnitude of the subsequent behavioral reward-based attention effects across tasks and individuals, showing the ubiquity of this cognitive reaction to high-stakes situations. PMID:23448876

  17. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  18. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  19. Food and beverage policies and public health ethics.

    Science.gov (United States)

    Resnik, David B

    2015-06-01

    Government food and beverage policies can play an important role in promoting public health. Few people would question this assumption. Difficult questions can arise, however, when policymakers, public health officials, citizens, and businesses deliberate about food and beverage policies, because competing values may be at stake, such as public health, individual autonomy, personal responsibility, economic prosperity, and fairness. An ethically justified policy strikes a reasonable among competing values by meeting the following criteria: (1) the policy serves important social goal(s); (2) the policy is likely to be effective at achieving those goal(s); (3) less burdensome options are not likely to be effective at achieving the goals; (4) the policy is fair.

  20. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...