WorldWideScience

Sample records for superpower threat derives

  1. Superpower nuclear minimalism

    Energy Technology Data Exchange (ETDEWEB)

    Graben, E.K.

    1992-01-01

    During the Cold War, the United States and the Soviet Union competed in building weapons -- now it seems like America and Russia are competing to get rid of them the fastest. The lengthy process of formal arms control has been replaced by exchanges of unilateral force reductions and proposals for reciprocal reductions not necessarily codified by treaty. Should superpower nuclear strategies change along with force postures President Bush has yet to make a formal pronouncement on post-Cold War American nuclear strategy, and it is uncertain if the Soviet/Russian doctrine of reasonable sufficiency formulated in the Gorbachev era actually heralds a change in strategy. Some of the provisions in the most recent round of unilateral proposals put forth by Presidents Bush and Yeltsin in January 1992 are compatible with a change in strategy. Whether such a change has actually occurred remains to be seen. With the end of the Cold War and the breakup of the Soviet Union, the strategic environment has fundamentally changed, so it would seem logical to reexamine strategy as well. There are two main schools of nuclear strategic thought: a maximalist school, mutual assured destruction (MAD) which emphasizes counterforce superiority and nuclear war- fighting capability, and a MAD-plus school, which emphasizes survivability of an assured destruction capability along with the ability to deliver small, limited nuclear attacks in the event that conflict occurs. The MAD-plus strategy is based on an attempt to conventionalize nuclear weapons which is unrealistic.

  2. Competition Derived from Innovation as a Substitution Threat

    DEFF Research Database (Denmark)

    Howells, John

    2003-01-01

    This paper is a review of the role of innovation as substitution threat. The interesting strategy for those facing what in retrospect proves to be full substitution is the strategy of 'switch' to the substituting technology. the context-dependent uncedrtainty involved in the switch decision...... is examined in three detailed cases; the reluctance of the nineteenth century alkali industry in England to switch to a superior continuous production process; IBM's succesful switch to computer technology; the inability of the electronic valve manufacturers of the 1950s to switch to the semiconductor...... transistor. The case material is used to introduce the problem competition policy has when faced with competition derived from innovation....

  3. The USA: Challenges of the Superpower

    Directory of Open Access Journals (Sweden)

    Dr. Ketevan Rostiashvili

    2012-01-01

    Full Text Available Since the collapse of the Soviet Union function and mission of the United States in the contemporary world system is one of the most debatable problems of academic litera-ture. This article is an attempt to analyze most recent socioeconomic and political tendencies of the USA for better understanding the scale of ongoing transformation of the society. As the level of integration of contemporary world is very high, transfor-mation of the USA provokes tectonic changes and transformation of the world system, its structure and nature. This study argues that, although the US primacy in the world is significantly challenged and shaken by external and internal factors, the USA still preserves its traditional function of economic, financial, military and political superpow-er, but in a quite different environment. The article predominantly uses materials drawn from the Central Intelligence Agency (CIA, The World Fact book 2012; U.S. Census Bureau, Statistical Abstract of the USA - 2012, the US Federal Budgets 2010-2012, and other valuable literature and sources.

  4. In the shadow of giants: Superpower arms transfers and Third World conflict during the Cold War

    Energy Technology Data Exchange (ETDEWEB)

    Kinsella, D.T.

    1993-01-01

    This is an investigation of the impact of superpower arms transfers on interstate rivalry in the Third World during the Cold War. The study is anchored in a theoretical framework which conceives of interstate rivalry as the basis for the development of security complexes in the international system. In the case of Third World rivalries, these security complexes tend to be local in scope. The superpower security complex was global. The theoretical framework emphasizes the tendency of one security complex to encroach upon another. This study focuses on the extent to which the Cold War was externalized through the process of superpower arms transfers to local rivals. The empirical investigation consists of statistical analysis of four enduring rivalries in the Third World: those between the Arab states and Israel, Iran and Iraq, India and Pakistan, and Ethiopia and Somalia. The author employs a time-series methodology - vector autoregression - which permits a rather rigorous discrimination between cause and effect. A rigorous methodology is essential to decipher the relationship between arms transfer and interstate conflict since there is reason to suspect that causality may be mutual. Historical narratives for each of of the four rivalries facilitate an interpretation of the statistical results, but also serve to highlight anomalies. The results suggest that the impact of superpower arms transfers was most pronounced in the Middle East and the Persian Gulf. Soviet arms transfers to Egypt and Syria tended to exacerbate the Arab-Israeli rivalry. In the case of the Iran-Iraq rivalry, it was American arms transfers to Iran that were influential, but the effect appears to have been a restraining one. An action-reaction dynamic in superpower arms transfers is evident in both these cases. The statistical results are not enlightening for either the India-Pakistan or Ethiopia-Somalia rivalries. Some theoretical refinements to the security-complexes framework are suggested.

  5. Canada as an energy superpower : how clean, how powerful, how super?

    Energy Technology Data Exchange (ETDEWEB)

    Cleland, M. [Canadian Gas Association, Ottawa, ON (Canada). Policy and Economics

    2007-12-15

    In 2006, Canada's Prime Minister declared Canada to be an emerging energy superpower due to its vast reserves of oil, gas, and uranium. This article clarified the attributes of a superpower and explained how they can be used to evaluate Canada's situation. The attributes of a superpower include a capability to potentially influence the behaviour of other countries and the course of world events; the capacity to deploy that capability when it can be effective; a clear understanding of one's national interests and policies; and, a will to use the energy capacity when called upon. This framework was used to test the hypothesis of Canada as a power in energy. It was agreed that in terms of reserves, production and exports, Canada is a significant player by world standards. Canada has technological leadership in some parts of the fuel cell industry, possibly nuclear energy and the deployment of advanced technology in resource extraction. However, it was argued that deployment capacity must be maintained and enhanced. The author claimed that Canada's ability to exercise power through unilateral deployment of energy resources is modest, although Canada does have an implicit policy expressed through international treaties such as its membership in the World Trade Organization (WTO), International Energy Agency (IEA), and the North American Free Trade Agreement (NAFTA). Canada also benefits from pipeline and powerline regulations for shared regulation of electricity reliability. It was suggested that Canada has the capability to be a voice in support of market-based approaches to energy and an open international trade and investment regime. It was determined that Canada is committed to market-based energy policies and to North American partnership in a broader international context. The author suggested that although Canada has many capabilities regarding energy resources and the capacity to deliver them to markets, it lacks energy policy at the national

  6. DE PODER NULO A SUPERPODER: O JUDICIÁRIO DE MONTESQUIEU, REVISITADO | FROM NULL TO SUPER-POWER: MONTESQUIEU’S JUDICIARY REVIEWED

    Directory of Open Access Journals (Sweden)

    Sandro Luís Tomás Ballande Romanelli

    2016-08-01

    Full Text Available This article discusses the Judiciary within the doctrine of separation of powers, aiming to provide historical and political data that could explain judicial protagonism. This is achieved through book reviews of contemporary political science literature and classic authors from the 18 th century. Therefore, it aims to examine in depth some chapters of Montesquieu’s “Spirit of laws” classic book, expressing how its theory of judicial power was deeply linked with ancient régime’s judicial system, in a context where 18 th century French Judiciary Power was a great source of threat to both political and legislative powers. The paper addresses how the American Constitution bended the original theory, moving from an absolute separation of powers towards a super-powered Judiciary in defence of individual liberties, acting as counterbalance to state assemblies and local political powers. In conclusion, it stands that Judicial Power protagonism doesn’t violate the classic theory of separation of powers.

  7. Virtual superheroes: using superpowers in virtual reality to encourage prosocial behavior.

    Science.gov (United States)

    Rosenberg, Robin S; Baughman, Shawnee L; Bailenson, Jeremy N

    2013-01-01

    Recent studies have shown that playing prosocial video games leads to greater subsequent prosocial behavior in the real world. However, immersive virtual reality allows people to occupy avatars that are different from them in a perceptually realistic manner. We examine how occupying an avatar with the superhero ability to fly increases helping behavior. Using a two-by-two design, participants were either given the power of flight (their arm movements were tracked to control their flight akin to Superman's flying ability) or rode as a passenger in a helicopter, and were assigned one of two tasks, either to help find a missing diabetic child in need of insulin or to tour a virtual city. Participants in the "super-flight" conditions helped the experimenter pick up spilled pens after their virtual experience significantly more than those who were virtual passengers in a helicopter. The results indicate that having the "superpower" of flight leads to greater helping behavior in the real world, regardless of how participants used that power. A possible mechanism for this result is that having the power of flight primed concepts and prototypes associated with superheroes (e.g., Superman). This research illustrates the potential of using experiences in virtual reality technology to increase prosocial behavior in the physical world.

  8. Virtual superheroes: using superpowers in virtual reality to encourage prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Robin S Rosenberg

    Full Text Available BACKGROUND: Recent studies have shown that playing prosocial video games leads to greater subsequent prosocial behavior in the real world. However, immersive virtual reality allows people to occupy avatars that are different from them in a perceptually realistic manner. We examine how occupying an avatar with the superhero ability to fly increases helping behavior. PRINCIPAL FINDINGS: Using a two-by-two design, participants were either given the power of flight (their arm movements were tracked to control their flight akin to Superman's flying ability or rode as a passenger in a helicopter, and were assigned one of two tasks, either to help find a missing diabetic child in need of insulin or to tour a virtual city. Participants in the "super-flight" conditions helped the experimenter pick up spilled pens after their virtual experience significantly more than those who were virtual passengers in a helicopter. CONCLUSION: The results indicate that having the "superpower" of flight leads to greater helping behavior in the real world, regardless of how participants used that power. A possible mechanism for this result is that having the power of flight primed concepts and prototypes associated with superheroes (e.g., Superman. This research illustrates the potential of using experiences in virtual reality technology to increase prosocial behavior in the physical world.

  9. Accidental nuclear war: Modifications to superpower arsenals and to procedures for handling them could substantially reduce the risk of unintended Armageddon

    Energy Technology Data Exchange (ETDEWEB)

    Blair, B.G.; Kendall, H.W.

    1990-12-01

    If nuclear war breaks out in the coming decade or two, it will probably be by accident. The threat of a cold-blooded, calculated first strike is vanishing, but beneath the calm surface of constructive diplomacy among the traditional nuclear rivals lurks the danger of unpremeditated use of nuclear weapons. The accidental, unauthorized or inadvertent use of these weapons has become the most plausible path to nuclear war. Both superpowers, as well as France, Great Britain and China - long-standing members of the nuclear club - are potential sources of accidental missile launch. The emergence of fledgling nuclear powers such as India, Pakistan and Israel - some armed with ballistic missiles - pushes nuclear safeguards even closer to the top of the international security agenda. The chances of unwanted nuclear war would be reduced significantly if tamper proof, coded locks were installed on all nuclear weapons and if methods were put in place to disarm nuclear forces even after launch. In addition, the US and the Soviet Union should reduce their reliance on the dangerous policy of launch on warning and reduce the launch readiness of their nuclear forces. The social and political upheavals in the Soviet Union underscore fears of unintended nuclear war. Civil turmoil raises the possibility that rebellious ethnic groups or splinter organizations could capture nuclear weapons. Other, deeper fault lines run through the whole of Soviet society and may be capable of cracking the foundations of its nuclear command system. Although the US faces no such civil unrest, the country's system of nuclear command carries some risk that nuclear weapons might be used contrary to the intentions of legitimate authorities.

  10. Formation of superpower volume discharges and their application for modification of surface of metals

    Science.gov (United States)

    Tarasenko, Victor F.; Shulepov, M. A.

    2008-05-01

    The results of experimental investigations of a volume avalanche discharge initiated by an e-beam (VADIEB) and surface layer of Cu and AlBe foils modifications at the plasma action of VADIEB are given. The volume discharge in the air of atmosphere pressure formed in the gap with the cathode having small curvature radius and with high voltage pulses of nanosecond duration and positive and negative polarity. A supershort avalanche electron beam (SAEB) with formation conditions in gases under atmospheric pressure have been investigated. It is proved that the surface layer is cleared of carbon at foil treatment, and atoms of oxygen penetrate into a foil. It is show that the cleaning depth depends on polarity of voltage pulses. At positive polarity of a copper foil electrode the cleaning is observed at the depth over 50 nm, and atoms of oxygen penetrate at the depth up to 25 nm. Plasma of the superpower volume discharge of nanosecond duration with a specific excitation power of hundreds of MW/cm3, and SAEB, and the discharge plasma radiation of various spectral ranges (including UV, VUV and X-ray) has the influence on the anode. The supershort avalanche electronic beam is generated only at negative polarity of a voltage pulse on an electrode with a small radius of curvature. SAEB influence on modifications of the copper foil surface is registered. VADIEB is easily realized in various gases and at various pressures, and, at gas pressure decrease the density of the beam current in helium can achieve 2 kA/cm2. It allows predicting an opportunity of VADIEB application for metal surface modifications in various technological processes, and for surface dielectric modifications at the certain design of the anode.

  11. Beyond the Cold-War Reprise of the Arctic Super-Powers. Decoding the Structural Meaning of the Ukrainian Crisis

    Directory of Open Access Journals (Sweden)

    John McMurtry

    2015-03-01

    Full Text Available The “Ukraine crisis” repeats a script as old as the Cold War, of which the Arctic was one of its main theatres and that, as suggested by Irina Zhilina in her 2013 study about NATO in the far north for issue 8(1 of Nordicum-Mediterraneum, could regain such a role, were frictions between East and West to resurface. And they have resurfaced. The ongoing Cold-War-like narrative vis-à-vis Ukraine features rising attacks by corporate states and media on the traditional whipping boy of Russia. As usual, “escalating the crisis” is the other Arctic super-power: the US. As usual, alarm about “increasing lawless aggression” is projection of US policy itself.

  12. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  14. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc...... of threats, and their mitigation. Another important observation is that the distinction between insiders and outsiders seems to loose significance as IT infrastructure is used in performing insider attacks....

  15. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  16. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  17. Combatting Insider Threats

    Science.gov (United States)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  18. Aspects of Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter;

    2010-01-01

    The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the ins...

  19. Cyber Intelligence Threat Prioritization

    Science.gov (United States)

    2014-10-01

    possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding ) Extrinsic (receive...external reward or avoid punishment) Software Engineering Institute I Cm·nt·git• .\\lellon Lnin·r·sity Targeted Data Understanding what a threat

  20. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    on to discuss a number of approaches from the technological, the sociological, and the socio-technical domain. We draw two main conclusions. Tackling insider threats requires a combination of techniques from the technical, the sociological, and the socio-technical domain, to enable qualified detection...

  1. Puerto Rico Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  2. Puerto Rico Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  3. USVI Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  4. USVI Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's...

  5. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  6. Threat in dreams: an adaptation?

    Science.gov (United States)

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, pdreams (chi([1,N=287])(2)=6.11, pdream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  7. Nuclear Threats and Security

    OpenAIRE

    Garry Jacobs; Winston P. Nagan

    2012-01-01

    This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legalit...

  8. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  9. Bluetooth Threat Taxonomy

    OpenAIRE

    Dunning, John Paul

    2010-01-01

    Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides ...

  10. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  11. Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies

    NARCIS (Netherlands)

    Vasenev, Alexandr; Montoya, L.

    2016-01-01

    A comprehensive study of the smart grid threat landscape is important for designing resilient urban grids of the future. To this end, an analysis could first cross reference threat categorizations and interrelate treat events on the basis of threat lists that complement each other. This paper show

  12. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  13. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  14. Otters Increasing - Threats Increasing

    Directory of Open Access Journals (Sweden)

    Andreas Kranz

    1994-10-01

    Full Text Available In some parts of Central Europe populations of otters are apparently increasing. Until recently, no research was being conducted on the ecology of otters in mainly artificial habitats like fish farms. Otters are not only a new source of conflict requiring species management, but appear once again threatened by illegal hunting. Austria is dealing with this problem using compensation for otter damage, electric fencing and translocation of problem otters. Despite a rise in illegal killing, Austria does not formally recognise this as a threat.

  15. New Superpower, The European Union

    Science.gov (United States)

    1994-05-01

    196 from Japan and 210 from the EC; in the Super Fifty non-American 27 are from the common market. It is clear that the European Union will be one of...C687e). (page 31, bottom)4 Mastrivh treaty, articulo 6Mastrich treaty, articulo 6Janes 1994, pag 31. 8ii JRATOM and Nuclear Safeguards. Darryl A

  16. Brazil: a world energy superpower?

    Directory of Open Access Journals (Sweden)

    Andréa Freire Lucena

    2015-12-01

    O artigo discute algumas medidas tomadas pelo estado brasileiro para alcançar seu objetivo, que é tornar-se um ator protagonista na nova política energética mundial. Ao longo do artigo discutimos se o país tem perdido a oportunidade de se tornar uma potência energética mundial.

  17. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  18. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  19. Behavioral Compliance and Devaluation of the Forbidden Object as a Function of Probability of Detection and Severity of Threat

    Science.gov (United States)

    Biaggio, Angela; Rodrigues, Aroldo

    1971-01-01

    Thirty-nine second grade children were subjects of an experiment devised to test the prediction derived from cognitive dissonance theory that mild threats are more effective than severe threats in obtaining internalization of prohibitions. (Author/NH)

  20. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  1. Moving threat : Attention and distance change interact in threat responding

    NARCIS (Netherlands)

    Arnaudova, I.; Krypotos, A.-M.; Effting, M.; Kindt, M.; Beckers, T.

    2017-01-01

    Defensive reactions need to be quick and appropriate to ensure survival. Thus, it is crucial that threats trigger immediate action upon detection, even in the absence of awareness. In addition, the form of such action should be appropriate to the imminence of the threat. Thus, attention should be

  2. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  3. Communication issues during bomb threats.

    Science.gov (United States)

    Kuebler, S A

    How should healthcare security professionals handle a bomb threat? How can a large complex best be searched? The author discusses why he believes the judicial use of radios and cellular phones during emergencies can enhance security's ability to handle bomb threat situations, and offers guidelines to follow.

  4. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  5. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  6. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    Science.gov (United States)

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  7. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  8. Modelling ultraviolet threats

    Science.gov (United States)

    James, I.

    2016-10-01

    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  9. Global Threats to Child Safety.

    Science.gov (United States)

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children.

  10. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  11. Threat image projection in CCTV

    Science.gov (United States)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  12. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  13. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, J. W.; Jobstvogt, N.; Böhnke-Henrichs, A.;

    2016-01-01

    environmental awareness. Threats include resistance to change, and difficulty with interdisciplinary collaboration. Consideration of SWOT themes suggested five strategic areas for developing and implementing ES.The ES concept could improve decision-making related to natural resource use, and interpretation...... facilitate interdisciplinary research, ensuring decision-making that supports sustainable development........ Such an assessment could form the basis for improving ES thinking, further embedding it into environmental decisions and management.The Young Ecosystem Services Specialists (YESS) completed a Strengths-Weaknesses-Opportunities-Threats (SWOT) analysis of ES through YESS member surveys. Strengths include the approach...

  14. The future of Jungian analysis: strengths, weaknesses, opportunities, threats ('SWOT').

    Science.gov (United States)

    Samuels, Andrew

    2017-11-01

    Using a methodology derived from management and organizational studies, the author reviews the future of Jungian analysis. The methodology is termed SWOT - strengths, weaknesses, opportunities, threats. A selected list in each of these categories is presented. The author is transparent in allowing for the fact that the paper not only derives from a public lecture on the topic, but also retains the immediacy and the contrarian and opinionated style of such a lecture. © 2017, The Society of Analytical Psychology.

  15. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  16. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the relevanc

  17. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and th

  18. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  19. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  20. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  1. Zika Still a Threat During Winter Months

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_162518.html Zika Still a Threat During Winter Months Public health ... doesn't necessarily mean the end of the Zika threat in the United States, a public health ...

  2. Cyber Terrorism– Global Security Threat

    OpenAIRE

    Bogdanoski, Mitko; Petreski, Drage

    2013-01-01

    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  3. Subordinates as Threats to Leaders

    OpenAIRE

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  4. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  5. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  6. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  7. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  8. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  9. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  10. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  11. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  12. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  13. Countering the Nuclear Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things

  14. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  15. World's soils are under threat

    Science.gov (United States)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  16. Dissolution Threats and Legislative Bargaining

    DEFF Research Database (Denmark)

    Becher, Michael; Christiansen, Flemming Juul

    2015-01-01

    Chief executives in many parliamentary democracies have the power to dissolve the legislature. Despite a well-developed literature on the endogenous timing of parliamentary elections, political scientists know remarkably little about the strategic use of dissolution power to influence policymaking....... To address this gap, we propose and empirically evaluate a theoretical model of legislative bargaining in the shadow of executive dissolution power. The model implies that the chief executive's public support and legislative strength, as well as the time until the next constitutionally mandated election......, are important determinants of the use and effectiveness of dissolution threats in policymaking. Analyzing an original time-series data set from a multiparty parliamentary democracy, we find evidence in line with key empirical implications of the model....

  17. Bias Adjusted Precipitation Threat Scores

    Directory of Open Access Journals (Sweden)

    F. Mesinger

    2008-04-01

    Full Text Available Among the wide variety of performance measures available for the assessment of skill of deterministic precipitation forecasts, the equitable threat score (ETS might well be the one used most frequently. It is typically used in conjunction with the bias score. However, apart from its mathematical definition the meaning of the ETS is not clear. It has been pointed out (Mason, 1989; Hamill, 1999 that forecasts with a larger bias tend to have a higher ETS. Even so, the present author has not seen this having been accounted for in any of numerous papers that in recent years have used the ETS along with bias "as a measure of forecast accuracy".

    A method to adjust the threat score (TS or the ETS so as to arrive at their values that correspond to unit bias in order to show the model's or forecaster's accuracy in extit{placing} precipitation has been proposed earlier by the present author (Mesinger and Brill, the so-called dH/dF method. A serious deficiency however has since been noted with the dH/dF method in that the hypothetical function that it arrives at to interpolate or extrapolate the observed value of hits to unit bias can have values of hits greater than forecast when the forecast area tends to zero. Another method is proposed here based on the assumption that the increase in hits per unit increase in false alarms is proportional to the yet unhit area. This new method removes the deficiency of the dH/dF method. Examples of its performance for 12 months of forecasts by three NCEP operational models are given.

  18. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  19. Threat by association: do distant intergroup threats carry-over into local intolerance?

    Science.gov (United States)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-09-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups.

  20. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology.

  1. Fructose; a Hidden Threat for Chronic Diseases

    Directory of Open Access Journals (Sweden)

    Ahmet Korkmaz

    2008-08-01

    Full Text Available Incremental usage of the fructose derived from corn by processed-food manufacturers has become a crucial threat in terms of human health. Although it is known as fruit sugar, the most important source of dietary fructose is now, processed-food prepared by using high-fructose corn syrup. Basically, fructose is metabolized within liver and its energy load is equal to glucose. Nevertheless, it does not make up satiety and fullness. Therefore, fructose-rich foods and beverages can be consumed in large amount because the absence of satiety. Studies performed recently unveil a connection between amount of fructose consumed and metabolic disorders such as cardiovascular diseases, type 2 diabetes, hypertension and obesity. The incidence of metabolic diseases which are already affecting more than half of the adults has been increasing among children. Moreover, these types of foods are generally consumed by children. Therefore, in order to reduce the frequency of metabolic disorders in all ages, the amount of fructose in processed-foods and beverages should also be taken into consideration. [TAF Prev Med Bull 2008; 7(4.000: 343-346

  2. Vibrotactile and visual threat cueing with high g threat intercept in dynamic flight simulation

    NARCIS (Netherlands)

    Eriksson, L.; Erp, J.B.F. van; Carlander, O.; Levin, B.; Veen, H.A.H.C. van; Veltman, J.E.

    2006-01-01

    In a TNO and FOI joint study, nine fighter pilots participated in a threat detection and intercept experiment in the Swedish Dynamic Flight Simulator. Visual threat cueing with a simulated Gripen aircraft head-up display (HUD) symbology was compared with combined visual and vibrotactile threat

  3. Vibrotactile and visual threat cueing with high g threat intercept in dynamic flight simulation

    NARCIS (Netherlands)

    Eriksson, L.; Erp, J.B.F. van; Carlander, O.; Levin, B.; Veen, H.A.H.C. van; Veltman, J.E.

    2006-01-01

    In a TNO and FOI joint study, nine fighter pilots participated in a threat detection and intercept experiment in the Swedish Dynamic Flight Simulator. Visual threat cueing with a simulated Gripen aircraft head-up display (HUD) symbology was compared with combined visual and vibrotactile threat cuein

  4. Threat by association : Do distant intergroup threats carry-over into local intolerance?

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-01-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the thre

  5. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  6. Perception of the Threat of Terrorism.

    Science.gov (United States)

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat. © The Author(s) 2016.

  7. Sociocultural perspectives on threats, risks, and health

    Science.gov (United States)

    Patricia L. Winter; Jonathan W. Long; Frank K. Lake

    2014-01-01

    Sociocultural perspectives on threats, risks, and health are explored in this chapter. The authors begin with a discussion of the linkages between well-being in the Sierra Nevada ecosystem and public health and well-being to set the context of socioecological resilience. This is followed by a summary of how trust and confidence influence the management of threats and...

  8. Target threat assessment using fuzzy sets theory

    Directory of Open Access Journals (Sweden)

    Ehsan Azimirad

    2015-08-01

    Full Text Available The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can result in huge damage of life and property. Threat evaluation helps in case of weapon assignment, and intelligence sensor support system. It is very important factor to analyze the behavior of enemy tactics as well as our surveillance. This paper represented a precise description of the threat evaluation process using fuzzy sets theory. A review has been carried out regarding which parameters that have been suggested for threat value calculation. For the first time in this paper, eleven parameters are introduced for threat evaluation so that this parameters increase the accuracy in designed system. The implemented threat evaluation system has been applied to a synthetic air defense scenario and four real time dynamic air defense scenarios. The simulation results show the correctness, accuracy, reliability and minimum errors in designing of threat evaluation system

  9. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  10. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  11. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  12. Cosmic Impacts: The DoomsDay Threat

    Science.gov (United States)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  13. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  14. Security threats categories in healthcare information systems.

    Science.gov (United States)

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  15. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  16. Stereotype threat prevents perceptual learning.

    Science.gov (United States)

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T

    2010-08-10

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  17. [Counterfeit medicines: a growing threat].

    Science.gov (United States)

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world.

  18. Large Bilateral Reductions in Superpower Nuclear Weapons.

    Science.gov (United States)

    1985-07-01

    different approaches. An example from the West European peace studies perspective is Galtung (1984). A more wide- 40 -’. o °. " .’....’,’. . "o...Freedman, and Baylis, MacMillan Press, LTD, 1983, pp.7 8 -1 1 5 . 218 fa. 6 Galtung , Johan, There are Alternatives: Four Roads to Peace and Security

  19. Superpower Naval Crisis Management in the Mediterranean.

    Science.gov (United States)

    1981-08-01

    Utility nd Military Cionstraints, The Washington Papera No. 61, Beverly PP 232 HilIla nd London: Sep Publications, 1979) AD A055 564 Jacobson, Louis...22311. An Index of Selected Publications Is also available on reqacat. The Index Includes a Listing of Professional Papera ; with abstracts; Issued from

  20. Towards securing SCADA systems against process-related threats

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Bolzoni, Damiano; Hartel, Pieter

    2010-01-01

    We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PH

  1. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  2. External threat and the definition of deviance.

    Science.gov (United States)

    Laudedale, P; Smith-Cunnien, P; Parker, J; Inverarity, J

    1984-05-01

    Research ( Lauderdale , 1976; Schachter , 1951) suggests that an external threat to a group can lead to the rejection of deviant members of the group and alteration of group communication patterns and solidarity. This study sought to extend those findings, integrate them with concepts from Simmel 's (1917/1955) work on group conflict, and link them to key issues in the societal reaction approach to deviant behavior. We examined the effect of variation in level of threat, the relationship between deviant status and nonconformity to the central task norm, the role of high-status actors in deviance designation, the relationship between rejection and negative definition of the deviant, and the effects of rejection and negative definition on group solidarity. Hypotheses were tested in an experimental design involving three conditions (strong threat, weak threat, and no threat). The results suggest that (a) the level of threat is directly related to the extent of rejection and negative definition, (b) nonconformity to the central task norm is not systematically related to deviant status, (c) high-status actors are more involved in the rejection of the deviant, (d) sociometric rejection of the deviant is accompanied by negative definition in the strong-threat condition, and (e) the level of group solidarity is related to the extent of rejection and negative definition. Implications of these findings are discussed relative to the societal reaction approach to deviant behavior and analogous processes in other social groups.

  3. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  4. Identity threat and stigma in cancer patients

    Directory of Open Access Journals (Sweden)

    Sarah Knapp

    2014-09-01

    Full Text Available Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed.

  5. Emerging oomycete threats to plants and animals.

    Science.gov (United States)

    Derevnina, Lida; Petre, Benjamin; Kellner, Ronny; Dagdas, Yasin F; Sarowar, Mohammad Nasif; Giannakopoulou, Artemis; De la Concepcion, Juan Carlos; Chaparro-Garcia, Angela; Pennington, Helen G; van West, Pieter; Kamoun, Sophien

    2016-12-05

    Oomycetes, or water moulds, are fungal-like organisms phylogenetically related to algae. They cause devastating diseases in both plants and animals. Here, we describe seven oomycete species that are emerging or re-emerging threats to agriculture, horticulture, aquaculture and natural ecosystems. They include the plant pathogens Phytophthora infestans, Phytophthora palmivora, Phytophthora ramorum, Plasmopara obducens, and the animal pathogens Aphanomyces invadans, Saprolegnia parasitica and Halioticida noduliformans For each species, we describe its pathology, importance and impact, discuss why it is an emerging threat and briefly review current research activities.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'.

  6. Connections from Kafka: exposure to meaning threats improves implicit learning of an artificial grammar.

    Science.gov (United States)

    Proulx, Travis; Heine, Steven J

    2009-09-01

    In the current studies, we tested the prediction that learning of novel patterns of association would be enhanced in response to unrelated meaning threats. This prediction derives from the meaning-maintenance model, which hypothesizes that meaning-maintenance efforts may recruit patterns of association unrelated to the original meaning threat. Compared with participants in control conditions, participants exposed to either of two unrelated meaning threats (i.e., reading an absurd short story by Franz Kafka or arguing against one's own self-unity) demonstrated both a heightened motivation to perceive the presence of patterns within letter strings and enhanced learning of a novel pattern actually embedded within letter strings (artificial-grammar learning task). These results suggest that the cognitive mechanisms responsible for implicitly learning patterns are enhanced by the presence of a meaning threat.

  7. Garlic: nature's protection against physiological threats.

    Science.gov (United States)

    Butt, Masood Sadiq; Sultan, Muhammad Tauseef; Butt, Mehmood S; Iqbal, Javaid

    2009-06-01

    Currently reliance on natural products is gaining popularity to combat various physiological threats including oxidative stress, cardiovascular complexities, cancer insurgence, and immune dysfunction. The use of traditional remedies may encounter more frequently due to an array of scientific evidence in their favor. Garlic (Allium sativum) holds a unique position in history and was recognized for its therapeutic potential. Recent advancements in the field of immunonutrition, physiology, and pharmacology further explored its importance as a functional food against various pathologies. Extensive research work has been carried out on the health promoting properties of garlic, often referred to its sulfur containing metabolites i.e. allicin and its derivatives. Garlic in its preparations are effective against health risks and even used as dietary supplements such as age garlic extract (AGE) and garlic oil etc. Its components/formulations can scavenge free radicals and protect membranes from damage and maintains cell integrity. It also provides cardiovascular protection mediated by lowering of cholesterol, blood pressure, anti-platelet activities, and thromboxane formation thus providing protection against atherosclerosis and associated disorders. Besides this, it possesses antimutagenic and antiproliferative properties that are interesting in chemopreventive interventions. Several mechanisms have been reviewed in this context like activation of detoxification phase-I and II enzymes, reactive oxygen species (ROS) generation, and reducing DNA damage etc. Garlic could be useful in preventing the suppression of immune response associated with increased risk of malignancy as it stimulates the proliferation of lymphocytes, macrophage phagocytosis, stimulates the release of interleukin-2, tumor necrosis factor-alpha and interferon-gamma, and enhances natural killer cells. In this paper much emphasis has been placed on garlic's ability to ameliorate oxidative stress, core role

  8. World wide web: opportunities, challenges, and threats.

    Science.gov (United States)

    Edworthy, S M

    1999-01-01

    The Internet provides new opportunities to gather information on the population and may provide alternatives to the traditional methods of conducting clinical trials in systemic lupus erythematosus. The 'world wide web-www' has grown extensively in the past decade and it is estimated that there will be over 1 billion individuals on the net by the year 2005. Notifying, recruiting and assessing patients using Internet technology are already potential uses of this electronic medium. However, total reliance on the Internet could lead to biased sampling of patients with lupus. Women with low incomes or who are unemployed are less likely to have access to the Internet. Individuals with neurological deficits may have trouble using the Internet effectively. Data collected on the web may not have high reliability and much work needs to be completed to determine the psychometric properties of information derived from this source. One of the greatest threats to contend with is protecting the confidentiality of patient information when using electronic communication. Safeguards against inadvertent or unintended release of information must receive high priority in any attempt to use the Internet for clinical trials. Particular attention should be paid to email messages, which have the potential to be intercepted or sent to individuals without clearance to see patient information. Nevertheless, the costs to systems performance caused by security measures must also be considered and balanced against the need for access by those with appropriate authority. A number of websites already exist for the benefit of patients and providers. Clinicians and scientists interested in the field of lupus research will need to keep up to date on the rapidly proliferating information that is becoming available. This article lists sites which can be visited now.

  9. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  10. Need threat can motivate performance after ostracism.

    Science.gov (United States)

    Jamieson, Jeremy P; Harkins, Stephen G; Williams, Kipling D

    2010-05-01

    Ostracism threatens fundamental needs of belonging, self-esteem, control, and meaningful existence, which should motivate participants to respond to this threat. However, research has yet to examine the role of need threat in producing motivation after ostracism. In the current work, participants completed a "cognitive ability" (antisaccade) task following Cyberball-induced ostracism or inclusion. In two experiments, it was found that when ostracized, participants do not see antisaccade performance as a means of responding to the concerns produced by need threat; they respond only to the social threat, leading to worse performance than included participants (Experiments 1 and 2). However, when participants see an avenue of response (the Cyberball players can compare antisaccade performances), ostracized participants outperform included participants (Experiment 2). Moreover, this effect was mediated by the need for belonging, suggesting that ostracized participants were motivated to elevate their inclusionary status by demonstrating their worth on the cognitive ability task.

  11. Cyber Threats In Social Networking Websites

    Directory of Open Access Journals (Sweden)

    Wajeb Ghari

    2012-02-01

    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  12. Childhood maltreatment and threats with weapons.

    Science.gov (United States)

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  13. Current Computer Network Security Issues/Threats

    National Research Council Canada - National Science Library

    Ammar Yassir; Alaa A K Ismaeel

    2016-01-01

    Computer network security has been a subject of concern for a long period. Many efforts have been made to address the existing and emerging threats such as viruses and Trojan among others without any significant success...

  14. Cyber threats in social networking websites

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  15. Antimicrobial Resistance: A Global Public Health Threat

    African Journals Online (AJOL)

    Antibiotic resistance is a global threat and has reached ... and World Health Organization (WHO) have taken ... and 5) Education of the public. .... to decrease transmission of microbes and ... interventions are designed for behavioral change.

  16. Extreme Heat in Southwest a Deadly Threat

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_166797.html Extreme Heat in Southwest a Deadly Threat Here's how to ... t take off in Phoenix on Tuesday, the heat wave scorching the Southwest for the next week ...

  17. Resilience, Vulnerability and Residual Threat: An Assessment from Indian Sundarban

    Science.gov (United States)

    Ghosh, T.

    2016-12-01

    The estuarine islands within Indian Sundarban are extremely vulnerable due to climate change, erosion, flooding and increasing population pressure. Around 4.6 million people are living under constant threat of climatic shocks, affecting their farm based economy and dependency on forest resources for their livelihood. This paper attempts to focus on the dynamics of system's resilience in the backdrop of higher level of vulnerability. Globally the assessment of island vulnerability is generally more focused towards the climate change impacts, rather than taking into account other determining drivers with proper weightage. Three estuarine islands namely Sagar, Ghoramara and Mousani at the western part of Indian Sundarban Delta (ISD) have been chosen for this study to derive the indicator based scoring method using the household survey data from twenty seven (27) sampled `Mouza' (lowest administrative boundary; village) with cluster random sampling. Vulnerability and resilience of these islands have been calculated using the indicators like housing condition, electrification, population density, accretion, adult secondary education level, percentage of people `Below Poverty Line' (BPL) based on per capita income. Residual threats for these islands have been obtained by subtracting the score of resilience and vulnerability of the system. Result suggests that all these islands are in less resilient condition to combat the negative impact of the influencing factors. Sapkhali, Ghoramara, Bankimnagar, Shibpur and Baliara are becoming sensitive from excess residual threats. This study is an initiation for identifying the thrust areas need to address with effective policy adaptation, necessary to minimize the existing vulnerable conditions in these islands. Key words: Vulnerability, Resilience, Residual threat, Indian Sundarban

  18. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  19. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  20. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  1. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    Science.gov (United States)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  2. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  3. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  5. Threat perception bias and anxiety among Chinese school children and adolescents.

    Science.gov (United States)

    Lu, Weili; Daleiden, Eric; Lu, Shou-En

    2007-01-01

    This study evaluated the relationship between threat perception bias and anxiety among children and adolescents in China. A sample of 1,004 elementary, middle and high school students aged 9 to 19 years listened to stories containing themes of generalized anxiety, social anxiety and separation anxiety in either an ambiguous or non-ambiguous context. The story content included topics such as upset stomach, teacher-student interaction, and parents who are late to return home. Multiple threat perception indices were derived from children's responses. Children's level of anxiety was assessed by means of self-report questionnaires and parental reports. Higher levels of anxiety were related to higher frequencies of threat perception and interpretation, lower thresholds to detect threat and more negative feelings and cognitions. Age and gender were also related to some indices of threat perception bias. Threat perception bias was related to anxious symptomatology in general and was not content specific to particular anxiety disorders. The findings were consistent with studies conducted in Western culture and suggest that cognitive processing theories of childhood anxiety may generalize beyond Western society.

  6. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    above, these responses included: • “The unsettled dirt,” • “ Grassy area,” and • “Weapons not held properly.” We hypothesized that training would...alternative explanation is that with training, participants narrow their choices to threat relevant cues rather than identifying all possible threats

  7. Geospatiotemporal data mining in an early warning system for forest threats in the United States

    Science.gov (United States)

    F.M. Hoffman; R.T. Mills; J. Kumar; S.S. Vulli; W.W. Hargrove

    2010-01-01

    We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250 m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster...

  8. Epidemiology today: Mitigating threats to an ecosystem.

    Science.gov (United States)

    Kreiger, Nancy

    2016-06-27

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats.

  9. Insider Threat Assessment: Model, Analysis and Tool

    Science.gov (United States)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  10. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  11. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  12. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  13. Nash bargaining with a nondeterministic threat

    CERN Document Server

    Soileau, Kerry Michael

    2008-01-01

    We consider bargaining problems which involve two participants, with a nonempty closed, bounded convex bargaining set of points in the real plane representing all realizable bargains. We also assume that there is no definite threat or disagreement point which will provide the default bargain if the players cannot agree on some point in the bargaining set. However, there is a nondeterministic threat: if the players fail to agree on a bargain, one of them will be chosen at random with equal probability, and that chosen player will select any realizable bargain as the solution, subject to a reasonable restriction.

  14. Bioterrorism: is it a real threat?

    Science.gov (United States)

    Gottschalk, René; Preiser, Wolfgang

    2005-05-01

    The Geneva Protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. However, the terrorist assaults of September 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. In this context, naturally emerging diseases such as SARS, monkeypox or West Nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. Great efforts on the part of governments and public health authorities are necessary to counteract these threats.

  15. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    Science.gov (United States)

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats.

  16. Using the threat probability task to assess anxiety and fear during uncertain and certain threat.

    Science.gov (United States)

    Bradford, Daniel E; Magruder, Katherine P; Korhumel, Rachel A; Curtin, John J

    2014-09-12

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., "startle probes"). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion.

  17. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... resistant Staphylococcus aureus (MRSA) [page 77] Drug-resistant Streptococcus pneumoniae [page 79] Drug-resistant tuberculosis [page 81] Microorganisms with a Threat Level of Concerning Vancomycin-resistant Staphylococcus aureus ... Streptococcus [page 87] Clindamycin-resistant Group B Streptococcus [page ...

  18. Southern Africa’s Transnational Threats

    Science.gov (United States)

    2013-04-01

    smuggling of rare species and resources , money laundering, and smuggling of stolen vehicles. All of these events share a common trait. They each imply a...and Instability in Central Africa” A Threat Assesment , October 2011, linked from United Nations Office on Drugs and Crime home page at “Annual

  19. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  20. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  1. Dismount Threat Recognition through Automatic Pose Identification

    Science.gov (United States)

    2012-03-01

    camera and joint estimation software of the Kinect for Xbox 360. A threat determination is made based on the pose identified by the network. Ac- curacy...mapping produced by the Kinect sensor [3]. . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.5. Test subject and generated model. The subject is...16 3.2. Joint position estimates extracted from Kinect . Example of col- lecting orthogonal poses

  2. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  3. The Missing Piece in Threat Intelligence

    Directory of Open Access Journals (Sweden)

    Frank Denis

    2016-03-01

    Full Text Available Common systems for sharing intelligence on security threats have not been designed to efficiently process feedback from infrastructure providers. In order to fill this gap, we introduce DIP, a new description language to expose changes being made on a network that are relevant to security research and prevention.

  4. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  5. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  6. Hostile Intelligence Threat U.S. Technology

    Science.gov (United States)

    1988-11-01

    Assistant Secretary of Defense for DoD 5200.1-PH-2 Command, Control, Comunnications , and Intelligence (703) 695-2686 DEPARTMENT OF DEFENSE DTIC...intelligence threat: "* PROGRAM MANAGER Telephone: "* INSTALLATION SECURITY OFFICE Telephone: "* LOCAL DIS COGNIZANT SECURITY OFFICE (Industrial

  7. Global threat to agriculture from invasive species.

    Science.gov (United States)

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-05

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  8. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We

  9. Threats and opportunities for information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-10-01

    Full Text Available to outsource, as well as the success of an IS outsourcing arrangement. Managing successful IS outsourcing relationships is concerned with exploiting outsourcing opportunities and avoiding outsourcing threats. The aim of this paper is to share the findings of a...

  10. The silent threat of low genetic diversity

    Science.gov (United States)

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  11. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  12. Patriotism and the impact on perceived threat and immigration attitudes.

    Science.gov (United States)

    Willis-Esqueda, Cynthia; Delgado, Rosa Hazel; Pedroza, Karina

    2017-01-01

    Patriotism and threat have been shown to predict immigration attitudes. We suggest that patriotism is influential in producing threat, and such threat drives anti-immigration attitudes, but this relationship is different for Whites and Latinos. All participants completed a patriotism scale (blind and constructive patriotism measures), a threat scale (realistic and symbolic threat), and anti-immigration attitude scale. Latinos showed lower blind patriotism, realistic threat, symbolic threat, and anti-immigration attitudes compared to Whites, with no differences in constructive patriotism. Threat partially mediated the relationship between blind patriotism and anti-immigration attitudes for Whites and fully mediated the relationship for Latinos. Threat partially mediated the relationship for cultural patriotism and anti-immigration attitude for Whites but not for Latinos. Implications for public policy and education concerning immigrant attitudes are discussed.

  13. Defending Against Advanced Persistent Threats Using Game-Theory

    Science.gov (United States)

    König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker’s incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system’s protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest. PMID:28045922

  14. The Financial Arm Of The FARC: A Threat Finance Perspective

    Directory of Open Access Journals (Sweden)

    Thomas Cook

    2011-01-01

    Full Text Available The FARC (Fuerzas Armadas Revolucionarias de Colombia or Revolutionary Armed Forces of Colombia transformed from a traditional guerrilla group into a full-fledged insurgency because of its ability to effectively convert the proceeds derived from illegal narcotic trafficking into operational funds. Those financial capabilities allowed the FARC to challenge government authority in large swathes of the Colombian state. The FARC moved into the drug trade, initially controlling production territory and subsequently engaging in trafficking, which allowed the organization to increase its war-fighting capabilities. This paper only scratches the surface of the mechanism by which the FARC utilized its coca revenue in order to fund its community reinvestment programs, engage in large scale military buildup, and buy political support throughout the region. The exploration of the financial side of the FARC adds to our understanding of how insurgencies become successful. Based on open source information, Threat Finance and financial investigative techniques are underutilized in foreign policy, law enforcement, and intelligence. The critical role played by financing in the rise of the FARC suggests that Threat Finance efforts can be most effective when used to track terrorist and criminal networks. American law enforcement and intelligence agencies should be given bigger budgets and tasked earlier to shut down or disrupt financial networks of foreign insurgencies, such as the FARC.

  15. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  16. Secure in insecurity: The case of threat perception/acceptance in the Philippines

    Directory of Open Access Journals (Sweden)

    Amador IV Peleo

    2015-12-01

    Full Text Available Current theoretical and policy-based explanations of security in the Philippines have portrayed “politics” and “security” as distinct and separate fields. However, the recent “2011–2016 National Security Policy: Securing the Gains of Democracy”, has conflated “security” and “politics”, as may be observed in its two national security goals “to promote internal socio-political stability” and “to exercise full sovereignty over its territory”. Although likely derived from administrative expediency, the composite policy definition is also likely to result in the conceptualisation of political goals that are only partially attainable and of a security environment that will remain “unsecured”. As this appears to be a norm of governance in the Philippines, this paper examines the possibility that national security policy-making is likely more concerned with the survival of the regime during which the policy was created rather than with the long-term stabilisation of the entire state. Several theories may be useful in accounting for this behaviour; namely, small states conflict theory, securitisation theory and threat normalisation theory. This paper is intended to show that the definition of threat corresponds to threat-acceptance and may likely lead to threat-toleration than to threat-resolution.

  17. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  18. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  19. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  20. Detecting underwater improvised explosive threats (DUIET)

    Science.gov (United States)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  1. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.)...

  2. Common Viruses a Deadly Threat At Nursing Homes

    Science.gov (United States)

    ... 163048.html Common Viruses a Deadly Threat at Nursing Homes RSV and human metapneumovirus need to be ... News) -- Common viruses pose a serious threat in nursing homes, often sabotaging standard infection control measures, a ...

  3. Threat Modeling-Oriented Attack Path Evaluating Algorithm

    Institute of Scientific and Technical Information of China (English)

    LI Xiaohong; LIU Ran; FENG Zhiyong; HE Ke

    2009-01-01

    In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.

  4. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  5. The Divisive Threat of Immigration in Europe

    Science.gov (United States)

    2012-12-01

    Europe , immigrant children consistently underperformed in reading. This disparity suggests that immigrant children will have lower literacy rates, less...OF IMMIGRATION IN EUROPE by Andrew J. Sheehan Lars W. Lilleby December 2012 Thesis Advisor: Gordon McCormick Second Reader: Anna...COVERED Master’s Thesis 4. TITLE AND SUBTITLE The Divisive Threat of Immigration in Europe 5. FUNDING NUMBERS 6. AUTHOR(S) Lars W. Lilleby

  6. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    trained practitioners and even skilled security experts can miss key threats or misunderstand the impact of breaches. Our goal is to automate and...attack risk is $1000 × 0.05, or $50. If the company grows to 10 employees and the probability any one of the employees is untrustworthy is again 0.05...then the expected loss per year is roughly $400, assuming the employees operate independently (Figure 9). This amount will certainly lead to loss of

  7. HYPERSONIC THREATS TO THE HOMELAND STRATEGIC OPTIONS

    Science.gov (United States)

    2017-03-28

    Fighter Squadron, Homestead Air Reserve Base Florida, Director of Operations 80th Fighter Squadron, 8 FW, Kunsan AB, Korea. Lt Col Jeffress...homeland, safeguards the decision space of our nation’s leaders and potentially strengthens military, diplomatic and economic instruments of power... leaders cannot default on their oath to support and defend the constitution against this emergent threat as they prioritize tasks for the administration

  8. Handsets Malware Threats and Facing Techniques

    CERN Document Server

    Elfattah, Marwa M A; Sarhan, Ebada

    2012-01-01

    Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  9. Nonproliferation, Nuclear Security, and the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  10. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  11. Bot armies as threats to network security

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  12. Mere effort and stereotype threat performance effects.

    Science.gov (United States)

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account.

  13. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  14. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. Death Threat and Death Concerns in the College Student.

    Science.gov (United States)

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  16. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  17. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  18. Fall 2014 SEI Research Review Insider Threat Mitigation LINE Project

    Science.gov (United States)

    2014-10-01

    Fall 2014 SEI Research Review Moore, 28-30 October 2014 © 2014 Carnegie Mellon University Contact Information Slide Format Presenter / Point of...published • Threat models published in book: CERT Guide to Insider Threats (2012) • Pattern-Based Design of Insider Threat Programs: Forthcoming 12

  19. Threat model framework and methodology for personal networks (PNs)

    DEFF Research Database (Denmark)

    Prasad, Neeli R.

    2007-01-01

    is to give a structured, convenient approach for building threat models. A framework for the threat model is presented with a list of requirements for methodology. The methodology will be applied to build a threat model for Personal Networks. Practical tools like UML sequence diagrams and attack trees have...

  20. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    OpenAIRE

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful...

  1. When threats foreign turn domestic : Two ways for distant realistic intergroup threats to carry over into local intolerance

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-01-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to b

  2. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  3. Near Earth Asteroid Characterization for Threat Assessment

    Science.gov (United States)

    Dotson, Jessie; Mathias, Donovan; Wheeler, Lorien; Wooden, Diane; Bryson, Kathryn; Ostrowski, Daniel

    2017-01-01

    Physical characteristics of NEAs are an essential input to modeling behavior during atmospheric entry and to assess the risk of impact but determining these properties requires a non-trivial investment of time and resources. The characteristics relevant to these models include size, density, strength and ablation coefficient. Some of these characteristics cannot be directly measured, but rather must be inferred from related measurements of asteroids and/or meteorites. Furthermore, for the majority of NEAs, only the basic measurements exist so often properties must be inferred from statistics of the population of more completely characterized objects. The Asteroid Threat Assessment Project at NASA Ames Research Center has developed a probabilistic asteroid impact risk (PAIR) model in order to assess the risk of asteroid impact. Our PAIR model and its use to develop probability distributions of impact risk are discussed in other contributions to PDC 2017 (e.g., Mathias et al.). Here we utilize PAIR to investigate which NEA characteristics are important for assessing the impact threat by investigating how changes in these characteristics alter the damage predicted by PAIR. We will also provide an assessment of the current state of knowledge of the NEA characteristics of importance for asteroid threat assessment. The relative importance of different properties as identified using PAIR will be combined with our assessment of the current state of knowledge to identify potential high impact investigations. In addition, we will discuss an ongoing effort to collate the existing measurements of NEA properties of interest to the planetary defense community into a readily accessible database.

  4. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  5. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  6. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  7. Assessing the global threat from Zika virus.

    Science.gov (United States)

    Lessler, Justin; Chaisson, Lelia H; Kucirka, Lauren M; Bi, Qifang; Grantz, Kyra; Salje, Henrik; Carcelen, Andrea C; Ott, Cassandra T; Sheffield, Jeanne S; Ferguson, Neil M; Cummings, Derek A T; Metcalf, C Jessica E; Rodriguez-Barraquer, Isabel

    2016-08-12

    First discovered in 1947, Zika virus (ZIKV) infection remained a little-known tropical disease until 2015, when its apparent association with a considerable increase in the incidence of microcephaly in Brazil raised alarms worldwide. There is limited information on the key factors that determine the extent of the global threat from ZIKV infection and resulting complications. Here, we review what is known about the epidemiology, natural history, and public health effects of ZIKV infection, the empirical basis for this knowledge, and the critical knowledge gaps that need to be filled.

  8. Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments

    Science.gov (United States)

    2010-11-01

    integrating a dynamic notion of trust derived from Network Behavioral Analysis ( NBA ). Behavioral-based trust has been researched as a enabling...detection. NBA , as used in the agent-based system CAMNEP, is an approach towards addressing this challenge. But even systems like CAMNEP can be hindered in...baseline normal behavioral patterns that allows such systems to adapt to emergent threat behaviors. NBA provides capabilities that focus on network

  9. The evolution of power, threat, and security: Past and potential developments

    OpenAIRE

    Cusack, Thomas R.

    1984-01-01

    This paper describes the development of the international military situation over the past three decades and explores the potential for its transformation under different assumptions regarding economic conditions and the character of international relations. Using newly derived indices in the conventional military area, an assessment is made of the shifting tides in the power, threat and security situation that has confronted twenty-five important states in the international system during the...

  10. If it walks like a duck: nanosensor threat assessment

    Science.gov (United States)

    Chachis, George C.

    2003-09-01

    A convergence of technologies is making deployment of unattended ground nanosensors operationally feasible in terms of energy, communications for both arbitrated and self-organizing distributed, collective behaviors. A number of nano communications technologies are already making network-centric systems possible for MicroElectrical Mechanical (MEM) sensor devices today. Similar technologies may make NanoElectrical Mechanical (NEM) sensor devices operationally feasible a few years from now. Just as organizational behaviors of large numbers of nanodevices can derive strategies from social insects and other group-oriented animals, bio-inspired heuristics for threat assessment provide a conceptual approach for successful integration of nanosensors into unattended smart sensor networks. Biological models such as the organization of social insects or the dynamics of immune systems show promise as biologically-inspired paradigms for protecting nanosensor networks for security scene analysis and battlespace awareness. The paradox of nanosensors is that the smaller the device is the more useful it is but the smaller it is the more vulnerable it is to a variety of threats. In other words simpler means networked nanosensors are more likely to fall prey to a wide-range of attacks including jamming, spoofing, Janisserian recruitment, Pied-Piper distraction, as well as typical attacks computer network security. Thus, unattended sensor technologies call for network architectures that include security and countermeasures to provide reliable scene analysis or battlespace awareness information. Such network centric architectures may well draw upon a variety of bio-inspired approaches to safeguard, validate and make sense of large quantities of information.

  11. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  12. Ongoing Threats to Emerging Financial Entities

    Directory of Open Access Journals (Sweden)

    Bryce Alexander LYNCH

    2016-06-01

    Full Text Available In the twenty-first century the pace of technological advancement shows no signs of stopping. Old technologies are being discarded as obsolete or are transformed in ways that nobody could have foreseen even a half-decade ago. Along with these radical changes come vulnerabilities and threats to infrastructure, including informational and financial which must be considered and protected. This is not to say that basic security measures must continue to be neglected in favor of rapid development and deployment to provide a Minimum Viable Product to customers; basic security protocols become all the more important under these circumstances. Improving faster are attacks against the new infrastructure; technique and technology tend to change along generally accepted sets of rules while attackers follow no rules or guidelines. This fundamental asymmetry leaves defenders at a distinct advantage in several ways, including ethical concerns (“There are some lines we will not cross” versus “By any means necessary”, monetary considerations (“Return on investment” versus “The resources aren’t ours to begin with, so who cares” and pragmatism (“We exist to make money to improve shareholder value” versus “Because it’s there”. That said, measurable, repeatable, and effective countermeasures exist which can be deployed on an enterprise-wide basis to help level the playing field by deterring attackers. This paper will discuss these threats along with active and passive countermeasures for same.

  13. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  14. Prefrontal control of attention to threat.

    Science.gov (United States)

    Peers, Polly V; Simons, Jon S; Lawrence, Andrew D

    2013-01-01

    Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g., trait anxiety) and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink (AB) following threat-related targets. Moreover, we demonstrate that activity in dorso-lateral prefrontal cortex (DLPFC), is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  15. Prefrontal control of attention to threat

    Directory of Open Access Journals (Sweden)

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  16. In Brief: Threats to species continue

    Science.gov (United States)

    Showstack, Randy

    2009-11-01

    Of 47,677 assessed species, 17,291 are threatened with extinction, according to the latest update of the Red List of Threatened Species issued by the International Union for Conservation of Nature (IUCN) on 3 November. The list indicates that amphibians are the most threatened group of species known to date, with 1895 (nearly 30%) of 6285 amphibians in danger of extinction. Thirty-nine are already extinct or extinct in the wild, 484 are critically endangered, 754 are endangered, and 657 are vulnerable, according to IUCN. Under threat are 21% of mammals, 30% of amphibians, 12% of birds, 28% of reptiles, 37% of freshwater fishes, 70% of plants, and 35% of invertebrates assessed to date. “We have only managed to assess 47,663 species so far; there are many more millions out there which could be under serious threat,” according to IUCN Red List Unit Manager Craig Hilton-Taylor. For more information, visit http://www.iucnredlist.org.

  17. Unattended sensors for nuclear threat detection

    Energy Technology Data Exchange (ETDEWEB)

    Runkle, Robert C.; Myjak, Mitchell J.; Batdorf, Michael T.; Bowler, Ryan S.; Kiff, Scott D.; Morris, Scott J.; Mullen, Crystal A.; Rohrer, John S.; Todd, Lindsay C.

    2008-06-30

    This paper discusses the ongoing development of a compact, unattended, and low-power radiation detection system designed for deployment to the front lines of nuclear proliferation. Current countermeasure deployments aim to detect nuclear threats by screening cargo containers abroad or at ports of entry, but the defensive nature of these systems means that they face the immense challenge of detecting intentionally-concealed materials. A complementary strategy places countermeasures closer to the source of nuclear proliferation, but deployments to these regions often must operate autonomously and in the absence of infrastructure. This application motivates our development of a low-power system capable of detecting gamma-ray and neutron emissions while operating autonomously for extended periods of time. Many challenges are present when developing radiation-detection systems for this application, and this paper describes work focused on two of them: the development of compact, low-power electronics for gamma-ray-spectrometer and 3He- tube signal processing, and analysis algorithms capable of distinguishing threats from benign sources in mid-resolution gamma-ray spectrometers. We discuss our development efforts on these fronts and present results based on implementation in a proof-of-principle system comprised of two 5 cm x 10 cm x 41 cm NaI(Tl) crystals and eight 40-cm 3He tubes.

  18. When threat to society becomes a threat to oneself: implications for right-wing attitudes and ethnic prejudice.

    Science.gov (United States)

    Onraet, Emma; Van Hiel, Alain

    2013-01-01

    The relationships between threat on one hand and right-wing attitudes and ethnic prejudice on the other were investigated in a heterogeneous sample (N = 588). Specifically, we considered the perception of economic and terroristic threats in terms of their consequences at the societal and personal levels. Previous studies revealed that societal consequences of threat, rather than personal consequences, are related to right-wing attitudes. However, the present results challenge these findings. More specifically, three important results emerged. First, items probing the distinct threat levels loaded on separate dimensions for economic and terroristic threat, validating the distinction between societal and personal threat consequences. Second, consistent with previous research, this study revealed that perceived societal consequences of threat yield strong and robust relationships with all target variables. However, personal consequences of threat were also associated with higher levels of right-wing authoritarianism (RWA), social dominance orientation (SDO), and ethnic prejudice in particular. Third, societal and personal consequences of threat interacted in explaining the target variables. More specifically, feeling personally threatened by terrorism was only related to higher levels of RWA in the presence of low levels of threat to society, whereas experiencing personal economic threat was only related to higher levels of SDO and ethnic prejudice when high societal economic threat was experienced. In sum, although the perception of societal consequences of threat plays a prominent role in explaining right-wing attitudes and ethnic prejudice, the perception of being personally affected by threat is also associated with higher levels of RWA and SDO, and especially ethnic prejudice.

  19. Overview of the Distributed Mission Training Integrated Threat Environment project

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.; Santos, Eugene, Jr.

    1998-08-01

    The Joint Synthetic Battlespace (JSB) envisioned within the Department of Defense modeling and simulation master plan requires a distributed virtual environment (DVE) wide consistent threat environment to achieve a useful mission rehearsal, training, test and evaluation capability. To achieve this objective, all threats in the DVE must appear at compatible levels of fidelity to all the entities operating in the DVE and they must interact with human- operated and computer-controlled entities in a realistic fashion. Achieving this goal is not currently possible for two reasons. First, each primary aircraft simulator training system developer has created their own threat system and made their own modeling decisions to support a specific user for a select few predetermined conditions. This traditional threat simulation approach is expensive and leads to ongoing difficulties in maintaining threat currency as intelligence updates are made, new weapons are introduced and new theaters of operation are identified. Second, the threat system interaction on a distributed network must be coordinated. The individualized nature of current threat systems precludes the possibility of introducing coordinated threats. The Distributed Mission Training Integrated Threat Environment (DMTITE) project is developing an effective solution to these issues. The DMTITE project is identifying the requirements for a distributed threat environment and building a demonstrator DOD High Level Architecture compatible system that can provide realistic threats for pilots to train against. The DMTITE prototype will instantiate a variety of threats for use in distributed training scenarios, including surface threats, air threats, radars, and jamming systems. A key element of the system will be the provision of realistic behaviors for the threat systems. We based DMTITE on a general software design methodology and software architecture for computer-generated forces (CGFs) that naturally supports `variety

  20. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  1. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    Science.gov (United States)

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  2. The Department of Defense Effort to Countering the Cyberterrorism Threat: Is the Threat Real or Hyperbole

    Science.gov (United States)

    2017-04-21

    illustrate some of the challenges and diversity of the threat that the United States faces in the cyber domain. Infrastructure and Systems...FBIs own definition. For example, the DOJ charged a hacker arrested by the FBI in Malaysia with cyberterrorism for stealing US service member’s

  3. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    Science.gov (United States)

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  4. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  5. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  6. Identifying key conservation threats to Alpine birds through expert knowledge.

    Science.gov (United States)

    Chamberlain, Dan E; Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  7. Comparison of broadband and hyperspectral thermal infrared imaging of buried threat objects

    Science.gov (United States)

    McFee, John E.; Achal, Steve B.; Diaz, Alejandra U.; Faust, Anthony A.

    2013-06-01

    Previous research by many groups has shown that broad-band thermal infrared (TIR) imagers can detect buried explosive threat devices, such as unexploded ordnance (UXO), landmines and improvised explosive devices (IEDs). Broad-band detection measures the apparent temperature - an average over the wave band of the product of the true soil surface temperature and the emissivity. Broad-band detection suffers from inconsistent performance (low signal, high clutter rates), due in part to diurnal variations, environmental and meteorological conditions, and soil surface effects. It has been suggested that hyperspectral TIR imaging might have improved performance since it can, in principle, allow extraction of the wavelength-dependent emissivity and the true soil surface temperature. This would allow the surface disturbance effects to be separated from the soil column (bulk) effects. A significant, and as yet unanswered, question is whether hyperspectral TIR images provide better detection capability (higher probability of detection and/or lower false alarm rate) than do broad-band thermal images. TIR hyperspectral image data of threat objects, buried and surface-laid in bare soil, were obtained in arid, desert-like conditions over full diurnal cycles for several days. Regions of interest containing threat objects and backgrounds were extracted throughout the time period. Simulated broad-band images were derived from the hyperspectral images. The diurnal variation of the images was studied. Hyperspectral was found to provide some advantage over broad-band imaging in detection of buried threat objects for the limited data set studied.

  8. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Science.gov (United States)

    Richard Trans Mills; Forrest M Hoffman; Jitendra Kumar; William W. Hargrove

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The...

  9. When threats foreign turn domestic: Two ways for distant realistic intergroup threats to carry over into local intolerance.

    Science.gov (United States)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-09-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to be caused by distant outgroups (e.g., European Union members perceiving Greece to threaten their economies) and that such distant threats can carry over into local intolerance (e.g., increasing intolerance towards local immigrant groups). We predicted and found in two studies that perceived distant realistic threats carried over into local intolerance via two different pathways. First, direct reactions towards the distant outgroup can generalize to culturally similar local outgroups (the group-based association pathway). Secondly, Study 2 indicated that when the distant threat was attributed to stereotypical outgroup traits (e.g., being lazy), distant realistic threats activated local realistic threats, which subsequently influenced local intolerance (the threat-based association pathway). Taken together, our studies indicate that perceived realistic threats foreign can turn domestic, but in two different ways.

  10. Threats and violence in Swedish community elderly care.

    Science.gov (United States)

    Josefsson, Karin; Ryhammar, Lars

    2010-01-01

    Violence in elderly care has been reported on a global scale. The aim of this study was to describe nurses' perceptions of threats and violence, directed at themselves and other staff in community elderly care. Another aim was to describe nurses' access to prevention measures for handling threats and violence. A questionnaire was answered by registered nurses (RNs) (n=213) in community elderly care. Data was analyzed by SPSS. The results showed that nurses had experienced high-degree indirect threats (48%), direct threats of violent acts (40%) and violent acts (40%). Forty-five percent of the nurses had witnessed violence and threats toward other staff. Twenty percent of the nurses stated to have access to education in managing threats and violence. The conclusions were that violence occurred frequently in community elderly care, as perceived by nurses, as well as that community authority should increase staff education for handling violence.

  11. Air Target Fuzzy Pattern Recognition Threat-Judgment Model

    Institute of Scientific and Technical Information of China (English)

    童幼堂; 王建明

    2003-01-01

    Threat-judgment is a complicated fuzzy inference problem. Up to now no relevant unified theory and measuring standard have been developed. It is very difficult to establish a threat-judgment model with high reliability in the air defense system for the naval warships. Air target threat level judgment is an important component in naval warship combat command decision-making systems. According to the threat level judgment of air targets during the air defense of single naval warship, a fuzzy pattern recognition model for judging the threat from air targets is established. Then an algorithm for identifying the parameters in the model is presented. The model has an adaptive feature and can dynamically update its parameters according to the state change of the attacking targets and the environment. The method presented here can be used for the air defense system threat judgment in the naval warships.

  12. Prejudice towards Muslims in The Netherlands: testing integrated threat theory.

    Science.gov (United States)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-12-01

    This study uses integrated threat theory to examine Dutch adolescents' (N=1,187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators between antecedent factors (in-group identification, intergroup contact, and the endorsement of multiculturalism) and prejudice. Based on structural equation modelling, it was found that stereotypes and symbolic threats, but not realistic threats, predicted prejudice towards Muslims. Further, it was found that the effect of in-group identification on prejudice was fully mediated by symbolic threat, the effect of contact was partially mediated by stereotypes, and the effect of the endorsement of multiculturalism was mediated by both symbolic threat and stereotypes. In addition, contact and multiculturalism were directly associated with prejudice towards Muslims. The theoretical and practical implications of these findings are discussed.

  13. Impaired Retrieval Inhibition of Threat Material in Generalized Anxiety Disorder.

    Science.gov (United States)

    Kircanski, Katharina; Johnson, Douglas C; Mateen, Maria; Bjork, Robert A; Gotlib, Ian H

    2016-03-01

    Generalized Anxiety Disorder (GAD) is characterized by cognitive biases toward threat-relevant information, but the underlying mechanisms are unclear. We translated a retrieval-practice paradigm from cognitive science to investigate impaired inhibition of threat information as one such mechanism. Participants diagnosed with GAD and never-disordered control participants learned a series of cue-target pairs; whereas some cues were associated only with neutral targets, others were associated with both neutral and threat targets. Next, participants practiced retrieving neutral targets, which typically suppresses the subsequent recall of unpracticed associated targets (retrieval-induced forgetting; RIF). Finally, participants were tested on their recall of all targets. Despite showing intact RIF of neutral targets, the GAD group failed to exhibit RIF of threat targets. Furthermore, within the GAD group, less RIF of threat targets correlated with greater pervasiveness of worry. Deficits in inhibitory control over threat-relevant information may underlie the cognitive pathology of GAD, which has important treatment implications.

  14. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    Science.gov (United States)

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat.

  15. Postural threat influences vestibular-evoked muscular responses.

    Science.gov (United States)

    Lim, Shannon B; Cleworth, Taylor W; Horslen, Brian C; Blouin, Jean-Sébastien; Inglis, J Timothy; Carpenter, Mark G

    2017-02-01

    Standing balance is significantly influenced by postural threat. While this effect has been well established, the underlying mechanisms of the effect are less understood. The involvement of the vestibular system is under current debate, and recent studies that investigated the effects of height-induced postural threat on vestibular-evoked responses provide conflicting results based on kinetic (Horslen BC, Dakin CJ, Inglis JT, Blouin JS, Carpenter MG. J Physiol 592: 3671-3685, 2014) and kinematic (Osler CJ, Tersteeg MC, Reynolds RF, Loram ID. Eur J Neurosci 38: 3239-3247, 2013) data. We examined the effect of threat of perturbation, a different form of postural threat, on coupling (cross-correlation, coherence, and gain) of the vestibulo-muscular relationship in 25 participants who maintained standing balance. In the "No-Threat" conditions, participants stood quietly on a stable surface. In the "Threat" condition, participants' balance was threatened with unpredictable mediolateral support surface tilts. Quiet standing immediately before the surface tilts was compared to an equivalent time from the No-Threat conditions. Surface EMG was recorded from bilateral trunk, hip, and leg muscles. Hip and leg muscles exhibited significant increases in peak cross-correlation amplitudes, coherence, and gain (1.23-2.66×) in the Threat condition compared with No-Threat conditions, and significant correlations were observed between threat-related changes in physiological arousal and medium-latency peak cross-correlation amplitude in medial gastrocnemius (r = 0.408) muscles. These findings show a clear threat effect on vestibular-evoked responses in muscles in the lower body, with less robust effects of threat on trunk muscles. Combined with previous work, the present results can provide insight into observed changes during balance control in threatening situations.

  16. The Reliability to Predict Threat in Social Networks

    Directory of Open Access Journals (Sweden)

    Aleksandrs Larionovs

    2014-11-01

    Full Text Available During the analysis and study it will be possible to create and describe information damping mechanism for transition of threats from one user group to another (within the parameters of portraits, which is the main cause of the massively spreading threat on social networks. Threat predictability in social networks is associated with an adequate scrutiny of system and user portrait, which has a direct correlation.

  17. The insider threat--a new aspect of biosecurity.

    Science.gov (United States)

    Engells, Thomas E

    2013-01-01

    The need for those responsible for security at hospital research centers to take steps to counter insider threats to use biomedical and microbiological research and for perverted purposes is real, says the author. He spells out what the threats consist of suspicious behaviors to be aware of and reporting procedures for effective resolution that will enable life science researchers and law enforcement to successfully work together to thwart such threats.

  18. Affective signals of threat increase perceived proximity.

    Science.gov (United States)

    Cole, Shana; Balcetis, Emily; Dunning, David

    2013-01-01

    Do stimuli appear to be closer when they are more threatening? We tested people's perceptions of distance to stimuli that they felt were threatening relative to perceptions of stimuli they felt were disgusting or neutral. Two studies demonstrated that stimuli that emitted affective signals of threat (e.g., an aggressive male student) were seen as physically closer than stimuli that emitted affective signals of disgust (e.g., a repulsive male student) or no affective signal. Even after controlling for the direct effects of physiological arousal, object familiarity, and intensity of the negative emotional reaction, we found that threatening stimuli appeared to be physically closer than did disgusting ones (Study 2). These findings highlight the links among biased perception, action regulation, and successful navigation of the environment.

  19. Zika Virus: Old Rival, New Threat

    Directory of Open Access Journals (Sweden)

    Huanyu Wang

    2016-04-01

    Full Text Available Zika virus (ZIKV, originally isolated in 1947, caused a worldwide epidemic between January 2014 and February 2016 in which a total of 39 countries have reported autochthonous circulation (33 or indirect evidence of local transmission (6. The total area affected by ZIKV infection is expanding steadily. ZIKV has become a new threat to public health, and the recent cluster of microcephaly and other neurologic disorders suspected to be due to ZIKV has lead the World Health Organization to announce that it is a Public Health Emergency of International Concern. Because of its current importance, this review summarizes the currently available data on the etiology, epidemiology, clinical features, laboratory diagnosis, and transmission of ZIKV and its related diseases.

  20. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  1. Females that experience threat are better teachers.

    Science.gov (United States)

    Kleindorfer, Sonia; Evans, Christine; Colombelli-Négrel, Diane

    2014-05-01

    Superb fairy-wren (Malurus cyaneus) females use an incubation call to teach their embryos a vocal password to solicit parental feeding care after hatching. We previously showed that high call rate by the female was correlated with high call similarity in fairy-wren chicks, but not in cuckoo chicks, and that parent birds more often fed chicks with high call similarity. Hosts should be selected to increase their defence behaviour when the risk of brood parasitism is highest, such as when cuckoos are present in the area. Therefore, we experimentally test whether hosts increase call rate to embryos in the presence of a singing Horsfield's bronze-cuckoo (Chalcites basalis). Female fairy-wrens increased incubation call rate when we experimentally broadcast cuckoo song near the nest. Embryos had higher call similarity when females had higher incubation call rate. We interpret the findings of increased call rate as increased teaching effort in response to a signal of threat.

  2. Threats from space: 20 years of progress

    CERN Document Server

    Remo, J L

    2014-01-01

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  3. Threats and opportunities of plant pathogenic bacteria.

    Science.gov (United States)

    Tarkowski, Petr; Vereecke, Danny

    2014-01-01

    Plant pathogenic bacteria can have devastating effects on plant productivity and yield. Nevertheless, because these often soil-dwelling bacteria have evolved to interact with eukaryotes, they generally exhibit a strong adaptivity, a versatile metabolism, and ingenious mechanisms tailored to modify the development of their hosts. Consequently, besides being a threat for agricultural practices, phytopathogens may also represent opportunities for plant production or be useful for specific biotechnological applications. Here, we illustrate this idea by reviewing the pathogenic strategies and the (potential) uses of five very different (hemi)biotrophic plant pathogenic bacteria: Agrobacterium tumefaciens, A. rhizogenes, Rhodococcus fascians, scab-inducing Streptomyces spp., and Pseudomonas syringae. Copyright © 2013 Elsevier Inc. All rights reserved.

  4. Scientific performance estimation of robustness and threat

    Science.gov (United States)

    Hoffman, John R.; Sorensen, Eric; Stelzig, Chad A.; Mahler, Ronald P. S.; El-Fallah, Adel I.; Alford, Mark G.

    2002-07-01

    For the last three years at this conference we have been describing the implementation of a unified, scientific approach to performance estimation for various aspects of data fusion: multitarget detection, tracking, and identification algorithms; sensor management algorithms; and adaptive data fusion algorithms. The proposed approach is based on finite-set statistics (FISST), a generalization of conventional statistics to multisource, multitarget problems. Finite-set statistics makes it possible to directly extend Shannon-type information metrics to multisource, multitarget problems in such a way that information can be defined and measured even though any given end-user may have conflicting or even subjective definitions of what informative means. In this presentation, we will show how to extend our previous results to two new problems. First, that of evaluating the robustness of multisensor, multitarget algorithms. Second, that of evaluating the performance of multisource-multitarget threat assessment algorithms.

  5. Zika Virus: An Emerging Worldwide Threat

    Directory of Open Access Journals (Sweden)

    Irfan A. Rather

    2017-07-01

    Full Text Available ZIKA virus (ZIKV poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is being performed by RT-PCR and IgM-captured enzyme-linked immunosorbent assay (MAC-ELISA. The real brunt of the virus is, however, borne by children and adults alike. Case studies of the ZIKV outbreaks in the French Polynesia and other places have suggested that there is a close link between the ZIKV and Gullian-Barre syndrome (GBS. The GBS has closely followed in areas facing ZIKV outbreaks. Although solid evidence is yet to emerge, clinical data integration has revealed a large number of ZIKV patients having GBS. Moreover, the amniotic fluids, blood cord, and miscarriage tissues of mothers have been detected with ZIKV, which indicates that the virus either gets transferred from mother to fetus or seeks direct entry in the fetus, causing microcephaly and other brain anomalies in the newborn babies. Studies on mice have confirmed the link between the ZIKV infection during pregnancy and microcephaly in babies. Reports have highlighted the sexual transmission of the ZIKV, as it has been detected in the semen and saliva of affected persons. The intensity with which the ZIKA is spreading can collapse the health sector of several countries, which are poor. A comprehensive strategy is a need of an hour to combat this virus so as to prevent its transmission and avert the looming threat. At the same time, more research on the cure of the ZIKV is imperative.

  6. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  7. Wetland Preservation in Australia: The Administrative and Policital Threats

    Institute of Scientific and Technical Information of China (English)

    Mark Yaolin Wang

    2008-01-01

    The wetlands in Australia are of great physical, chemical and biological variety due to the continent's age, geological history and climate. The traditional physical and biological threats remain as the main challenges for wetland preservation in Australia. However, it has been increasingly recognized that the immediate survival of wetlands are being affected by more subtle threats, such as administrative and political threats. This paper identifies these non-physical threats and discusses how and why they have become the major barriers for sustainable wetland preservation in Australia. Finally, this paper calls for more practical policies and solutions to be implemented for sustainable wetland preservation in Australia.

  8. Working Memory Regulates Trait Anxiety-Related Threat Processing Biases.

    Science.gov (United States)

    Booth, Robert W; Mackintosh, Bundy; Sharma, Dinkar

    2016-12-19

    High trait anxious individuals tend to show biased processing of threat. Correlational evidence suggests that executive control could be used to regulate such threat-processing. On this basis, we hypothesized that trait anxiety-related cognitive biases regarding threat should be exaggerated when executive control is experimentally impaired by loading working memory. In Study 1, 68 undergraduates read ambiguous vignettes under high and low working memory load; later, their interpretations of these vignettes were assessed via a recognition test. Trait anxiety predicted biased interpretation of social threat vignettes under high working memory load, but not under low working memory load. In Study 2, 53 undergraduates completed a dot probe task with fear-conditioned Japanese characters serving as threat stimuli. Trait anxiety predicted attentional bias to the threat stimuli but, again, this only occurred under high working memory load. Interestingly however, actual eye movements toward the threat stimuli were only associated with state anxiety, and this was not moderated by working memory load, suggesting that executive control regulates biased threat-processing downstream of initial input processes such as orienting. These results suggest that cognitive loads can exacerbate trait anxiety-related cognitive biases, and therefore represent a useful tool for assessing cognitive biases in future research. More importantly, since biased threat-processing has been implicated in the etiology and maintenance of anxiety, poor executive control may be a risk factor for anxiety disorders. (PsycINFO Database Record

  9. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    Helmet TEA HI Threat w/ Ops-Core & Oakley 3.0 TEA HI Threat w/ Ops-Core & Oakley 2.0 TEA HI Threat w/ Ops-Core & ARC IP IL (d B) Average Impulsive...4 1.5 1.5 TEA HI Threat 10.2 4.6 4.4 Figure 23. Average response time (seconds) 3.7 Speech Intelligibility The AFRL VOice Communication...designed to evaluate voice communication effectiveness in operationally- realistic acoustic environments. The facility consisted of a programmable, high

  10. ANALYSIS OF SECURITY THREATS IN WIRELESS SENSOR NETWORK

    National Research Council Canada - National Science Library

    Sahabul Alam; Debashis De

    2014-01-01

    .... The inclusion of wireless communication technology also incurs various types of security threats due to unattended installation of sensor nodes as sensor networks may interact with sensitive data...

  11. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation.

  12. Mechanisms of visual threat detection in specific phobia.

    Science.gov (United States)

    Weierich, Mariann R; Treat, Teresa A

    2015-01-01

    People with anxiety or stress-related disorders attend differently to threat-relevant compared with non-threat stimuli, yet the temporal mechanisms of differential allocation of attention are not well understood. We investigated two independent mechanisms of temporal processing of visual threat by comparing spider-phobic and non-fearful participants using a rapid serial visual presentation task. Consistent with prior literature, spider phobics, but not non-fearful controls, displayed threat-specific facilitated detection of spider stimuli relative to negative stimuli and neutral stimuli. Further, signal detection analyses revealed that facilitated threat detection in spider-phobic participants was driven by greater sensitivity to threat stimulus features and a trend towards a lower threshold for detecting spider stimuli. However, phobic participants did not display reliably slowed temporal disengagement from threat-relevant stimuli. These findings advance our understanding of threat feature processing that might contribute to the onset and maintenance of symptoms in specific phobia and disorders that involve visual threat information more generally.

  13. Information Exchange Between Resilient and High-Threat Networks: Techniques for Threat Mitigation

    Science.gov (United States)

    2004-11-01

    details; e-mail arriving from the Internet carrying viruses that infect a business ’ Intranet; or more recently, the emergence of ‘phishing’ where...unavoidable business requirement to share information. RTO-MP-IST-041 16 - 11 Information Exchange between Resilient and High-Threat Networks...December 1999 on a Community framework for electronic signatures. Official Journal L 013, 19/01/2000 p. 0012 – 0020. http://europa.eu.int/ISPO/ ecommerce

  14. Bacteriophages and Their Immunological Applications against Infectious Threats

    Directory of Open Access Journals (Sweden)

    Elena Criscuolo

    2017-01-01

    Full Text Available Bacteriophage therapy dates back almost a century, but the discovery of antibiotics led to a rapid decline in the interests and investments within this field of research. Recently, the novel threat of multidrug-resistant bacteria highlighted the alarming drop in research and development of new antibiotics: 16 molecules were discovered during 1983–87, 10 new therapeutics during the nineties, and only 5 between 2003 and 2007. Phages are therefore being reconsidered as alternative therapeutics. Phage display technique has proved to be extremely promising for the identification of effective antibodies directed against pathogens, as well as for vaccine development. At the same time, conventional phage therapy uses lytic bacteriophages for treatment of infections and recent clinical trials have shown great potential. Moreover, several other approaches have been developed in vitro and in vivo using phage-derived proteins as antibacterial agents. Finally, their use has also been widely considered for public health surveillance, as biosensor phages can be used to detect food and water contaminations and prevent bacterial epidemics. These novel approaches strongly promote the idea that phages and their proteins can be exploited as an effective weapon in the near future, especially in a world which is on the brink of a “postantibiotic era.”

  15. Threats to sandy beach ecosystems: A review

    Science.gov (United States)

    Defeo, Omar; McLachlan, Anton; Schoeman, David S.; Schlacher, Thomas A.; Dugan, Jenifer; Jones, Alan; Lastra, Mariano; Scapini, Felicita

    2009-01-01

    We provide a brief synopsis of the unique physical and ecological attributes of sandy beach ecosystems and review the main anthropogenic pressures acting on the world's single largest type of open shoreline. Threats to beaches arise from a range of stressors which span a spectrum of impact scales from localised effects (e.g. trampling) to a truly global reach (e.g. sea-level rise). These pressures act at multiple temporal and spatial scales, translating into ecological impacts that are manifested across several dimensions in time and space so that today almost every beach on every coastline is threatened by human activities. Press disturbances (whatever the impact source involved) are becoming increasingly common, operating on time scales of years to decades. However, long-term data sets that describe either the natural dynamics of beach systems or the human impacts on beaches are scarce and fragmentary. A top priority is to implement long-term field experiments and monitoring programmes that quantify the dynamics of key ecological attributes on sandy beaches. Because of the inertia associated with global climate change and human population growth, no realistic management scenario will alleviate these threats in the short term. The immediate priority is to avoid further development of coastal areas likely to be directly impacted by retreating shorelines. There is also scope for improvement in experimental design to better distinguish natural variability from anthropogenic impacts. Sea-level rise and other effects of global warming are expected to intensify other anthropogenic pressures, and could cause unprecedented ecological impacts. The definition of the relevant scales of analysis, which will vary according to the magnitude of the impact and the organisational level under analysis, and the recognition of a physical-biological coupling at different scales, should be included in approaches to quantify impacts. Zoning strategies and marine reserves, which have not

  16. Political homogeneity can nurture threats to research validity.

    Science.gov (United States)

    Chambers, John R; Schlenker, Barry R

    2015-01-01

    Political homogeneity within a scientific field nurtures threats to the validity of many research conclusions by allowing ideologically compatible values to influence interpretations, by minimizing skepticism, and by creating premature consensus. Although validity threats can crop in any research, the usual corrective activities in science are more likely to be minimized and delayed.

  17. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, Karen; Van der Gang, Ineke

    2007-01-01

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is t

  18. Overview of the Threat Posed by Insiders to Critical Assets

    Science.gov (United States)

    2013-08-08

    cyber threats. Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie Mellon University...Concealing Indicators and Violations S O B4 concealing rule violations due to organization sanctions O O O Addiction to Financial Gain Initial Satisfaction

  19. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  20. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, Karen; Van der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  1. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  2. Anxiety and threat perception abnormalities in normal children.

    NARCIS (Netherlands)

    P. Muris; M. Kindt; S. Boegels; H. Merckelbach; B, Gadet; V. Moulaert

    2000-01-01

    Examined the relationship between childhood anxiety and threat perception abnormalities. 105 children (aged 8-13 yrs) were exposed to stories reflecting 3 types of anxiety: social anxiety, separation anxiety, and generalized anxiety. From children's reactions to the stories, a number of threat perce

  3. A Stereotype Threat Account of Boys' Academic Underachievement

    Science.gov (United States)

    Hartley, Bonny L.; Sutton, Robbie M.

    2013-01-01

    Three studies examined the role of stereotype threat in boys' academic underachievement. Study 1 (children aged 4-10, n = 238) showed that girls from age 4 years and boys from age 7 years believed, and thought adults believed, that boys are academically inferior to girls. Study 2 manipulated stereotype threat, informing children aged…

  4. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  5. Of guns and snakes: testing a modern threat superiority effect.

    Science.gov (United States)

    Subra, Baptiste; Muller, Dominique; Fourgassie, Lisa; Chauvin, Alan; Alexopoulos, Theodore

    2017-02-03

    Previous studies suggest that ancient (i.e. evolutionary-based) threats capture attention because human beings possess an inborn module shaped by evolution and dedicated to their detection. An alternative account proposes that a key feature predicting whether a stimulus will capture attention is its relevance rather than its ontology (i.e. phylogenetic or ontogenetic threat). Within this framework, the present research deals with the attentional capture by threats commonly encountered in our urban environment. In two experiments, we investigate the attentional capture by modern threats (i.e. weapons). In Experiment 1, participants responded to a target preceded by a cue, which was a weapon or a non-threatening stimulus. We found a larger cuing effect (faster reaction times to valid vs. invalid trials) with weapons as compared with non-threatening cues. In Experiment 2, modern (e.g. weapons) and ancient threats (e.g. snakes) were pitted against one another as cues to determine which ones preferentially capture attention. Crucially, participants were faster to detect a target preceded by a modern as opposed to an ancient threat, providing initial evidence for a superiority of modern threat. Overall, the present findings appear more consistent with a relevance-based explanation rather than an evolutionary-based explanation of threat detection.

  6. The Post-Afghanistan IED Threat Assessment: Executive Summary

    Science.gov (United States)

    2013-05-01

    ponents and enhance the IED threat. To assess the impact of innova - tion, we analyzed three issues: 1. The development of IEDs in OIF and OEF; 2...short, the IED threat observed in Iraq, Afghanistan, and the home- land in recent years will likely persist regardless of technical innova - tions and

  7. Animal Botulism Outcomes in the AniBioThreat Project

    DEFF Research Database (Denmark)

    Woudstra, Cédric; Tevell Åberg, Annica; Skarin, Hanna

    2013-01-01

    bioterrorism threats. A detection portfolio with screening methods for botulism agents and incidents was needed to improve tracking and tracing of accidental and deliberate contamination of the feed and food chain with botulinum neurotoxins and other Clostridia. The complexity of this threat required acquiring...

  8. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  9. Protected Areas in Tropical Africa: Assessing Threats and Conservation Activities

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M.; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A.; Davenport, Tim R. B.; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A.; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C.; Holbech, Lars H.; Huijbregts, Bas; Kühl, Hjalmar S.; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K.; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G.; Petre, Charles-Albert; Rainey, Hugo J.; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M.; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration. PMID:25469888

  10. Threats and protection for electronically-steered array radars

    NARCIS (Netherlands)

    Janssen, J.P.B.; Monni, S.; Maas, A.P.M.; Vliet, F.E. van

    2008-01-01

    Front-end power overload protection is a vital issue in any electro-magnetic sensor. The issues around active electronically-steered arrays are more recent and pose new threats. Different categories of threats can damage the sensitive electronics in the phased-array radar, like hostile high power

  11. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  12. An examination of stereotype threat effects on girls' mathematics performance.

    Science.gov (United States)

    Ganley, Colleen M; Mingle, Leigh A; Ryan, Allison M; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-10-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In a series of 3 studies, with a total sample of 931 students, we investigated stereotype threat effects during childhood and adolescence. Three activation methods were used, ranging from implicit to explicit. Across studies, we found no evidence that the mathematics performance of school-age girls was impacted by stereotype threat. In 2 of the studies, there were gender differences on the mathematics assessment regardless of whether stereotype threat was activated. Potential reasons for these findings are discussed, including the possibility that stereotype threat effects only occur in very specific circumstances or that they are in fact occurring all the time. We also address the possibility that the literature regarding stereotype threat in children is subject to publication bias.

  13. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  14. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider...

  15. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, Karen; Van der Gang, Ineke

    2007-01-01

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is t

  16. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  17. Threats and protection for electronically-steered array radars

    NARCIS (Netherlands)

    Janssen, J.P.B.; Monni, S.; Maas, A.P.M.; Vliet, F.E. van

    2008-01-01

    Front-end power overload protection is a vital issue in any electro-magnetic sensor. The issues around active electronically-steered arrays are more recent and pose new threats. Different categories of threats can damage the sensitive electronics in the phased-array radar, like hostile high power el

  18. Asymmetric Threat Assessment Using Electro-Optical Image Systems

    NARCIS (Netherlands)

    Schwering, P.B.W.; Schutte, K.

    2010-01-01

    Asymmetric threat assessment from military platforms, including early detection and classification by electro-optical means, is a complicated matter. These threats can be for instance explosives-packed rubber boats, minecarrying swimmers and divers in a marine environment or terrorists, improvised e

  19. 41 CFR 60-300.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  20. 41 CFR 60-250.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  1. Coping with threats of terrorism: a protocol for group intervention.

    Science.gov (United States)

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  2. A Tale of Two Threats: Social Anxiety and Attention to Social Threat as a Function of Social Exclusion and Non-Exclusion Threats.

    Science.gov (United States)

    Buckner, Julia D; Dewall, C Nathan; Schmidt, Norman B; Maner, Jon K

    2010-10-01

    To attain and maintain social acceptance, people may attend to cues of possible social rejection or exclusion. Attention to such cues can be influenced by social anxiety. Two competing theories address social anxiety and attention: hypervigilance to versus avoidance of negative social cues. We propose a synthesis of these models such that, in the absence of social exclusion, socially anxious people may be hypervigilant to negative social cues. However, after experiencing social exclusion, they may avoid negative cues in favor of cues signaling social acceptance. Eyetracking was used to examine attention to negative, happy, and neutral faces after social exclusion threat or a non-exclusion threat (N = 27, 69.2% female). Fear of negative evaluation, a core component of social anxiety, was assessed using the Brief Fear of Negative Evaluation (BFNE) scale (Leary 1983). Among individuals with high BFNE, non-exclusion threat elicited greater attention toward negative faces than did social exclusion threat. However, social exclusion threat relative to non-exclusion threat was related to greater attention to positive faces among those with high BFNE. These effects were not observed among those with low BFNE. Thus, data provide preliminary support for a synthesized model.

  3. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat.

  4. Relationships among attention networks and physiological responding to threat.

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A; Shankman, Stewart A

    2017-02-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat - related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention - alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Personality and defensive reactions: fear, trait anxiety, and threat magnification.

    Science.gov (United States)

    Perkins, Adam M; Cooper, Andrew; Abdelall, Maura; Smillie, Luke D; Corr, Philip J

    2010-06-01

    The revised Reinforcement Sensitivity Theory (rRST) of personality (Gray & McNaughton, 2000) maintains that trait individual differences in the operation of defensive systems relate to facets of human personality, most notably anxiety and fear. We investigated this theory in 2 separate studies (total N=270) using a threat scenario research strategy (Blanchard, Hynd, Minke, Minemoto, & Blanchard, 2001). Consistent with rRST, results showed that individuals with high fear questionnaire scores tended to select defensive responses entailing orientation away from threat (e.g., run away) and that fear-prone individuals also tended to perceive threats as magnified. The extent of this threat magnification mediated the positive association observed between fear and orientation away from threat. Overall, results suggest that interindividual variance in defensive reactions is associated with a variety of existing personality constructs but that further research is required to determine the precise relationship between personality and defensive reactions.

  6. CHIKUNGUNYA - A SERIOUS THREAT FOR PUBLIC HEALTH.

    Science.gov (United States)

    Hrnjaković Cvjetković, Ivana B; Cvjetković, Dejan; Patić, Aleksandra; Nikolić, Nataša; Stefan Mikić, Sandra; Milošević, Vesna

    2015-01-01

    Chikungunya is a contagious disease caused by Chikungunya virus, an arbovirus from the Togaviridae family. This infection is mostly spread by mosquitoes from the genus Aedes, especially Aedes albopiclus, which have spread from Asia to America and Europe including some countries surrounding Serbia. EPIDEMIOLOGIC FEATURES: The outbreak of epidemics has been reported in Philippines, Sumatra, Java, Indonesia, West Africa region (from Senegal to Cameroon), Congo, Nigeria, Angola, Uganda, Guinea, Malawi, Central African Republic, Burundi, South Africa and India. At the beginning of the 21st century, large outbreaks were recorded on the island of Réunion. During 2006, 1.400.000 cases of chikungunya infection were recorded in India. Local transmission of infection in continental Europe was reported from Northeast Italy (254 suspected and 78 laboratory confirmed cases in Emilia-Romagna region) and France (two cases in 2010). From December 2013 to June 2014, 5.294 confirmed cases and more than 180.000 suspected cases of chikungunya were reported in the Caribbean. The disease presents suddenly with fever, rush and arthralgia. In general, chikungunya is a mild self - limited disease. Less often, it may be presented with signs of meningoencephalitis or fulminant hepatitis, sometimes with fatal outcome. Fast developing international traffic and booming tourism as well as the vector spreading from its homeland make chikungunya a real threat to our country.

  7. Superluminous Supernovae: No Threat from Eta Carinae

    Science.gov (United States)

    Thomas, Brian; Melott, A. L.; Fields, B. D.; Anthony-Twarog, B. J.

    2008-05-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of 1044 Joules. It was proposed that the progenitor may have been a massive evolved star similar to η Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. η Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, η Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over 104 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous” for other reasons. However, due to reddening and extinction by the interstellar medium, η Carinae is unlikely to trigger such effects to any significant degree.

  8. Superluminous supernovae: No threat from Eta Carinae

    CERN Document Server

    Thomas, Brian C; Fields, Brian D; Anthony-Twarog, Barbara J

    2007-01-01

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to Eta Carinae, which resides in our own galaxy at a (poorly determined) distance of ~2.5 kpc. Eta Carinae appears ready to detonate, and in fact had an outburst in 1843. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma Ray Burst oriented toward the Earth, Eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possib...

  9. Ebola Virus ─ A Global Threat

    Directory of Open Access Journals (Sweden)

    Mejbah Uddin Ahmed

    2015-01-01

    Full Text Available Ebola virus is a filamentous, enveloped, non-segmented, single-stranded, negative-sense RNA virus. It belongs to the Filoviridae and was first recognized near the Ebola River valley in Zaire in 1976. Since then most of the outbreaks have occurred to both human and nonhuman primates in sub-Saharan Africa. Ebola virus causes highly fatal hemorrhagic fever in human and nonhuman primates. In addition to hemorrhagic fever, it could be used as a bioterrorism agent. Although its natural reservoir is yet to be proven, current data suggest that fruit bats are the possibility. Infection has also been documented through the handling of infected chimpanzees, gorillas, monkeys, forest antelope and porcupines. Human infection is caused through close contact with the blood, secretion, organ or other body fluids of infected animal. Human-to-human transmission is also possible. Ebola virus infections are characterized by immune suppression and a systemic inflammatory response that causes impairment of the vascular, coagulation, and immune systems, leading to multiorgan failure and shock. The virus constitutes an important public health threat in Africa and also worldwide as no effective treatment or vaccine is available till now

  10. The nuclear threat; La menace nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, Bruno

    2011-01-26

    For a long time, a small group of big powers has been the only holder of nuclear weapons (US, USSR, Great Britain, France and China). Since then, new weapons have come out on the geopolitical scene: Israel, India, Pakistan, and some others remain uncertain and generate a worrying atmosphere (North Korea, Iran..). But what is the real risk with nuclear proliferation? Should we dread about it? Is nuclear terrorism a real threat? What are the political stakes of nuclear weapons? Is disarmament a real solution? These are some of the questions that the author answers in a precise and clear manner in this book. Contents: 1 - from monopoly to proliferation: who owns nuclear weapons today, why is it so coveted, is it easy to make one?; 2 - the newcomers: what do we really know about the Iranian nuclear programme, Iran and North Korea: between negotiation and confrontation; 3 - international control and regulation: do we have reliable information, how do we know what we know, Iraq: was there a 'lie' somewhere, who are the states who have renounced nuclear weapons?; 4 - the future: is there still a nuclear warfare risk, what if Pakistani weapons fall into islamic hands, is nuclear terrorism a fantasy or a real risk?

  11. Chikungunya - a serious threat for public health

    Directory of Open Access Journals (Sweden)

    Hrnjaković-Cvjetković Ivana B.

    2015-01-01

    Full Text Available Introduction. Chikungunya is a contagious disease caused by Chikungunya virus, an arbovirus from the Togaviridae family. This infection is mostly spread by mosquitoes from the genus Aedes, especially Aedes albopictus, which have spread from Asia to America and Europe including some countries surrounding Serbia. Epidemiologic Features. The outbreak of epidemics has been reported in Philippines, Sumatra, Java, Indonesia, West Africa region (from Senegal to Cameroon, Congo, Nigeria, Angola, Uganda, Guinea, Malawi, Central African Republic, Burundi, South Africa and India. At the beginning of the 21st century, large outbreaks were recorded on the island of Réunion. During 2006, 1.400.000 cases of chikungunya infection were recorded in India. Local transmission of infection in continental Europe was reported from Northeast Italy (254 suspected and 78 laboratory confirmed cases in Emilia-Romagna region and France (two cases in 2010. From December 2013 to June 2014, 5.294 confirmed cases and more than 180.000 suspected cases of chikungunya were reported in the Caribbean. Clinical Findings. The disease presents suddenly with fever, rush and arthralgia. In general, chikungunya is a mild self - limited disease. Less often, it may be presented with signs of meningoencephalitis or fulminant hepatitis, sometimes with fatal outcome. Conclusion. Fast developing international traffic and booming tourism as well as the vector spreading from its homeland make chikungunya a real threat to our country. [Projekat Ministarstva nauke Republike Srbije, br. TR31084 i br. TR43007

  12. [Chikungunya fever - A new global threat].

    Science.gov (United States)

    Montero, Antonio

    2015-08-07

    The recent onset of epidemics caused by viruses such as Ebola, Marburg, Nipah, Lassa, coronavirus, West-Nile encephalitis, Saint Louis encephalitis, human immunodeficiency virus, dengue, yellow fever and Venezuelan hemorrhagic fever alerts about the risk these agents represent for the global health. Chikungunya virus represents a new threat. Surged from remote African regions, this virus has become endemic in the Indic ocean basin, the Indian subcontinent and the southeast of Asia, causing serious epidemics in Africa, Indic Ocean Islands, Asia and Europe. Due to their epidemiological and biological features and the global presence of their vectors, chikungunya represents a serious menace and could become endemic in the Americas. Although chikungunya infection has a low mortality rate, its high attack ratio may collapse the health system during epidemics affecting a sensitive population. In this paper, we review the clinical and epidemiological features of chikungunya fever as well as the risk of its introduction into the Americas. We remark the importance of the epidemiological control and mosquitoes fighting in order to prevent this disease from being introduced into the Americas. Copyright © 2014 Elsevier España, S.L.U. All rights reserved.

  13. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  14. Pulicat Lake: A Fragile Ecosystem Under Threat

    Directory of Open Access Journals (Sweden)

    Saraswathy R.

    2016-09-01

    Full Text Available The Pulicat Lake is the second largest brackish water lake after Chilika Lake in India. The average area of the water spread is 461 sq km. During the monsoon Pulicat Lake receives freshwater through three major rivers, namely, the Swarnamukhi, the Kalangi and the Arani. The Pulicat lagoon system, which is a storehouse of rich biological resources, is under great threat because of the anthropogenic influences. The Pulicat Lake ecosystem is degraded by siltation, bar mouth dynamics, shell mining and processing and population pressure due to the resettlement of villagers from Sriharikota Island. It has been determined that the extent of the lake, including its water spread area, is decreasing. Therefore, it is essential to assess the land use / land cover changes taking place in and around Pulicat Lake using remote sensing and GIS. Studies on its sediment characteristics are also vital. The grain size content reveals that most of the sediments contain clay and silt in enormous amounts. This lake has been the prime source of a livelihood through fishing for a large section of the population living in the surrounding villages. It is the most important refuge for water birds in south India. The fishing community who lives in and around Pulicat Lake follows the Padu system for fishing in the lake. In this study, apart from studies on configuration changes and sediment analysis, a study of the flora and fauna of the lake and the socio-economic conditions of the local community were also carried out. Finally, mitigation measures for the sustainable protection of the lake’s ecosystem were identified.

  15. Pulicat Lake: A Fragile Ecosystem Under Threat

    Science.gov (United States)

    Saraswathy, R.; Pandian, Pitchai Kasinatha

    2016-09-01

    The Pulicat Lake is the second largest brackish water lake after Chilika Lake in India. The average area of the water spread is 461 sq km. During the monsoon Pulicat Lake receives freshwater through three major rivers, namely, the Swarnamukhi, the Kalangi and the Arani. The Pulicat lagoon system, which is a storehouse of rich biological resources, is under great threat because of the anthropogenic influences. The Pulicat Lake ecosystem is degraded by siltation, bar mouth dynamics, shell mining and processing and population pressure due to the resettlement of villagers from Sriharikota Island. It has been determined that the extent of the lake, including its water spread area, is decreasing. Therefore, it is essential to assess the land use / land cover changes taking place in and around Pulicat Lake using remote sensing and GIS. Studies on its sediment characteristics are also vital. The grain size content reveals that most of the sediments contain clay and silt in enormous amounts. This lake has been the prime source of a livelihood through fishing for a large section of the population living in the surrounding villages. It is the most important refuge for water birds in south India. The fishing community who lives in and around Pulicat Lake follows the Padu system for fishing in the lake. In this study, apart from studies on configuration changes and sediment analysis, a study of the flora and fauna of the lake and the socio-economic conditions of the local community were also carried out. Finally, mitigation measures for the sustainable protection of the lake's ecosystem were identified.

  16. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  17. Gender, threat/control-override delusions and violence.

    Science.gov (United States)

    Teasdale, Brent; Silver, Eric; Monahan, John

    2006-12-01

    This study brings together the threat/control-override perspective and the literature on gender and stress coping to argue that gender moderates the association between threat delusions and violence. We suggest that men are more likely than women to respond to stressors such as threat delusions with violence. We test these ideas using data from the MacArthur Violence Risk Assessment Study, a multi-wave study of post-discharge psychiatric patients. Within-person results from two-level hierarchical models support the idea that men and women cope with threat delusions differently. Specifically, we find that men are significantly more likely to engage in violence during periods when they experience threat delusions, compared with periods when they do not experience threat delusions. In contrast, women are significantly less likely to engage in violence during times when they experience threat delusions, compared with periods when they do not. We discuss these findings in light of the literature on gender and stress coping.

  18. Information fusion: telling the story (or threat narrative)

    Science.gov (United States)

    Fenstermacher, Laurie

    2014-06-01

    Today's operators face a "double whammy" - the need to process increasing amounts of information, including "Twitter-INT"1 (social information such as Facebook, You-Tube videos, blogs, Twitter) as well as the need to discern threat signatures in new security environments, including those in which the airspace is contested. To do this will require the Air Force to "fuse and leverage its vast capabilities in new ways."2 For starters, the integration of quantitative and qualitative information must be done in a way that preserves important contextual information since the goal increasingly is to identify and mitigate violence before it occurs. To do so requires a more nuanced understanding of the environment being sensed, including the human environment, ideally from the "emic" perspective; that is, from the perspective of that individual or group. This requires not only data and information that informs the understanding of how the individuals and/or groups see themselves and others (social identity) but also information on how that identity filters information in their environment which, in turn, shapes their behaviors.3 The goal is to piece together the individual and/or collective narratives regarding threat, the threat narrative, from various sources of information. Is there a threat? If so, what is it? What is motivating the threat? What is the intent of those who pose the threat and what are their capabilities and their vulnerabilities?4 This paper will describe preliminary investigations regarding the application of prototype hybrid information fusion method based on the threat narrative framework.

  19. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  20. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  1. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    threats, based on probabilistic modelling, verification, and synthesis techniques. The framework first identifies insiders’ intention to perform an inside attack, using Bayesian networks, and in a second phase computes the probability of success for an inside attack by this actor, using probabilistic......Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  2. Assessing Database and Network Threats in Traditional and Cloud Computing

    Directory of Open Access Journals (Sweden)

    Katerina Lourida

    2015-05-01

    Full Text Available Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread. Security concerns are a main reason for this and this paper studies the data and network threats posed in both traditional and cloud paradigms in an effort to assert in which areas cloud computing addresses security issues and where it does introduce new ones. This evaluation is based on Microsoft’s STRIDE threat model and discusses the stakeholders, the impact and recommendations for tackling each threat.

  3. Safe from harm: learned, instructed, and symbolic generalization pathways of human threat-avoidance.

    Directory of Open Access Journals (Sweden)

    Simon Dymond

    Full Text Available Avoidance of threatening or unpleasant events is usually an adaptive behavioural strategy. Sometimes, however, avoidance can become chronic and lead to impaired daily functioning. Excessive threat-avoidance is a central diagnostic feature of anxiety disorders, yet little is known about whether avoidance acquired in the absence of a direct history of conditioning with a fearful event differs from directly learned avoidance. In the present study, we tested whether avoidance acquired indirectly via verbal instructions and symbolic generalization result in similar levels of avoidance behaviour and threat-beliefs to avoidance acquired after direct learning. Following fear conditioning in which one conditioned stimulus was paired with shock (CS+ and another was not (CS-, participants either learned or were instructed to make a response that cancelled impending shock. Three groups were then tested with a learned CS+ and CS- (learned group, instructed CS+ (instructed group, and generalized CS+ (derived group presentations. Results showed similar levels of avoidance behaviour and threat-belief ratings about the likelihood of shock across each of the three pathways despite the different mechanisms by which they were acquired. Findings have implications for understanding the aetiology of clinical avoidance in anxiety.

  4. Social-evaluative threat and proinflammatory cytokine regulation: an experimental laboratory investigation.

    Science.gov (United States)

    Dickerson, Sally S; Gable, Shelly L; Irwin, Michael R; Aziz, Najib; Kemeny, Margaret E

    2009-10-01

    This study experimentally tested whether a stressor characterized by social-evaluative threat (SET), a context in which the self can be judged negatively by others, would elicit increases in proinflammatory cytokine activity and alter the regulation of this response. This hypothesis was derived in part from research on immunological responses to social threat in nonhuman animals. Healthy female participants were assigned to perform a speech and a math task in the presence or absence of an evaluative audience (SET or non-SET, respectively). As hypothesized, stimulated production of the proinflammatory cytokine tumor necrosis factor-alpha (TNF-alpha) increased from baseline to poststressor in the SET condition, but was unchanged in the non-SET condition. Further, the increases in TNF-alpha production correlated with participants' cognitive appraisals of being evaluated. Additionally, the ability of glucocorticoids to shut down the inflammatory response was decreased in the SET condition. These findings underscore the importance of social evaluation as a threat capable of eliciting proinflammatory cytokine activity and altering its regulation.

  5. The response of social anxiety disorder patients to threat scenarios differs from that of healthy controls

    Directory of Open Access Journals (Sweden)

    S.C.V. Mesquita

    2011-12-01

    Full Text Available The objective of the present study was to evaluate the response of social anxiety disorder (SAD patients to threat scenarios. First-choice responses to 12 scenarios describing conspecific threatening situations and mean scores of defensive direction and defensive intensity dimensions were compared between 87 SAD patients free of medication and 87 matched healthy controls (HC. A significant gender difference in the first-choice responses was identified for seven scenarios among HCs but only for two scenarios among SAD patients. A significantly higher proportion of SAD patients chose "freezing" in response to "Bush" and "Noise" scenarios, whereas the most frequent response by HCs to these scenarios was "check out". SAD males chose "run away" and "yell" more often than healthy men in response to the scenarios "Park" and "Elevator", respectively. There was a positive correlation between the severity of symptoms and both defensive direction and defensive intensity dimensions. Factorial analysis confirmed the gradient of defensive reactions derived from animal studies. SAD patients chose more urgent defensive responses to threat scenarios, seeming to perceive them as more dangerous than HCs and tending to move away from the source of threat. This is consistent with the hypothesis that the physiopathology of anxiety disorders involves brain structures responsible for defensive behaviors.

  6. National security and the impact of cyber threats on the average citizen

    CSIR Research Space (South Africa)

    Jansen van Vuuren, JC

    2010-09-01

    Full Text Available The presentation addresses national security issues and the impact of cyber threats on the average citizen. It classifies cyber threats, analysis national security and provides security tips to safeguard the individual against cyber threats....

  7. Hemoglobin derivatives

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/003371.htm Hemoglobin derivatives To use the sharing features on this page, please enable JavaScript. Hemoglobin derivatives are altered forms of hemoglobin . Hemoglobin is ...

  8. A Physicist Looks at the Terrorist Threat

    Science.gov (United States)

    Muller, Richard

    2009-05-01

    Many people fear a terrorist nuclear device, smuggled into the United States, as the one weapon that could surpass the destruction and impact of 9-11. I'll review the design of nuclear weapons, with emphasis on the kinds that can be developed by rogue nations, terrorist groups, and high-school students. Saddam, prior to the first gulf war, was developing a uranium bomb, similar to the one that destroyed Hiroshima. His calutrons (named after my university) were destroyed by the United Nations. The North Korean nuclear weapon was, like the U.S. bomb used on Nagasaki, based on plutonium. Its test released the energy equivalent of about 400 tons of TNT. Although some people have speculated that they were attempting to build a small bomb, it is far more likely that this weapon was a fizzle, with less than 1 percent of the plutonium exploded. In contrast, the energy released from burning jet fuel at the 9-11 World Trade Center attack was the equivalent of 900 tons of TNT for each plane -- over twice that of the North Korean Nuke. The damage came from the fact that gasoline delivers 10 kilocalories per gram, about 15 times the energy of an equal weight of TNT. It is this huge energy per gram that also accounts for our addiction to gasoline; per gram, high performance lithium-ion computer batteries carry only 1 percent as much energy. A dirty bomb (radiological weapon) is also unattractive to terrorists because of the threhold effect: doses less than 100 rem produce no radiation illness and will leave no dead bodies at the scene. That may be why al Qaeda instructed Jose Padilla to abandon his plans for a dirty bomb attack in Chicago, and to try a fossil fuel attack (natural gas) instead. I will argue that the biggest terrorist threat is the conventional low-tech one, such as an airplane attack on a crowded stadium using the explosive fuel that they can legally buy at the corner station.

  9. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  10. Wireless Security Threats, Vulnerabilities and Their Defense Mechanisms

    Directory of Open Access Journals (Sweden)

    Ankur Bawiskar

    2013-01-01

    Full Text Available In today’s world means of communications has changed rapidly and the main focus is on wireless communications. Communication in wireless mode has many threats. This paper discusses a brief overview of various threats to wireless networks at various layers and also presents a survey of the defense mechanisms. The main aim is to discuss attacks on MANET and their defense mechanisms. Communication in wireless mode is more challenging as compared to wired mode because of dynamically changing network topology. Wireless networks are mostly used in military applications and commercial applications. This paper also discusses internal threats and external threats. It also gives an overview of routing protocols being used in wireless networks and various attacks that take place against these routing protocols and their counter measures.

  11. Threat Prioritization Process for the Czech Security Strategy Making

    National Research Council Canada - National Science Library

    Milos Balaban; Oldrich Krulik; Vladimir Krulik; Jan Ludvik; Ludek Moravec; Antonin Rasek; Libor Stejskal

    2012-01-01

    This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic...

  12. Threats and Dangers in Activity of the Tourism Sector Enterprises

    Directory of Open Access Journals (Sweden)

    Markina Iryna А.

    2015-03-01

    Full Text Available The aim of the article is to investigate the threats and dangers that affect not only the management system of the tourism sector enterprises, but their safety as well. By analyzing, systematizing and summarizing the scientific works of many scientists, the essence of the concepts of “danger” and “threat” has been considered, and the classification of dangers and threats faced by tourism enterprises in an unstable environment has been carried out. As a result of the research there have been identified the main threats and dangers peculiar for subjects of tourist activity that occur in the process of operation of tourism enterprises and deficiencies in the management of material, information, human, financial and other resources of tourism enterprises. The main prospect for further research in this area is to identify the potential directions for minimizing the risks and threats that ensure not only the appropriate level of the tourism enterprise competitiveness, but its development as well.

  13. A developmental perspective on the Virginia Student Threat Assessment Guidelines.

    Science.gov (United States)

    Cornell, Dewey G

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed to help multidisciplinary school-based teams use a decision tree to evaluate student threats and take appropriate preventive action. A main goal of this approach is to allow school-based teams to recognize and respond to the developmental complexities of children and adolescents without resorting to the use of zero tolerance discipline. The model takes a triage approach that involves progressively more extensive assessment and intervention according to the severity of the threat and the student's intentions. The article summarizes two field test studies of the model, a study of training effects on staff attitudes and knowledge about violence prevention, and a quasi-experimental study showing that secondary schools using the model enjoyed a more positive school climate characterized by less bullying and greater willingness among students to seek help for threats of violence.

  14. Stereotype threat and hazard perception among provisional license drivers.

    Science.gov (United States)

    Skorich, Daniel P; Webb, Hugh; Stewart, Lisa; Kostyanaya, Maria; Cruwys, Tegan; McNeill, Kathy; Frain, Andrew J; Lim, Li; Jones, Benjamin M; Smyth, Lillian; O'Brien, Kerry J

    2013-05-01

    Stereotype threat refers to the negative impact a stereotype about one's group can have on one's performance in domains relevant to the stereotype. In the current paper, we explore whether the negative stereotype of provisional license drivers (PLDs) might produce stereotype threat in a driving-related hazard perception task. We manipulate threat by asking participants to self-identify as PLDs in a categorization condition, or by reminding PLD participants explicitly of the stereotype of PLDs in an explicit stereotype condition. Results reveal increments in hazard perception in the categorization condition, and decrements in hazard perception in the explicit stereotype condition. Mediation analysis reveals that hazard perception performance is fully mediated by increased effort in the categorization condition and by decreased effort in the explicit stereotype condition. We discuss these findings in terms of their implications for stereotype threat and its mediators, and for public policy that explicitly discriminates between PLDs and other driver groups.

  15. Perceived threats of individuals recovering from myocardial infarction.

    Science.gov (United States)

    Bennett, S J

    1992-01-01

    Lazarus' phenomenological theory of stress and coping provided the basis for this descriptive study of perceived threats after myocardial infarction (MI). Sixty-four post-MI subjects enrolled in phase II cardiac rehabilitation programs identified threats they had experienced in the past month. Perceived threats were defined as situations that were difficult or troubling to the individual and were described by respondents in narrative form. Degree of threat was then measured by one item on which subjects indicated the degree of concern the threatening event had caused them. Responses to the one item were analyzed and categorized into the following five areas: physical problems; medical therapy/self-care; work/physical activity; interpersonal/family; and financial. The results provide an overview of the multiple concerns individuals deal with after a major life-threatening cardiac event.

  16. Threat, prejudice and the impact of the riots in England.

    Science.gov (United States)

    de Rooij, Eline A; Goodwin, Matthew J; Pickup, Mark

    2015-05-01

    This paper examines how a major outbreak of rioting in England in 2011 impacted on prejudice toward three minority groups in Britain: Muslims, Black British and East Europeans. We test whether the riots mobilized individuals by increasing feelings of realistic and symbolic threat and ultimately prejudice, or whether the riots galvanized those already concerned about minorities, thus strengthening the relationship between threat and prejudice. We conducted three national surveys - before, after and one year on from the riots - and show that after the riots individuals were more likely to perceive threats to society's security and culture, and by extension express increased prejudice toward Black British and East European minorities. We find little evidence of a galvanizing impact. One year later, threat and prejudice had returned to pre-riots levels; however, results from a survey experiment show that priming memories of the riots can raise levels of prejudice.

  17. Fundamentalism and postmodernism: two threats to interreligious dialogue

    NARCIS (Netherlands)

    Poorthuis, Marcel

    2015-01-01

    Due to anti-institutional bias and a tendency to individualism, interreligious dialogue seems to decline in Western Europe. Two seemingly contradictory currents, fundamentalism and postmodernism constoitute in reality similar threats to interreligious dialogue

  18. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication.

  19. Collective Study On Security Threats In VOIP Networks

    National Research Council Canada - National Science Library

    Muhammad Zulkifl Hasan; Muhammad Zunnurain Hussain

    2015-01-01

    The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors...

  20. Reassessing biological threats: Implications for cooperative mitigation strategies

    Directory of Open Access Journals (Sweden)

    Catharine Grace Young

    2015-11-01

    Full Text Available Multiple factors ranging from globalization to ecosystem disruption are presenting the global community with evolving biological threats to local, national, and global security that reach beyond the realm of traditional bioweapons threats. As a result, mitigation strategies have adapted necessarily to the increased diversity of biological threats. In general, response and preparedness strategies have largely shifted from being primarily reactive to traditional biological weapons to more proactive in nature. In this review, we briefly explore biological threats through a wider aperture, to embrace a deeper appreciation of viral pathogens, antimicrobial resistance, and agricultural pathogens, and their potential to cause civil, economic, and political devastation. In addition we discuss current mitigation strategies codified by the Global Health Security Agenda and the One Health paradigm, as well as some of the available tools to assist with their sustainable implementation.

  1. The cyber threat landscape: Challenges and future research directions

    Science.gov (United States)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  2. Little Threat of Zika Spread from Rio Olympics

    Science.gov (United States)

    ... html Little Threat of Zika Spread From Rio Olympics: Study Because it's winter in Brazil, mosquito activity ... HealthDay News) -- Travelers and competitors at the 2016 Olympic Games in Brazil are not likely to contract ...

  3. Racial Threat Theory: Assessing the Evidence, Requesting Redesign

    Directory of Open Access Journals (Sweden)

    Cindy Brooks Dollar

    2014-01-01

    Full Text Available Racial threat theory was developed as a way to explain how population composition influences discriminatory social control practices and has become one of the most acknowledged frameworks for explaining racial disparity in criminal justice outcomes. This paper provides a thorough review of racial threat theory and empirical assessments of the theory and demonstrates that while scholars often cite inconsistent support for the theory, empirical discrepancies may be due to insufficient attention to the conceptual complexity of racial threat. I organize and present the following review around 4 forms of state-sanctioned control mechanisms: police expenditures, arrests, sentencing, and capital punishment. Arguing that the pervasiveness of racialization in state controls warrants continued inquiry, I provide suggestions for future scholarship that will help us develop enhanced understanding of how racial threat may be operating.

  4. Getting ahead of the threat: Aviation and cyber security

    National Research Council Canada - National Science Library

    Emilio Iasiello

    2013-01-01

    ... to identify and mitigate the physical threat to aviation. Many significant accomplishments have resulted from this effort, including the creation of the Transportation Security Administration to oversee US public transportation...

  5. Stereotype threat and arousal: effects on women's math performance.

    Science.gov (United States)

    O'Brien, Laurie T; Crandall, Christian S

    2003-06-01

    Theories of arousal suggest that arousal should decrease performance on difficult tasks and increase performance on easy tasks. An experiment tested the hypothesis that the effects of stereotype threat on performance are due to heightened arousal. The authors hypothesized that telling participants that a math test they are about to take is known to have gender differences would cause stereotype threat in women but not in men. In the experiment, each participant took two tests--a difficult math test and an easy math test. Compared to women in a "no differences" condition, women in the "gender differences" condition scored better on the easy math test and worse on the difficult math test. Men's performance was unaffected by the manipulation. These data are consistent with an arousal-based explanation of stereotype threat effects. Data were inconsistent with expectancy, evaluation apprehension, and persistence explanations of the stereotype threat phenomenon.

  6. New Frontiers of Network Security: The Threat Within

    CERN Document Server

    Sanyal, Sugata; Gupta, Amit

    2010-01-01

    Nearly 70% of information security threats originate from inside an organization. Opportunities for insider threats have been increasing at an alarming rate with the latest trends of mobility (portable devices like Laptop, smart phones etc.), ubiquitous connectivity (wireless or through 3G connectivity) and this trend increases as more and more web-based applications are made available over the Internet. Insider threats are generally caused by current or ex-employees, contractors or partners, who have authorized access to the organization's network and servers. Theft of confidential information is often for either material gain or for willful damage. Easy availability of hacking tools on the Internet, USB devices and wireless connectivity provide for easy break-ins. The net result is losses worth millions of dollars in terms of IP theft, leakage of customer / individual information, etc. This paper presents an understanding of Insider threats, attackers and their motives and suggests mitigation techniques at ...

  7. Threats and opportunities for post-closure development in dolomitic ...

    African Journals Online (AJOL)

    Threats and opportunities for post-closure development in dolomitic ... in the form of sinkholes and widespread radioactive pollution exacerbate such fears. ... developments such as aquaculture, agriculture and different forms of tourism relating ...

  8. TERRORISM AS THE MAIN THREAT TO THE STATE DEFENCE

    Directory of Open Access Journals (Sweden)

    T. V. VERBITSKAYA

    2015-01-01

    Full Text Available The article focuses on the analysis of terrorism as the main threat to the state defense. One of the main problems in combating this threat is lack of the uniformity in understanding and definition of terrorism on national and international level, what complicates the search of the means reducing this threat. In addition, because of possible use of armed forces against this threat, the absence of understanding of this term as the basis for introducing relevant legal regimes may lead to violation of human rights. The article presents definitions of terrorism from normative acts of foreign countries and sources of international law. It traces the historical development of the understanding of terrorism in different countries in terms of the evolution of the content of this term.

  9. How Moral Threat Shapes Laypersons' Engagement With Science.

    Science.gov (United States)

    Bender, Jens; Rothmund, Tobias; Nauroth, Peter; Gollwitzer, Mario

    2016-12-01

    Laypersons' engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons' engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people's self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons' evaluation of science above and beyond value salience.

  10. Impaired threat prioritisation after selective bilateral amygdala lesions.

    Science.gov (United States)

    Bach, Dominik R; Hurlemann, Rene; Dolan, Raymond J

    2015-02-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach-Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. An Ontology for Insider Threat Indicators Development and Applications

    Science.gov (United States)

    2014-11-01

    J. A. Blake, D. Botstein, H. Butler, J. M. Cherry, et al., " Gene Ontology : tool for the unification of biology," Nature genetics, vol. 25, pp. 25-29...An Ontology for Insider Threat Indicators Development and Applications Daniel L. Costa, Matthew L. Collins, Samuel J. Perl, Michael J. Albrethsen...cert.org Abstract—We describe our ongoing development of an insider threat indicator ontology . Our ontology is intended to serve as a standardized

  12. S5: New Threats to Cyber-Security

    Science.gov (United States)

    2014-10-29

    2014 Carnegie Mellon University 29-Oct-2014 S5 : New Threats to Cyber-Security Software Engineering Institute Carnegie Mellon University...unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 2 Mark Sherman S5 : New Threats to Cyber-Security © 2014 Carnegie...Institute at permission@sei.cmu.edu. Carnegie Mellon® and CERT® are registered marks of Carnegie Mellon University. DM-0001805 3 Mark Sherman S5

  13. Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

    OpenAIRE

    Nunes, Eric; Diab, Ahmad; Gunn, Andrew; Marin, Ericsson; Mishra, Vineet; Paliath, Vivin; Robertson, John; Shakarian, Jana; Thart, Amanda; Shakarian, Paulo

    2016-01-01

    In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this sys...

  14. Dubai and the United Arab Emirates : security threats.

    OpenAIRE

    Christopher M. Davidson

    2009-01-01

    The United Arab Emirates’ (UAE) wealthiest emirate, Abu Dhabi, has built up the UAE Armed Forces in recent decades by procuring some of the finest military hardware available. This has provided the UAE with a strong defence shield and has undoubtedly reduced the threat of foreign invasion. However, the UAE’s hard security capabilities are either insufficient or inappropriate for countering remaining regional threats from Iran or, to a lesser extent, other Arab states. As such, ...

  15. Hizb ut-Tahrir: A Threat Behind a Legal Facade?

    Science.gov (United States)

    2006-06-01

    group intends to 9 Suha Taji-Farouki, 1996. A Fundamental Quest: Hizb al-Tahrir and the Search for...the Islamic Caliphate (London, England: Grey Seal), p. 194 (Article 11). 10 Ibid, p. 215. 11 Suha Taji-Farouki, “Islamists and the Threat of Jihad...83 Suha Taji-Farouki, “Islamists and the Threat of Jihad: Hizb al-Tahrir and Al-Muhajiroun on Israel and the Jews,” Middle Eastern Studies, Vol

  16. Best Practices and Controls for Mitigating Insider Threats

    Science.gov (United States)

    2013-08-08

    for plagiarism in academic papers, the process is virtually identical Solution: Managing The Insider Threat: What Every Organization Should Know...hundreds of actual cases of insider IT sabotage, theft of intellectual property, fraud, and espionage Managing The Insider Threat: What Every...service provider that meets or exceeds the organization’s own levels of security. •  Understand how the cloud provider protect data and other assets

  17. Policing cyber hate, cyber threat and cyber terrorism

    OpenAIRE

    Chambers-Jones, C.

    2013-01-01

    In late August 2012 the Government Forum of Incident Response and Cyber security Teams (GFIRST) gathered in Atlanta to discuss cyber threats and how new realities are emerging and how new forms of regulation are needed. At the same time Policing cyber hate, cyber threat and cyber terrorism was published. This comprehensive book brings together a divergent problem and tackles each with a candid exploration. The book has ten chapters and covers aspects such as extortion via the internet, the ps...

  18. Intergovernmental Unity of Effort in Support of Biological Threat Prevention

    Science.gov (United States)

    2013-09-01

    96  xii THIS PAGE INTENTIONALLY LEFT BLANK xiii LIST OF TABLES Table 1.  Health Security Policy Biological Threat...level. Retrieved September 18, 2012, from http://ec.europa.eu/health/ph_threats/com/preparedness/docs/HEOF_en.pdf. Europa a Constitution for Europe...home.html. Europa Summaries of EU Legislation (2008, September). The fight against bioterrorism (communication). Retrieved January 15, 2011, from

  19. Physician office readiness for managing Internet security threats.

    Science.gov (United States)

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  20. Attentional bias to threat: a perceptual accuracy approach.

    Science.gov (United States)

    Van Damme, Stefaan; Crombez, Geert; Notebaert, Lies

    2008-12-01

    To investigate attentional bias to threatening information, the authors propose a new version of the spatial cueing paradigm in which the focus is on perceptual accuracy instead of response speed. In two experiments, healthy volunteers made unspeeded discriminations between three visual targets presented left or right. Each target was preceded by a visual cue (colored rectangle) at either the same (valid) or opposite (invalid) location. By means of differential classical conditioning with aversive white noise, a threat cue and a control cue were created. Analyses of error rates showed that cueing effects (lower proportion of errors in valid trials relative to invalid trials) were more pronounced in threat trials than in neutral trials. This threat-related bias was particularly because of threat cues reducing accuracy in invalid trials, indicating difficulty disengaging attention from threatening information. Engagement of attention was not affected by threat, as threat cues did not facilitate the processing of targets in valid trials. The findings are discussed in light of the strengths and limitations of spatial cueing tasks.

  1. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  2. Policing of reproduction by hidden threats in a cooperative mammal.

    Science.gov (United States)

    Cant, Michael A; Nichols, Hazel J; Johnstone, Rufus A; Hodge, Sarah J

    2014-01-07

    The evolution of cooperation in animal and human societies is associated with mechanisms to suppress individual selfishness. In insect societies, queens and workers enforce cooperation by "policing" selfish reproduction by workers. Insect policing typically takes the form of damage limitation after individuals have carried out selfish acts (such as laying eggs). In contrast, human policing is based on the use of threats that deter individuals from acting selfishly in the first place, minimizing the need for damage limitation. Policing by threat could in principle be used to enforce reproductive suppression in animal societies, but testing this idea requires an experimental approach to simulate reproductive transgression and provoke out-of-equilibrium behavior. We carried out an experiment of this kind on a wild population of cooperatively breeding banded mongooses (Mungos mungo) in Uganda. In this species, each group contains multiple female breeders that give birth to a communal litter, usually on the same day. In a 7-y experiment we used contraceptive injections to manipulate the distribution of maternity within groups, triggering hidden threats of infanticide. Our data suggest that older, socially dominant females use the threat of infanticide to deter selfish reproduction by younger females, but that females can escape the threat of infanticide by synchronizing birth to the same day as older females. Our study shows that reproduction in animal societies can be profoundly influenced by threats that remain hidden until they are triggered experimentally. Coercion may thus extend well beyond the systems in which acts of infanticide are common.

  3. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    Energy Technology Data Exchange (ETDEWEB)

    Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

    2010-01-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  4. Neuroimaging the temporal dynamics of human avoidance to sustained threat.

    Science.gov (United States)

    Schlund, Michael W; Hudgins, Caleb D; Magee, Sandy; Dymond, Simon

    2013-11-15

    Many forms of human psychopathology are characterized by sustained negative emotional responses to threat and chronic behavioral avoidance, implicating avoidance as a potential transdiagnostic factor. Evidence from both nonhuman neurophysiological and human neuroimaging studies suggests a distributed frontal-limbic-striatal brain network supports avoidance. However, our understanding of the temporal dynamics of the network to sustained threat that prompts sustained avoidance is limited. To address this issue, 17 adults were given extensive training on a modified free-operant avoidance task in which button pressing avoided money loss during a sustained threat period. Subsequently, subjects underwent functional magnetic resonance imaging while completing the avoidance task. In our regions of interest, we observed phasic, rather than sustained, activation during sustained threat in dorsolateral and inferior frontal regions, anterior and dorsal cingulate, ventral striatum and regions associated with emotion, including the amygdala, insula, substantia nigra and bed nucleus of the stria terminalis complex. Moreover, trait levels of experiential avoidance were negatively correlated with insula, hippocampal and amygdala activation. These findings suggest knowledge that one can consistently avoid aversive outcomes is not associated with decreased threat-related responses and that individuals with greater experiential avoidance exhibit reduced reactivity to initial threat. Implications for understanding brain mechanisms supporting human avoidance and psychological theories of avoidance are discussed.

  5. A Bayesian belief network of threat anticipation and terrorist motivations

    Science.gov (United States)

    Olama, Mohammed M.; Allgood, Glenn O.; Davenport, Kristen M.; Schryver, Jack C.

    2010-04-01

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  6. Non fisheries threats - Risk, status and trends of non-fisheries threats in the California Current to groundfish species

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — We are calculating the risk of focal groundfish species to non-fisheries related threats (e.g. shipping activity, inorganic pollution) and comparing the relative...

  7. Financial Derivatives

    DEFF Research Database (Denmark)

    Wigan, Duncan

    2013-01-01

    Contemporary derivatives mark the development of capital and constitute a novel form of ownership. By reconfiguring the temporal, spatial and legal character of ownership derivatives present a substantive challenge to the tax collecting state. While fiscal systems are nationally bounded and inheren...... and inherently static, capital itself is unprecedentedly mobile, fluid and fungible. As such derivatives raise the specter of ‘financial weapons of mass destruction’....

  8. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging.

  9. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species.

  10. Quantifying human response capabilities towards tsunami threats at community level

    Science.gov (United States)

    Post, J.; Mück, M.; Zosseder, K.; Wegscheider, S.; Taubenböck, H.; Strunz, G.; Muhari, A.; Anwar, H. Z.; Birkmann, J.; Gebert, N.

    2009-04-01

    Decision makers at the community level need detailed information on tsunami risks in their area. Knowledge on potential hazard impact, exposed elements such as people, critical facilities and lifelines, people's coping capacity and recovery potential are crucial to plan precautionary measures for adaptation and to mitigate potential impacts of tsunamis on society and the environment. A crucial point within a people-centred tsunami risk assessment is to quantify the human response capabilities towards tsunami threats. Based on this quantification and spatial representation in maps tsunami affected and safe areas, difficult-to-evacuate areas, evacuation target points and evacuation routes can be assigned and used as an important contribution to e.g. community level evacuation planning. Major component in the quantification of human response capabilities towards tsunami impacts is the factor time. The human response capabilities depend on the estimated time of arrival (ETA) of a tsunami, the time until technical or natural warning signs (ToNW) can be received, the reaction time (RT) of the population (human understanding of a tsunami warning and the decision to take appropriate action), the evacuation time (ET, time people need to reach a safe area) and the actual available response time (RsT = ETA - ToNW - RT). If RsT is larger than ET, people in the respective areas are able to reach a safe area and rescue themselves. Critical areas possess RsT values equal or even smaller ET and hence people whin these areas will be directly affected by a tsunami. Quantifying the factor time is challenging and an attempt to this is presented here. The ETA can be derived by analyzing pre-computed tsunami scenarios for a respective area. For ToNW we assume that the early warning center is able to fulfil the Indonesian presidential decree to issue a warning within 5 minutes. RT is difficult as here human intrinsic factors as educational level, believe, tsunami knowledge and experience

  11. A World 2010: A Decline of Superpower Influence.

    Science.gov (United States)

    1986-07-10

    among nations, although some % industrial countries will still rely on traditional embargoes and protectionism . Information to accelerate economic...Within the new order of nations, regional increases of international trade can be * expected to include embargoes, trade wars, and protectionism . New... isolationism ; it is thoroughly enmeshed in world activities politically, sociologically, economically, and especially scientifically and technologically

  12. International Leadership after the Demise of the Last Superpower

    DEFF Research Database (Denmark)

    Wæver, Ole

    2017-01-01

    Who will take care of what global challenges – and why not? Does the international system have an emerging pattern of leadership, or does system structure either preclude leadership as such or prevent prediction of any systematic form hereof? It is widely agreed among scholars and practitioners...... alike that the ‘structure’ of the international system in some broad sense, and most often with an emphasis on the distribution of power (polarity), circumscribes the conditions for cooperation and joint action. So this paper will first discuss the proper designation of the emerging structure, then what...... implications this has for conflict and cooperation and thirdly on this basis: who will take what kinds of leadership roles especially in relation to the management and confrontation of global challenges and dangers? A number of diagnoses of the current and emerging structure appear to be largely in synch...

  13. Brain Mechanisms of Social Threat Effects on Working Memory.

    Science.gov (United States)

    van Ast, V A; Spicer, J; Smith, E E; Schmer-Galunder, S; Liberzon, I; Abelson, J L; Wager, T D

    2016-02-01

    Social threat can have adverse effects on cognitive performance, but the brain mechanisms underlying its effects are poorly understood. We investigated the effects of social evaluative threat on working memory (WM), a core component of many important cognitive capabilities. Social threat impaired WM performance during an N-back task and produced widespread reductions in activation in lateral prefrontal cortex and intraparietal sulcus (IPS), among other regions. In addition, activity in frontal and parietal regions predicted WM performance, and mediation analyses identified regions in the bilateral IPS that mediated the performance-impairing effects of social threat. Social threat also decreased connectivity between the IPS and dorsolateral prefrontal cortex, while increasing connectivity between the IPS and the ventromedial prefrontal cortex, a region strongly implicated in the generation of autonomic and emotional responses. Finally, cortisol response to the stressor did not mediate WM impairment but was rather associated with protective effects. These results provide a basis for understanding interactions between social and cognitive processes at a neural systems level.

  14. The Basolateral Amygdalae and Frontotemporal Network Functions for Threat Perception

    Science.gov (United States)

    Hortensius, Ruud; Terburg, David; Morgan, Barak; Stein, Dan J.; van Honk, Jack

    2017-01-01

    Abstract Although the amygdalae play a central role in threat perception and reactions, the direct contributions of the amygdalae to specific aspects of threat perception, from ambiguity resolution to reflexive or deliberate action, remain ill understood in humans. Animal studies show that a detailed understanding requires a focus on the different subnuclei, which is not yet achieved in human research. Given the limits of human imaging methods, the crucial contribution needs to come from individuals with exclusive and selective amygdalae lesions. The current study investigated the role of the basolateral amygdalae and their connection with associated frontal and temporal networks in the automatic perception of threat. Functional activation and connectivity of five individuals with Urbach–Wiethe disease with focal basolateral amygdalae damage and 12 matched controls were measured with functional MRI while they attended to the facial expression of a threatening face–body compound stimuli. Basolateral amygdalae damage was associated with decreased activation in the temporal pole but increased activity in the ventral and dorsal medial prefrontal and medial orbitofrontal cortex. This dissociation between the prefrontal and temporal networks was also present in the connectivity maps. Our results contribute to a dynamic, multirole, subnuclei-based perspective on the involvement of the amygdalae in fear perception. Damage to the basolateral amygdalae decreases activity in the temporal network while increasing activity in the frontal network, thereby potentially triggering a switch from resolving ambiguity to dysfunctional threat signaling and regulation, resulting in hypersensitivity to threat. PMID:28374005

  15. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  16. Credibility of Deterrence Threats- A Social Psychological Perspective

    Directory of Open Access Journals (Sweden)

    Ahmed Sheikh

    1972-01-01

    Full Text Available In view of the prevailing ambiguities, impressionistic beliefs and perhaps distortions that shroud the contemporary deterrence theory and the various strategies of deterrence associated with it, this paper attempts to break fresh grounds, particularly in the area of threat credibility. By focusing the level of analysis somewhere between the individual personality and social structures and thus using a social psychological approach, it attempts to explain the behaviour (as related to the credibility of deterrence threats of national decision-makers, during acute international crises. After analyzing and re-evaluating the relevant literature in the field, the paper presents a functional model of threat perception involving two opponents. The model takes into account such variables as: (1 basic human needs; (2 role of reference groups; (3credibility and specificity of international threats; (4 leaders intentions and predispositions; and (5 self-perception of threats. The major conclusions of the paper are: (1 no communicative means for influencing human behaviour are uniformally effective because of the problem of distortion of perception; evidence suggests in most cases rationality under high fear is impaired because fear tends to reduce the range of clues which are available for the consideration of the threatened party.

  17. Threat effects on human oculo-motor function.

    Science.gov (United States)

    Naranjo, E N; Cleworth, T W; Allum, J H J; Inglis, J T; Lea, J; Westerberg, B D; Carpenter, M G

    2017-09-17

    Neuro-anatomical evidence supports the potential for threat-related factors, such as fear, anxiety and vigilance, to influence brainstem motor nuclei controlling eye movements, as well as the vestibular nuclei. However, little is known about how threat influences human ocular responses, such as eye saccades (ES), smooth pursuit eye tracking (SP), and optokinetic nystagmus (OKN), and whether these responses can be facilitated above normal baseline levels with a natural source of threat. This study was designed to examine the effects of height-induced postural threat on the gain of ES, SP and OKN responses in humans. Twenty participants stood at two different surface heights while performing ES (ranging from 8° to 45° from center), SP (15, 20, 30°/s) and OKN (15, 30, 60°/s) responses in the horizontal plane. Height did not significantly increase the slope of the relationship between ES peak velocity and initial amplitude, or the gain of ES amplitude. In contrast height significantly increased SP and OKN gain. Significant correlations were found between changes in physiological arousal and OKN gain. Observations of changes with height in OKN and SP support neuro-anatomical evidence of threat-related mechanisms influencing both oculo-motor nuclei and vestibular reflex pathways. Although further study is warranted, the findings suggest that potential influences of fear, anxiety and arousal/alertness should be accounted for, or controlled, during clinical vestibular and oculo-motor testing. Copyright © 2017 IBRO. Published by Elsevier Ltd. All rights reserved.

  18. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity.

  19. An Expert System For Multispectral Threat Assessment And Response

    Science.gov (United States)

    Steinberg, Alan N.

    1987-05-01

    A concept has been defined for an automatic system to manage the self-defense of a combat aircraft. Distinctive new features of this concept include: a. the flexible prioritization of tasks and coordinated use of sensor, countermeasures, flight systems and weapons assets by means of an automated planning function; b. the integration of state-of-the-art data fusion algorithms with event prediction processing; c. the use of advanced Artificial Intelligence tools to emulate the decision processes of tactical EW experts. Threat Assessment functions (a) estimate threat identity, lethality and intent on the basis of multi-spectral sensor data, and (b) predict the time to critical events in threat engagements (e.g., target acquisition, tracking, weapon launch, impact). Response Management functions (a) select candidate responses to reported threat situations; (b) estimate the effects of candidate actions on survival; and (c) coordinate the assignment of sensors, weapons and countermeasures with the flight plan. The system employs Finite State Models to represent current engagements and to predict subsequent events. Each state in a model is associated with a set of observable features, allowing interpretation of sensor data and adaptive use of sensor assets. Defined conditions on state transitions allow prediction of times to critical future states and are used in planning self-defensive responses, which are designed either to impede a particular state transition or to force a transition to a lower threat state.

  20. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches.

  1. Financial Derivatives

    DEFF Research Database (Denmark)

    Wigan, Duncan

    2013-01-01

    Contemporary derivatives mark the development of capital and constitute a novel form of ownership. By reconfiguring the temporal, spatial and legal character of ownership derivatives present a substantive challenge to the tax collecting state. While fiscal systems are nationally bounded...

  2. Destined to Die but Not to Wage War: How Existential Threat Can Contribute to Escalation or De-Escalation of Violent Intergroup Conflict

    Science.gov (United States)

    Jonas, Eva; Fritsche, Immo

    2013-01-01

    War means threat to people's lives. Research derived from terror management theory (TMT) illustrates that the awareness of death leads people to defend cultural ingroups and their worldviews to attain a sense of symbolic immortality and thereby buffer existential anxiety. This can result in hostile effects of mortality salience (MS), such as…

  3. Destined to Die but Not to Wage War: How Existential Threat Can Contribute to Escalation or De-Escalation of Violent Intergroup Conflict

    Science.gov (United States)

    Jonas, Eva; Fritsche, Immo

    2013-01-01

    War means threat to people's lives. Research derived from terror management theory (TMT) illustrates that the awareness of death leads people to defend cultural ingroups and their worldviews to attain a sense of symbolic immortality and thereby buffer existential anxiety. This can result in hostile effects of mortality salience (MS), such as…

  4. Civil Military Engagements Program: A Special Operations Solution to Threats Derived from Undergoverned Areas

    Science.gov (United States)

    2015-06-12

    Bangladesh . These case studies demonstrate that by working through UAPs, persistent presence, and proactively supporting national interests, the...spearheaded SOF activities in Sri Lanka and set the conditions for an increased SOF presence. Because of the groundbreaking work conducted by the CA Team...NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army Command and General Staff College ATTN: ATZL-SWD-GD

  5. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  6. Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David; Nuclear Threats and Security Challenges

    2015-01-01

    With the dissolution of the Soviet Union the nuclear threats facing the world are constantly evolving and have grown more complex since the end of the Cold War. The diversion of complete weapon systems or nuclear material to rogue nations and terrorist organizations has increased. The events of the past years have proved the necessity to reevaluate these threats on a level never before considered.  In recognition that no single country possesses all of the answers to the critical scientific, institutional and legal questions associated with combating nuclear and radiological terrorism, the NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” and this proceeding was structured to promote wide-ranging, multi-national exploration of critical technology needs and underlying scientific challenges to reducing the threat of nuclear/radiological terrorism; to illustrate through country-specific presentations how resulting technologies were used in national programs; and to outli...

  7. Looming vulnerability to threat: a cognitive paradigm for anxiety.

    Science.gov (United States)

    Riskind, J H

    1997-08-01

    The concept that perceived threat or danger is a cognitive antecedent of anxiety is central in clinical psychology, personality psychology, and social psychology. The aim in the current article is to review this concept and present a new conception called the looming vulnerability model. Looming vulnerability is conceptualized as an important cognitive component of threat or danger that elicits anxiety, sensitizes the individual to signs of movement and threat, biases cognitive processing, and makes the anxiety more persistent and less likely to habituate. In addition, it is postulated as a principal theme that discriminates anxiety and focal fears from depression. The looming vulnerability model integrates a disparate collection of findings and integrates the conceptualization of anxiety and fear with ethological and developmental observations. The social-cognitive and evolutionary basis of the sense of looming vulnerability are discussed, as well as its roots in cognitive schemata (fear scripts), its state elicitation by several potential classes of antecedent conditions, and possible treatment implications.

  8. A vector relational data modeling approach to Insider threat intelligence

    Science.gov (United States)

    Kelly, Ryan F.; Anderson, Thomas S.

    2016-05-01

    We address the problem of detecting insider threats before they can do harm. In many cases, co-workers notice indications of suspicious activity prior to insider threat attacks. A partial solution to this problem requires an understanding of how information can better traverse the communication network between human intelligence and insider threat analysts. Our approach employs modern mobile communications technology and scale free network architecture to reduce the network distance between human sensors and analysts. In order to solve this problem, we propose a Vector Relational Data Modeling approach to integrate human "sensors," geo-location, and existing visual analytics tools. This integration problem is known to be difficult due to quadratic increases in cost associated with complex integration solutions. A scale free network integration approach using vector relational data modeling is proposed as a method for reducing network distance without increasing cost.

  9. Estimation of the threat of IEMI to complex electronic systems

    Directory of Open Access Journals (Sweden)

    R. Kanyou Nana

    2009-05-01

    Full Text Available The threat of ultra wideband (UWB sources is interesting for military issues. This paper summarizes information concerning the voltages generated from some commercially available UWB generator systems and their produced electromagnetic fields. The paper focuses on the coupling of UWB fields into electronic equipment and discusses possible modeling and measurement techniques to estimate such a threat for modern ships. An evaluation procedure for the determination of the induced voltage at the input of an electronic component is presented. This method is based on the computation of the internal electric field and the measurements on a test network, which is similar to the structure of the steering control cabling. It allows the estimation of the potential threat for the ship's electronic equipment due to the exposal to UWB emitting sources.

  10. Emotion guided threat detection: expecting guns where there are none.

    Science.gov (United States)

    Baumann, Jolie; Desteno, David

    2010-10-01

    Five experiments examine whether the ability of emotions to influence judgments of threat extends to a very basic process inherent in threat detection: object recognition. Participants experiencing different emotions were asked to make rapid judgments about whether target individuals were holding guns or neutral objects. Results across 4 experiments supported the hypothesis that anger increases the probability that neutral objects will be misidentified as ones related to violence, but not the converse. Of import, the findings demonstrate that this bias is not a simple function of the negative valence of an emotional state, but stems from specific threat-relevant cues provided by anger. Direct manipulation of participants' expectancies for encountering guns in the environment is shown not only to remove the bias among angry individuals when set to be low but also to produce a corresponding bias among neutral participants when set to be high. A 5th study demonstrates that the bias is amenable to correction given sufficient ability.

  11. Threat Assessment of Targets Based on Support Vector Machine

    Institute of Scientific and Technical Information of China (English)

    CAI Huai-ping; LIU Jing-xu; CHEN Ying-wu

    2006-01-01

    In the context of cooperative engagement of armored vehicles, the threat factors of offensive targets are analyzed, and a threat assessment (TA) model is built based on a support v.ector machine (SVM) method. The SVM-based model has some advantages over the traditional method-based models: the complex factors of threat are considered in the cooperative engagement; the shortcomings of neural networks, such as local minimum and "over fitting", are overcome to improve the generalization ability; its operation speed is high and meets the needs of real time C2 of cooperative engagement; the assessment results could be more reasonable because of its self-learning capability. The analysis and simulation indicate that the SVM method is an effective method to resolve the TA problems.

  12. Dimensions of early experience and neural development: deprivation and threat.

    Science.gov (United States)

    Sheridan, Margaret A; McLaughlin, Katie A

    2014-11-01

    Over the past decade, a growing area of research has focused on adverse childhood experiences (ACEs) and their impacts on neural and developmental outcomes. Work in the field to-date has generally conceptualized ACEs in terms of exposure to stress while overlooking the underlying dimensions of environmental experience that may distinctly impact neural development. Here, we propose a novel framework that differentiates between deprivation (absence of expected cognitive and social input) and threat (presence of a threat to one's physical integrity). We draw support for the neural basis of this distinction from studies on fear learning and sensory deprivation in animals to highlight potential mechanisms through which experiences of threat and deprivation could affect neural structure and function in humans.

  13. Existential and psychological problems connected with Threat Predicting Process

    Directory of Open Access Journals (Sweden)

    Mamcarz Piotr

    2014-01-01

    Full Text Available The aim of the article is to present a very important phenomenon affecting human integrity and homeostasis that is Threat Prediction Process. This process can be defined as “experiencing apprehension concerning results of potential/ actual dangers,” (Mamcarz, 2015 oscillating in terminological area of anxiety, fear, stress, restlessness. Moreover, it highlights a cognitive process distinctive for listed phenomenon’s. The process accompanied with technological and organization changes increases number of health problems affecting many populations. Hard work conditions; changing life style; or many social and political threats have influence on people’s quality of life that are even greater and more dangerous than physical and psychological factors, which, in turn, have much more consequences for human normal functioning. The present article is based on chosen case studies of a qualitative analysis of threat prediction process

  14. Use of modified threat reduction assessments to estimate success of conservation measures within and adjacent to Kruger National Park, South Africa.

    Science.gov (United States)

    Anthony, Brandon P

    2008-12-01

    The importance of biodiversity as natural capital for economic development and sustaining human welfare is well documented. Nevertheless, resource degradation rates and persistent deterioration of human welfare in developing countries is increasingly worrisome. Developing effective monitoring and evaluation schemes and measuring biodiversity loss continue to pose unique challenges, particularly when there is a paucity of historical data. Threat reduction assessment (TRA) has been proposed as a method to measure conservation success and as a proxy measurement of conservation impact, monitoring threats to resources rather than changes to biological parameters themselves. This tool is considered a quick, practical alternative to more cost- and time-intensive approaches, but has inherent weaknesses. I conducted TRAs to evaluate the effectiveness of Kruger National Park (KNP) and Limpopo Province, South Africa, in mitigating threats to biodiversity from 1994 to 2004 in 4 geographical areas. I calculated TRA index values in these TRAs by using the original scoring developed by Margoluis and Salafsky (2001)and a modified scoring system that assigned negative mitigation values to incorporate new or worsening threats. Threats were standardized to allow comparisons across the sites. Modified TRA index values were significantly lower than values derived from the original scoring exercise. Five of the 11 standardized threats were present in all 4 assessment areas, 2 were restricted to KNP, 2 to Limpopo Province, and 2 only to Malamulele municipality. These results indicate, first, the need to integrate negative mitigation values into TRA scoring. By including negative values, investigators will be afforded a more accurate picture of biodiversity threats and of temporal and spatial trends across sites. Where the original TRA scoring was used to measure conservation success, reevaluation of these cases with the modified scoring is recommended. Second, practitioners must

  15. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    OpenAIRE

    Laura J. Kray; Shirako, Aiwa

    2009-01-01

    This chapter explores stereotype threat in organizational contexts. Building on the understanding that stereotype threat involves concerns about confirming a negative stereotype about one’s group, we begin by elucidating the scope of potential stereotype threat effects in organizations. We first examine the ubiquity of evaluations in organizations, which are at the heart of stereotype threat. Next we specify the potential psychological consequences of stereotype threat on targeted individua...

  16. Present and potential security threats posed to civil aviation

    Directory of Open Access Journals (Sweden)

    Stanislav SZABO

    2012-06-01

    Full Text Available Aircraft presents ideal object for terrorist attack. Apart from the risks posed by possible terrorist attacks on airborne aircraft, air terrorism includes the threats to general aviation on the ground, including airports and surrounding infrastructure. Air oriented terrorism in all of its forms can undermine public confidence in the safety of air travel, which could result in negative effects for certain airlines and other firms in aviation industry due to decline in passenger travel and cargo shipment. This article is giving an overview about the redoubtable present and potential future threats posed to in-flight security, and possibilities and solutions how to mitigate the risks on acceptable level.

  17. Phishing - A Growing Threat to E-Commerce

    CERN Document Server

    Banday, M Tariq

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyloggers, malware, web Trojans, and others will be discussed. This paper also highlights the latest phishing analysis made by Anti-Phishing Working Group (APWG) and Korean Internet Security Center.

  18. Influence of security threats on tourism destination development

    Directory of Open Access Journals (Sweden)

    Kurež Bojan

    2015-01-01

    Full Text Available The aim of the paper is to analyze the modern security environment and its impact on tourism destination development. Contemporary security environment is a result of historical events affected by the elements of the contemporary safety and political environment. Ground security concepts, which dominate contemporary security environment, are pointed out and further linked to the development of the modern security threats shaping tourism destination development. We are pointing out how the major security threats influence the tourism destination development. Methodology is based on secondary analysis of literature. Several current case studies are made to support conclusions on relationship between security and tourism destination developments.

  19. Derivative Chameleons

    CERN Document Server

    Noller, Johannes

    2012-01-01

    We consider generalized chameleon models where the conformal coupling between matter and gravitational geometries is not only a function of the chameleon field \\phi, but also of its derivatives via higher order co-ordinate invariants. Specifically we consider the first such non-trivial conformal factor A(\\phi,X), where X is the canonical kinetic term for \\phi. The associated phenomenology is investigated and we show that such theories have a new generic mass-altering mechanism, potentially assisting the generation of a sufficiently large chameleon mass in dense environments. The most general effective potential is derived for such derivative chameleon setups and explicit examples are given. Interestingly this points us to the existence of a purely derivative chameleon protected by a shift symmetry for \\phi. We also discuss potential ghost-like instabilities associated with mass-lifting mechanisms and find another, mass-lowering and instability-free, branch of solutions. This suggests that, barring fine-tuning...

  20. Literature Review of Polymer Derived Ceramics

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Reuben James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-05-25

    Polymer Derived Ceramics (PDCs), also known as preceramic polymers, are valuable coating agents that are used to produce surface barriers on substrates such as stainless steel. These barriers protect against a multitude of environmental threats, and have been used since their research and development in 19772. This paper seeks to review and demonstrate the remarkable properties and versatility that PDCs have to offer, while also giving a brief overview of the processing techniques used today.

  1. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  2. Teens impulsively react rather than retreat from threat.

    Science.gov (United States)

    Dreyfuss, Michael; Caudle, Kristina; Drysdale, Andrew T; Johnston, Natalie E; Cohen, Alexandra O; Somerville, Leah H; Galván, Adriana; Tottenham, Nim; Hare, Todd A; Casey, B J

    2014-01-01

    There is a significant inflection in risk taking and criminal behavior during adolescence, but the basis for this increase remains largely unknown. An increased sensitivity to rewards has been suggested to explain these behaviors, yet juvenile offences often occur in emotionally charged situations of negative valence. How behavior is altered by changes in negative emotional processes during adolescence has received less attention than changes in positive emotional processes. The current study uses a measure of impulsivity in combination with cues that signal threat or safety to assess developmental changes in emotional responses to threat cues. We show that adolescents, especially males, impulsively react to threat cues relative to neutral ones more than adults or children, even when instructed not to respond. This adolescent-specific behavioral pattern is paralleled by enhanced activity in limbic cortical regions implicated in the detection and assignment of emotional value to inputs and in the subsequent regulation of responses to them when successfully suppressing impulsive responses to threat cues. In contrast, prefrontal control regions implicated in detecting and resolving competing responses show an adolescent-emergent pattern (i.e. greater activity in adolescents and adults relative to children) during successful suppression of a response regardless of emotion. Our findings suggest that adolescence is a period of heightened sensitivity to social and emotional cues that results in diminished regulation of behavior in their presence. © 2014 S. Karger AG, Basel.

  3. Stereotype Threat and Test Performance: A Primer for School Psychologists

    Science.gov (United States)

    Jordan, Alexander H.; Lovett, Benjamin J.

    2007-01-01

    Ethical guidelines require school psychologists to ensure that their assessment practices are nondiscriminatory, but typical discussions on this topic neglect the possible discriminatory effects of cultural stereotypes on assessment results. Recent research on "stereotype threat" shows that students' knowledge of stereotype-based negative…

  4. Having more potential raiders weakens the takeover threat

    NARCIS (Netherlands)

    Toolsema-Veldman, Linda

    2007-01-01

    It is generally assumed that a well-developed market for corporate control results in a takeover threat that disciplines management. We study the effects of a larger market for corporate control and show that an increase in the number of potential raiders of a firm may decrease the probability of a

  5. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Doo [KINAC, Daejeon (Korea, Republic of)

    2016-05-15

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats.

  6. Not so Simple: The Threats to Leadership Sustainability

    Science.gov (United States)

    Bottery, Mike

    2016-01-01

    This article begins by examining the possible meanings of "sustainability," and argues that most meanings are prescriptive rather than descriptive in nature: they tend, either overtly or covertly, to recommend the particular end-states that writers desire. The article then looks at the threats to leadership sustainability, suggesting…

  7. 49 CFR 1540.209 - Fees for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... current cost of conducting security threat assessments. TSA determines fee amounts and any necessary revisions to the fee amounts based on current costs, using a method of analysis consistent with widely accepted accounting principles and practices, and calculated in accordance with the provisions of 31...

  8. Ebola virus – new threat to global health

    Directory of Open Access Journals (Sweden)

    Rina K. Kusumaratna

    2015-12-01

        The Ebola virus outbreak constitutes a serious warning that epidemics may occur anywhere and places every afflicted nation at risk. Therefore it is essential to institute measures to stop its spread and its future threat, which is a moral obligation of members of the health profession, whether academicians, researchers, or health ministry officials.

  9. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  10. Mathematics Self-Efficacy: Stereotype Threat versus Resilience

    Science.gov (United States)

    Schweinle, Amy; Mims, Grace A.

    2009-01-01

    Children's academic self-efficacy is one of the strongest predictors of achievement (Wigfield and Eccles, "Contemporary Educational Psychology" 25(1): 68-81, 2000). The present research examined mathematics self-efficacy and the relationship of racial context from the perspective of two competing bodies of research. Stereotype threat theory would…

  11. The threat of nuclear terrorism: from analysis to precautionary measures

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, M

    2003-07-01

    Facing the nuclear terrorism risk, this document analyzes the nature of the threat of nuclear terrorism, the risk of attack on nuclear installations, the limited protection of nuclear installations against aircraft crashes, the case of nuclear reprocessing plants, the case of nuclear transport and proposes measures which should be taken without endangering the foundations of democracy. (A.L.B.)

  12. Marshall’s Strategy and the Communist Threat

    Science.gov (United States)

    1966-04-08

    adopted by the United States to counter the two aggressive "isms" which have threatened world order and security in the twentieth century: Naziism ...State Department, he had faced the two great threats to the peace and security of the United States in the twentieth century, Naziism and Communism

  13. Predictors of Collegiate Student-Athletes' Susceptibility to Stereotype Threat

    Science.gov (United States)

    Feltz, Deborah L.; Schneider, Richard; Hwang, Seunghyun; Skogsberg, Nikolaus J.

    2013-01-01

    The present investigation sought to determine the extent to which collegiate student-athletes are susceptible to stereotype threat and the factors that predict it. We proposed a structural equation model (SEM) by which a perceived coach's positive regard for an athlete's academic ability, athletic identity, and academic identity predicts the…

  14. The indoor as a scene for biological threats

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Gunnarsen, Lars; Bräuner, Elvira

    2014-01-01

    The paper presents the result of involving users in developing a user-friendly device for easy and fast detection of bio-threats in indoor settings. Bio-protect is a project supported by the European Commission, with the concept of developing a fast-alert, mobile, easy-to-use device to detect...

  15. Survey of Threats and Assaults by Patients on Psychiatry Residents

    Science.gov (United States)

    Dvir, Yael; Moniwa, Emiko; Crisp-Han, Holly; Levy, Dana; Coverdale, John H.

    2012-01-01

    Objective: The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents, their consequences, and the perceived adequacy of supports and institutional responses. Method: Authors conducted an anonymous survey of 519 psychiatry residents in 13 psychiatry programs across the United States. The survey…

  16. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    With an ever-increasing popularity of mobile applications in our day-to-day activities ... in this system, because of the push notifications and flexibility of the platform. ... (GCM) for android was used in the delivery of threat/disaster feedbacks from ...

  17. New and emerging threats of cyber crime and terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    Advancements in information and communication technologies (ICT) inextricably bring new threats to the end-users and society. However, the last 40 years have shown that many of the same cyber security design and programming failures occur over and over again when a new ICT innovation and development

  18. Threat, security and attitude formation among the young

    Science.gov (United States)

    Radin, Furio

    1985-12-01

    The perception of threat to security on the part of young people reflects a central aspect of the societal phenomenon of attitude formation, whose primary function is, ideally, to meet the need for security. In all modern societies, however, the process of socialization — which by its very nature is educational in that it prepares individuals to function as members of society — operates on the principle of systematically frustrating this need by employing a system of reward and punishment based on competition. This system creates a fundamental insecurity and a corresponding attitude (de)formation in the individual, which is exploited by the state in order to consolidate the power of the dominant groups. Due to this fundamental insecurity, the individual is incapable of coping rationally with threat and seeks pseudo-security, e.g., in conformity. Threat — particularly global threat — is perceived as an external factor over which the individual has no control, i.e., it is perceived as falling exclusively within the province of those in power, whose control is further strengthened by this perception. Since the essential damage to the individual's attitude system has been done by the time he leaves school, this undesirable condition of modern societies can only be rectified by a socialization process in general — and an educational process in particular — which cultivates in the individual the development of critical judgment, free self-realization and the spirit of co-operation instead of competition.

  19. Determinants and Drivers of Infectious Disease Threat Events in Europe

    Centers for Disease Control (CDC) Podcasts

    2016-05-04

    Reginald Tucker reads an abridged version of the article, Determinants and Drivers of Infectious Disease Threat Events in Europe.  Created: 5/4/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 5/4/2016.

  20. Threat, Intimidation, and Student Financial Market Knowledge: An Empirical Study

    Science.gov (United States)

    Ford, Matthew W.; Devoto, Steve; Kent, Daniel W.; Harrison, Todd

    2007-01-01

    Threat emanating from financial markets may intimidate college students to some degree. In this article, the authors considered the influence of such intimidation on student financial market knowledge. They hypothesized a negative relationship between intimidation and market knowledge. An empirical study of over 150 undergraduate business school…

  1. Societal threat as a moderator of cultural group selection.

    Science.gov (United States)

    Gelfand, Michele J; Roos, Patrick; Nau, Dana; Harrington, Jesse; Mu, Yan; Jackson, Joshua

    2016-01-01

    As scholars have rushed to either prove or refute cultural group selection (CGS), the debate lacks sufficient consideration of CGS's potential moderators. We argue that pressures for CGS are particularly strong when groups face ecological and human-made threat. Field, experimental, computational, and genetic evidence are presented to substantiate this claim.

  2. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists (Mage  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  3. Collective threat, trust, and the sense of personal control.

    Science.gov (United States)

    Ross, Catherine E

    2011-09-01

    A threatening and dangerous neighborhood may produce distressing emotions of anxiety, anger, and depression among the individuals who live there because residents find these neighborhoods subjectively alienating. The author introduces the idea that neighborhood disorder indicates collective threat, which is alienating-shaping perceptions of powerlessness and mistrust. The author presents a theory of trust that posits that mistrust develops in places where resources are scarce and threat is common and among individuals with few resources and who feel powerless to avoid or manage the threat. Perceived powerlessness develops with exposure to uncontrollable, negative conditions such as crime, danger, and threat in one's neighborhood. Thus, neighborhood disorder, common in disadvantaged neighborhoods, influences mistrust directly and indirectly by increasing perceptions of powerlessness among residents, which amplify disorder's effect on mistrust. The very thing needed to protect disadvantaged residents from the negative effects of their environment-a sense of personal control-is eroded by that environment in a process that the author calls structural amplification. Powerlessness and mistrust in turn are distressing, increasing levels of anxiety, anger, and depression.

  4. Degrees of Integrity: The Threat of Corruption in Higher Education

    Science.gov (United States)

    Chapman, David W.; Lindner, Samira

    2016-01-01

    Corruption in higher education is the focus of growing international concern among governments, educators, students, and other stakeholders. Those working in higher education institutions now face a unique convergence of pressures that is creating a heightened threat to the integrity of the higher education enterprise worldwide. This paper draws…

  5. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  6. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    Science.gov (United States)

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  7. Predictors of Collegiate Student-Athletes' Susceptibility to Stereotype Threat

    Science.gov (United States)

    Feltz, Deborah L.; Schneider, Richard; Hwang, Seunghyun; Skogsberg, Nikolaus J.

    2013-01-01

    The present investigation sought to determine the extent to which collegiate student-athletes are susceptible to stereotype threat and the factors that predict it. We proposed a structural equation model (SEM) by which a perceived coach's positive regard for an athlete's academic ability, athletic identity, and academic identity predicts the…

  8. Globalisation of water: opportunities and threats of virtual water trade

    NARCIS (Netherlands)

    Chapagain, A.K.

    2006-01-01

    Where the river basin is generally seen as the appropriate unit for analyzing freshwater availability and use, it becomes increasingly important to put freshwater issues in a global context. The book analyses the opportunities and threats of international virtual water trade in the context of solvin

  9. Mass Media Use by College Students during Hurricane Threat

    Science.gov (United States)

    Piotrowski, Chris

    2015-01-01

    There is a dearth of studies on how college students prepare for the threat of natural disasters. This study surveyed college students' preferences in mass media use prior to an approaching hurricane. The convenience sample (n = 76) were from a university located in the hurricane-prone area of the central Gulf of Mexico coast. Interestingly,…

  10. ECONOMIC AND LEGAL MECHANISMS TO COUNTER TERRORIST THREATS

    Directory of Open Access Journals (Sweden)

    G. V. Startsev

    2010-01-01

    Full Text Available Issues related to problems arising while using economic and legal facilities of counteraction to terroristic threats in Russian Federation A complex of. key national safety maintenance matters vital in modern conditions is analyzed. Particular attention is paid to economic and financial safety in interrelation with issues common to counteraction to organized and economic criminality, corruption and terrorism.

  11. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  12. Facing Freeze: Social Threat Induces Bodily Freeze in Humans

    NARCIS (Netherlands)

    Roelofs, K.; Hagenaars, M.A.; Stins, J.F.

    2010-01-01

    Freezing is a common defensive response in animals threatened by predators. It is characterized by reduced body motion and decreased heart rate (bradycardia). However, despite the relevance of animal defense models in human stress research, studies have not shown whether social threat cues elicit si

  13. Facing death together : Understanding the consequences of mortality threats

    NARCIS (Netherlands)

    Renkema, L.J.

    2009-01-01

    In everyday life people are constantly reminded of the temporary nature of life. Newspapers, television, and the Internet offer a constant stream or death reminders, ranging from terrorist attacks to natural disasters. According to Terror Management Theory, people are able to cope with these threats

  14. Nationwide assessment of nonpoint source threats to water quality

    Science.gov (United States)

    Thomas C. Brown; Pamela Froemke

    2012-01-01

    Water quality is a continuing national concern, in part because the containment of pollution from nonpoint (diffuse) sources remains a challenge. We examine the spatial distribution of nonpoint-source threats to water quality. On the basis of comprehensive data sets for a series of watershed stressors, the relative risk of water-quality impairment was estimated for the...

  15. Collective Threat, Trust, and the Sense of Personal Control

    Science.gov (United States)

    Ross, Catherine E.

    2011-01-01

    A threatening and dangerous neighborhood may produce distressing emotions of anxiety, anger, and depression among the individuals who live there because residents find these neighborhoods subjectively alienating. The author introduces the idea that neighborhood disorder indicates collective threat, which is alienating--shaping perceptions of…

  16. Towards formal analysis of insider threats for auctions

    NARCIS (Netherlands)

    Kammüller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    This paper brings together the world of insider threats and auctions. For online-auction systems, like eBay, but also for high-value one-off auction algorithms as they are used for selling radio wave frequencies, the use of rigorous machine supported modelling and verification techniques is meaningf

  17. Suitable Enemies? Governmentality of Youth: Youth as a Threat

    Science.gov (United States)

    Ostrowicka, Helena

    2012-01-01

    This article is a contribution to the discourse of politics towards (for) youth, which the author defines as the "cultural politics of risk". The article begins with scientific representations of youth as a threat, as a group inclined to engage in risky behaviours. It then focuses on theoretical approaches called the "risk…

  18. Reasoning about threats: From observables to situation assessment

    NARCIS (Netherlands)

    Burghouts, G.J.; Marck, J.W.

    2011-01-01

    We propose a mechanism to assess threats that are based on observables. Observables are properties of persons, i.e., their behavior and interaction with other persons and objects. We consider observables that can be extracted from sensor signals and intelligence. In this paper, we discuss situation

  19. The effects of takeover threats on shareholders and firm value

    NARCIS (Netherlands)

    Haan, MA; Riyanto, Y

    2006-01-01

    We study the role of takeover threats as a corporate control mechanism using [Aghion, P., Tirole, J., 1997. Formal and real authority in organizations. Journal of Political Economy 105, 1-29] model of formal and real authority. Shareholders do not monitor the manager's actions since ownership is wid

  20. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    Evaluation and Weapon Assignment (TEWA) process with regards to Command and ... [81] TE refers to “the part of threat analysis concerned with the ...... makers are more likely to screen options with respect to cut-offs or goals when there is.

  1. Computer Viruses and Related Threats: A Management Guide.

    Science.gov (United States)

    Wack, John P.; Carnahan, Lisa J.

    This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…

  2. Community Violence Exposure, Threat Appraisal, and Adjustment in Adolescents

    Science.gov (United States)

    Kliewer, Wendy; Sullivan, Terri N.

    2008-01-01

    Validity data are presented for a new measure of threat appraisals in response to community violence. Adolescents (N = 358; 45% male; 91% African American, M = 12.10 years, SD = 1.63) and their maternal caregivers participated in two waves of a longitudinal interview study focused on the consequences of exposure to community violence. Structural…

  3. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    Kindt, M; van den Hout, M; de Jong, Peter; Hoekzema, B

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from spider fearful children (N = 55) and non-fearful children (N = 58) aged 8-11 in the fi

  4. New and emerging threats of cyber crime and terrorism

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2014-01-01

    Advancements in information and communication technologies (ICT) inextricably bring new threats to the end-users and society. However, the last 40 years have shown that many of the same cyber security design and programming failures occur over and over again when a new ICT innovation and development

  5. Collective Study On Security Threats In VOIP Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zulkifl Hasan

    2015-08-01

    Full Text Available The Collective study will critically evaluate the voice over internet protocol VOIP Security threats issues amp challenges in the communication over the network the solution provided by different vendors. Authors will be discussing all security issues different protocols but main focus will be on SIP protocol its implementation and vendors VOIP security system.

  6. Network Threat Ratings in Conventional DREAD Model Using Fuzzy Logic

    Directory of Open Access Journals (Sweden)

    Ak.Ashakumar Singh

    2012-01-01

    Full Text Available One of the most popular techniques to deal with ever growing risks associated with security threats is DREAD model. It is used for rating risk of network threats identified in the abuser stories. In this model network threats needs to be defined by sharp cutoffs. However, such precise distribution is not suitable for risk categorization as risks are vague in nature and deals with high level of uncertainty. In view of these risk factors, the paper proposes a novel fuzzy approach using DREAD model for computing risk level that ensures better evaluation of imprecise concepts. Thus, it provides the capacity to include subjectivity and uncertainty during risk ranking. These threat parameters need to be frequently updated based on feedback from implementation of previous parameters. These feedback are always stated in the form of ordinal ratings, e.g. "high speed", "average performance", "good condition". Different people can describe different values to these ordinal ratings without a clear-cut reason or scientific basis. There is need for a way or means to transform vague ordinal ratings to more appreciable and precise numerical estimates. The paper transforms the ordinal performance ratings of some system performance parameters to numerical ratings using Fuzzy Logic.

  7. Threat, Intimidation, and Student Financial Market Knowledge: An Empirical Study

    Science.gov (United States)

    Ford, Matthew W.; Devoto, Steve; Kent, Daniel W.; Harrison, Todd

    2007-01-01

    Threat emanating from financial markets may intimidate college students to some degree. In this article, the authors considered the influence of such intimidation on student financial market knowledge. They hypothesized a negative relationship between intimidation and market knowledge. An empirical study of over 150 undergraduate business school…

  8. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  9. Cognitive bias for pictorial and linguistic threat cues in children

    NARCIS (Netherlands)

    van den Hout, M.; Hoekzema, B.; de Jong, P.; Kindt, M.

    2000-01-01

    The present study was designed to test the conditions under which threat-related cognitive bias can be observed in anxious children. Measures of cognitive bias for threatening words and pictures were obtained from 55 spider fearful children and 58 non-fearful children (aged 8-11 yrs) in the 1st expe

  10. Religious Fanaticism, a Threat to National Security: The Case of ...

    African Journals Online (AJOL)

    Ike Odimegwu

    approach the federal government should use to end this group's threat to national ... Islamic corporation and the incessant religious crisis that have engulfed the ..... were at the helm of affairs in terms of governance in the north, conversion to ...

  11. Escorting commercial aircraft to reduce the MANPAD threat

    Science.gov (United States)

    Hock, Nicholas; Richardson, M. A.; Butters, B.; Walmsley, R.; Ayling, R.; Taylor, B.

    2005-11-01

    This paper studies the Man-Portable Air Defence System (MANPADS) threat against large commercial aircraft using flight profile analysis, engagement modelling and simulation. Non-countermeasure equipped commercial aircraft are at risk during approach and departure due to the large areas around airports that would need to be secured to prevent the use of highly portable and concealable MANPADs. A software model (CounterSim) has been developed and was used to simulate an SA-7b and large commercial aircraft engagement. The results of this simulation have found that the threat was lessened when a escort fighter aircraft is flown in the 'Centreline Low' position, or 25 m rearward from the large aircraft and 15 m lower, similar to the Air-to-Air refuelling position. In the model a large aircraft on approach had a 50% chance of being hit or having a near miss (within 20m) whereas escorted by a countermeasure equipped F-16 in the 'Centerline Low' position, this was reduced to only 14%. Departure is a particularly vulnerable time for large aircraft due to slow climb rates and the inability to fly evasive manoeuvres. The 'Centreline Low' escorted departure greatly reduced the threat to 16% hit or near miss from 62% for an unescorted heavy aircraft. Overall the CounterSim modelling has showed that escorting a civilian aircraft on approach and departure can reduce the MANPAD threat by 3 to 4 times.

  12. ‘Oil-Qaeda’: Jihadist Threats to the Energy Sector

    Directory of Open Access Journals (Sweden)

    Tim Pippard

    2010-11-01

    Full Text Available The West's and the Saudi's dependence on oil has made the energy sector a target for Al-Qaeda. The article discusses past and current threats to the energy sector and the motives, capabilities and limitations of Al-Qaeda in the Arab Peninsula and beyond.

  13. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  14. Fearful faces heighten the cortical representation of contextual threat.

    Science.gov (United States)

    Wieser, Matthias J; Keil, Andreas

    2014-02-01

    Perception of facial expressions is typically investigated by presenting isolated face stimuli. In everyday life, however, faces are rarely seen without a surrounding visual context that affects perception and interpretation of the facial expression. Conversely, fearful faces may act as a cue, heightening the sensitivity of the visual system to effectively detect potential threat in the environment. In the present study, we used steady-state visually evoked potentials (ssVEPs) to examine the mutual effects of facial expressions (fearful, neutral, happy) and affective visual context (pleasant, neutral, threat). By assigning two different flicker frequencies (12 vs. 15Hz) to the face and the visual context scene, cortical activity to the concurrent stimuli was separated, which represents a novel approach to independently tracking the cortical processes associated with the face and the context. Twenty healthy students viewed flickering faces overlaid on flickering visual scenes, while performing a simple change-detection task at fixation, and high-density EEG was recorded. Arousing background scenes generally drove larger ssVEP amplitudes than neutral scenes. Importantly, background and expression interacted: When viewing fearful facial expressions, the ssVEP in response to threat context was amplified compared to other backgrounds. Together, these findings suggest that fearful faces elicit vigilance for potential threat in the visual periphery. © 2013.

  15. Regulation in a Brave New World: Safeguarding against Subversive Threats

    Science.gov (United States)

    Hornosty, Jason

    2011-01-01

    Biotechnology is a rapidly advancing science that has the potential to revolutionize medicine and transform human abilities. Accompanying these positives are an underdiscussed category of threats to principles of human rights and equality. Although any technology might be used to inegalitarian ends, biotechnology has the capacity to beget…

  16. Immunity to Popular Stereotypes of Aging? Seniors and Stereotype Threat

    Science.gov (United States)

    Horton, Sean; Baker, Joseph; Pearce, William; Deakin, Janice M.

    2010-01-01

    Previous research suggests that seniors' short-term performance is affected by stereotype threat--defined as a situation in which an individual is at risk of confirming a negative characterization about one's group. The current study attempted to replicate and extend these findings to areas of cognitive and physical functioning considered…

  17. Experimental Design and Some Threats to Experimental Validity: A Primer

    Science.gov (United States)

    Skidmore, Susan

    2008-01-01

    Experimental designs are distinguished as the best method to respond to questions involving causality. The purpose of the present paper is to explicate the logic of experimental design and why it is so vital to questions that demand causal conclusions. In addition, types of internal and external validity threats are discussed. To emphasize the…

  18. Staff Turnover as a Possible Threat to Knowledge Loss

    Directory of Open Access Journals (Sweden)

    Linhartová Lucie

    2011-09-01

    Full Text Available The article focuses on labour turnover as a potential threat to knowledge loss. Labour turnover results in an organizations inability to ensure knowledge continuity. In this study, induction was used to identify factors within organizations that determine employees’ exit from organizations. The verifiability of these factors was tested by means of correlation and regression. Subsequently, the presented causes of employee turnover were specified as potential threat to knowledge loss. In the current knowledge economy, employees in an organization are considered the key competitive advantage and the most important asset. If an employee leaves an organization, they take the knowledge they have acquired with them. The loss of knowledge is a potential threat to an organizations existence, especially if an employee with valuable knowledge leaves to join a competitor. Therefore, this paper deals with knowledge continuity as a probable means of eliminating this threat. Dependencies between selected qualitative variables were tested to determine their impact on organizations. The study concludes by indicating that, today‘s knowledge-based organizations must be aware of the main causes and consequences of employee fluctuation so as to maintain their competitiveness in times of economic crisis.

  19. As Threats of Violence Escalate, Primate Researchers Stand Firm.

    Science.gov (United States)

    Schneider, Alison

    1999-01-01

    Scientists doing research on primates are increasingly being subjected to threats and acts of violence from animal rights groups. The intimidation has resulted in many laboratories taking extensive security measures. Some scientists claim, however, that there is no surrogate for animal research in understanding human diseases. There are fears that…

  20. Derivative chameleons

    Science.gov (United States)

    Noller, Johannes

    2012-07-01

    We consider generalized chameleon models where the conformal coupling between matter and gravitational geometries is not only a function of the chameleon field phi, but also of its derivatives via higher order co-ordinate invariants (such as ∂μphi∂μphi,squphi,...). Specifically we consider the first such non-trivial conformal factor A(phi,∂μphi∂μphi). The associated phenomenology is investigated and we show that such theories have a new generic mass-altering mechanism, potentially assisting the generation of a sufficiently large chameleon mass in dense environments. The most general effective potential is derived for such derivative chameleon setups and explicit examples are given. Interestingly this points us to the existence of a purely derivative chameleon protected by a shift symmetry for phi → phi+c. We also discuss potential ghost-like instabilities associated with mass-lifting mechanisms and find another, mass-lowering and instability-free, branch of solutions. This suggests that, barring fine-tuning, stable derivative models are in fact typically anti-chameleons that suppress the field's mass in dense environments. Furthermore we investigate modifications to the thin-shell regime and prove a no-go theorem for chameleon effects in non-conformal geometries of the disformal type.

  1. Chronology of Awareness About US National Park External Threats

    Science.gov (United States)

    Shafer, Craig L.

    2012-12-01

    The objective of this paper is to raise understanding of the history of protected area external threat awareness in the United States and at World Protected Area Congresses. The earliest concerns about external threats to US national parks began in the late nineteenth century: a potential railroad transgression of Yellowstone National Park in the 1880s. During the early and mid 1930s, George Wright and colleagues focused on outside boundary concerns like of hunting and trapping of furbearers, grazing, logging, disease and hybridization between species. In the 1960s, a worldwide recognition began about the role of outside habitat fragmentation/isolation on nature reserves and human generated stressors crossing their boundaries. The State of the Park Report 1980 added a plethora of threats: oil/gas and geothermal exploration and development, hydropower and reclamation projects, urban encroachment, roads, resorts, and recreational facilities. The early 1980s ushered in political interference with NPS threats abatement efforts as well as Congressional legislative initiatives to support the abatement challenges of the agency. By 1987, the Government Accounting Office issued its first report on National Park Service (NPS) progress in dealing with external threats. Climate change impacts on parks, especially in terms of animals adjusting their temperature and moisture requirements by latitude and altitude, surfaced in the technical literature by the mid-1980s. By 1992, the world parks community stressed the need to integrate protected areas into the surrounding landscape and human community. The importance of the matrix has gradually gained appreciation in the scientific community. This chronology represents one example of national park and protected areas' institutional history contributing to the breath of modern conservation science.

  2. Global Derivatives

    DEFF Research Database (Denmark)

    Andersen, Torben Juul

    ." - Steen Parsholt, Chairman and CEO, Aon Nordic Region. "Andersen has done a wonderful job of developing a comprehensive text that deals with risk management in global markets. I would recommend this book to any student or businessman who has a need to better understand the risks and risk management...... management practice. Of particular note is the global and integrated approach chosen in this book which should be of special interest to aspiring managers active in global and international markets." - Dr Jean-Pierre Zigrand, Lecturer in Finance, London School of Economics, UK. More than 90 per cent...... management situations. Its key features include: derivatives are introduced in a global market perspective; describes major derivative pricing models for practical use, extending these principles to valuation of real options; practical applications of derivative instruments are richly illustrated...

  3. Electricity derivatives

    CERN Document Server

    Aïd, René

    2015-01-01

    Offering a concise but complete survey of the common features of the microstructure of electricity markets, this book describes the state of the art in the different proposed electricity price models for pricing derivatives and in the numerical methods used to price and hedge the most prominent derivatives in electricity markets, namely power plants and swings. The mathematical content of the book has intentionally been made light in order to concentrate on the main subject matter, avoiding fastidious computations. Wherever possible, the models are illustrated by diagrams. The book should allow prospective researchers in the field of electricity derivatives to focus on the actual difficulties associated with the subject. It should also offer a brief but exhaustive overview of the latest techniques used by financial engineers in energy utilities and energy trading desks.

  4. The Moderating Role of Age-Group Identification and Perceived Threat on Stereotype Threat among Older Adults

    Science.gov (United States)

    Kang, Sonia K.; Chasteen, Alison L.

    2009-01-01

    Although research has shown that older adults are negatively affected by aging stereotypes, relatively few studies have attempted to identify those older adults who may be especially susceptible to these effects. The current research takes steps toward identifying older adults most susceptible to the effects of stereotype threat and investigates…

  5. Threat and Selective Exposure: The Moderating Role of Threat and Decision Context on Confirmatory Information Search after Decisions

    Science.gov (United States)

    Fischer, Peter; Kastenmuller, Andreas; Greitemeyer, Tobias; Fischer, Julia; Frey, Dieter; Crelley, David

    2011-01-01

    Previous studies on the impact of perceived threat on confirmatory information search (selective exposure) in the context of decision making have yielded mixed results. Some studies have suggested that confirmatory information search is reduced, yet others have found contradictory effects. The present series of 5 studies consistently found that…

  6. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  7. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  8. Human Migration and Agricultural Expansion: An Impending Threat to the Maya Biosphere Reserve

    Science.gov (United States)

    Sader, Steven; Reining, Conard; Sever, Thomas L.; Soza, Carlos

    1997-01-01

    Evidence is presented of the current threats to the Maya Biosphere Reserve in northern Guatemala as derived through time-series Landsat Thematic Mapper observations and analysis. Estimates of deforestation rates and trends are examined for different management units within the reserve and buffer zones. The satellite imagery was used to quantify and monitor rates, patterns, and trends of forest clearing during a time period corresponding to new road construction and significant human migration into the newly accessible forest region. Satellite imagery is appropriate technology in a vast and remote tropical region where aerial photography and extensive field-based methods are not cost-effective and current, timely data is essential for establishing conservation priorities.

  9. Destined to die but not to wage war: how existential threat can contribute to escalation or de-escalation of violent intergroup conflict.

    Science.gov (United States)

    Jonas, Eva; Fritsche, Immo

    2013-10-01

    War means threat to people's lives. Research derived from terror management theory (TMT) illustrates that the awareness of death leads people to defend cultural ingroups and their worldviews to attain a sense of symbolic immortality and thereby buffer existential anxiety. This can result in hostile effects of mortality salience (MS), such as derogation of outgroup members, prejudice, stereotyping, aggression, and racism, which, in turn, can lead to the escalation of violent intergroup conflict and, thus, the escalation of war. Yet, escalation of destructive conflict following MS is not automatic. Instead, research on TMT suggests that MS does not necessarily result in conflict and intolerance but can also foster positive tendencies, such as intergroup fairness or approval of pacifism, depending on how existential threat is perceived, whether the need for symbolic self-transcendence is satisfied, which social norms are salient, and how social situations are interpreted. In the present article, we review current TMT research with the aim of reconciling the seemingly contradictory findings of hostile and peaceful reactions to reminders of death. We present a terror management model of escalation and de-escalation of violent intergroup conflicts, which takes into account the interaction between threat salience and features of the social situation. We also discuss possible intervention strategies to override detrimental consequences of existential threat and argue that war is not the inevitable consequence of threat. PsycINFO Database Record (c) 2013 APA, all rights reserved

  10. Attending to Threat: Race-based Patterns of Selective Attention.

    Science.gov (United States)

    Trawalter, Sophie; Todd, Andrew R; Baird, Abigail A; Richeson, Jennifer A

    2008-09-01

    The present research investigated the extent to which the stereotype that young Black men are threatening and dangerous has become so robust and ingrained in the collective American unconscious that Black men now capture attention, much like evolved threats such as spiders and snakes. Specifically, using a dot-probe detection paradigm, White participants revealed biased attention toward Black faces relative to White faces (Study 1). Because the faces were presented only briefly (30-ms), the bias is thought to reflect the early engagement of attention. The attentional bias was eliminated, however, when the faces displayed averted eye-gaze (Study 2). That is, when the threat communicated by the Black faces was attenuated by a relevant, competing socio-emotional cue- in this case, averted eye-gaze-they no longer captured perceivers' attention. Broader implications for social cognition, as well as public policies that reify these prevailing perceptions of young Black men are discussed.

  11. The global threat of antimicrobial resistance: science for intervention

    Directory of Open Access Journals (Sweden)

    I. Roca

    2015-07-01

    Full Text Available In the last decade we have witnessed a dramatic increase in the proportion and absolute number of bacterial pathogens resistant to multiple antibacterial agents. Multidrug-resistant bacteria are currently considered as an emergent global disease and a major public health problem. The B-Debate meeting brought together renowned experts representing the main stakeholders (i.e. policy makers, public health authorities, regulatory agencies, pharmaceutical companies and the scientific community at large to review the global threat of antibiotic resistance and come up with a coordinated set of strategies to fight antimicrobial resistance in a multifaceted approach. We summarize the views of the B-Debate participants regarding the current situation of antimicrobial resistance in animals and the food chain, within the community and the healthcare setting as well as the role of the environment and the development of novel diagnostic and therapeutic strategies, providing expert recommendations to tackle the global threat of antimicrobial resistance.

  12. Algal blooms: an emerging threat to seawater reverse osmosis desalination

    KAUST Repository

    Villacorte, Loreen O.

    2014-08-04

    Seawater reverse osmosis (SWRO) desalination technology has been rapidly growing in terms of installed capacity and global application over the last decade. An emerging threat to SWRO application is the seasonal proliferation of microscopic algae in seawater known as algal blooms. Such blooms have caused operational problems in SWRO plants due to clogging and poor effluent quality of the pre-treatment system which eventually forced the shutdown of various desalination plants to avoid irreversible fouling of downstream SWRO membranes. This article summarizes the current state of SWRO technology and the emerging threat of algal blooms to its application. It also highlights the importance of studying the algal bloom phenomena in the perspective of seawater desalination, so proper mitigation and preventive strategies can be developed in the near future. © 2014 © 2014 Balaban Desalination Publications. All rights reserved.

  13. Space debris and other threats from outer space

    CERN Document Server

    Pelton, Joseph N

    2013-01-01

    The mounting problem of space debris in low earth orbit and its threat to the operation of application satellites has been increasingly recognized as space activities increase. The efforts of the Inter Agency Space Debris Coordinating Committee (IADC) and UN COPUS have now led to international guidelines to mitigate the creation of new debris. This book discusses the technical studies being developed for active removal processes and otherwise mitigating problems of space debris, particularly in low earth orbit. This book also considers threats to space systems and the Earth that comes from natural causes such as asteroids, coronal mass ejections, and radiation. After more than half a century of space applications and explorations, the time has come to consider ways to provide sustainability for long-term space activities. 

  14. Gender-Atypical Mental Illness as Male Gender Threat.

    Science.gov (United States)

    Michniewicz, Kenneth S; Bosson, Jennifer K; Lenes, Joshua G; Chen, Jason I

    2016-07-01

    The present study examined whether men view gender-atypical (i.e., feminine) psychological disorders as threats to their gender status. Men and women (N = 355) rated their expectations of gender status loss, feelings of distress, and help-seeking intentions in response to 10 different stereotypically masculine and feminine psychological disorders. Men as compared to women expected greater gender status loss for, and reported more distress to, gender-atypical versus gender-typical disorders. Expectations of gender status loss partially mediated the link between participant gender and distress at the thought of gender-atypical disorders. These findings suggest that feminine disorders pose more powerful gender status threats for men than masculine disorders do and that men's expectations of gender status loss for feminine disorders drive their negative reactions to these mental illnesses. The discussion emphasizes the importance of considering the gender-typicality of disorders, and the implications of these findings for clinical interventions.

  15. Performance estimation for threat detection in CT systems

    Science.gov (United States)

    Montgomery, Trent; Karl, W. Clem; Castañón, David A.

    2017-05-01

    Detecting the presence of hazardous materials in suitcases and carry-on luggage is an important problem in aviation security. As the set of threats is expanding, there is a corresponding need to increase the capabilities of explosive detection systems to address these threats. However, there is a lack of principled tools for predicting the performance of alternative designs for detection systems. In this paper, we describe an approach for computing bounds on the achievable classification performance of material discrimination systems based on empirical statistics that estimate the f-divergence of the underlying features. Our approach can be used to examine alternative physical observation modalities and measurement configurations, as well as variations in reconstruction and feature extraction algorithms.

  16. The hardy personality: cognitive and physiological responses to evaluative threat.

    Science.gov (United States)

    Allred, K D; Smith, T W

    1989-02-01

    Hardy persons are hypothesized to be resistant to stress-induced illness, because of their adaptive cognitive style and a subsequently reduced level of physiological arousal. We assessed the cognitive and physiological responses of high and low hardy male undergraduates to a challenging task under high and low evaluative threat. As predicted, hardy subjects endorsed more positive self-statements than did low hardy subjects in the high threat condition. High hardy subjects also reported fewer negative self-statements overall, but this was attributable to the overlap of measures of hardiness and neuroticism. Hardy subjects displayed marginally lower arousal while waiting for the task to begin, but this finding did not approach significance when neuroticism was controlled. Hardy subjects also had higher levels of systolic blood pressure, perhaps because of their active coping efforts. Results support the hypothesized hardy cognitive style but raise questions about the type and timing of organismic strain linking hardiness and health.

  17. EMP Threats to US National Security: Congressional Responses

    Science.gov (United States)

    Huessy, Peter

    2011-04-01

    The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.

  18. A survey on top security threats in cloud computing

    Directory of Open Access Journals (Sweden)

    Muhammad Kazim

    2015-03-01

    Full Text Available Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

  19. Preparedness for Threat of Chikungunya in the Pacific

    Science.gov (United States)

    Hoy, Damian; Horwood, Paul F.; Ropa, Berry; Hancock, Thane; Guillaumot, Laurent; Rickart, Keith; Frison, Pascal; Pavlin, Boris; Souares, Yvan

    2014-01-01

    Chikungunya virus (CHIKV) caused significant outbreaks of illness during 2005–2007 in the Indian Ocean region. Chikungunya outbreaks have also occurred in the Pacific region, including in Papua New Guinea in 2012; New Caledonia in April 2013; and Yap State, Federated States of Micronesia, in August 2013. CHIKV is a threat in the Pacific, and the risk for further spread is high, given several similarities between the Pacific and Indian Ocean chikungunya outbreaks. Island health care systems have difficulties coping with high caseloads, which highlights the need for early multidisciplinary preparedness. The Pacific Public Health Surveillance Network has developed several strategies focusing on surveillance, case management, vector control, laboratory confirmation, and communication. The management of this CHIKV threat will likely have broad implications for global public health. PMID:25062306

  20. Disease-threat model explains acceptance of genetically modified products

    Directory of Open Access Journals (Sweden)

    Prokop Pavol

    2013-01-01

    Full Text Available Natural selection favoured survival of individuals who were able to avoid disease. The behavioural immune system is activated especially when our sensory system comes into contact with disease-connoting cues and/or when these cues resemble disease threat. We investigated whether or not perception of modern risky technologies, risky behaviour, expected reproductive goals and food neophobia are associated with the behavioural immune system related to specific attitudes toward genetically modified (GM products. We found that respondents who felt themselves more vulnerable to infectious diseases had significantly more negative attitudes toward GM products. Females had less positive attitudes toward GM products, but engaging in risky behaviours, the expected reproductive goals of females and food neophobia did not predict attitudes toward GM products. Our results suggest that evolved psychological mechanisms primarily designed to protect us against pathogen threat are activated by modern technologies possessing potential health risks.

  1. Sniffing Threat and Practices in IPv6 Networks

    Institute of Scientific and Technical Information of China (English)

    YI Xiushuang; WEN Zhankao; ZHANG Dengke

    2006-01-01

    The IPv4 protocol suite is vulnerable to a variety of attacks.IPv6 security is in many ways the same as IPv4 security, the basic mechanisms for transporting packets across the network stay mostly unchanged, and the upper-layer protocols that transport the actual application data are mostly unaffected.This paper illustrates sniffing threat against IPv4 and then compares how the threat might influence an IPv6 networks.This is prefaced by a brief overview of current practices around the design of an IPv4 Internet edge network and then followed by a review of how that IPv4 edge network needs to evolve in order to secure the addition of IPv6.As IPv6 security is a large and complex subject, and also, IPv6 network is still at the very beginning stage and has not been fully examined in fact, this paper focus on the security requirements of medium edge networks.

  2. We can do it : The interplay of construal orientation and social comparisons under threat

    NARCIS (Netherlands)

    Marx, DM; Stapel, DA

    2005-01-01

    The authors investigated how a collective self-construal orientation in combination with positive social comparisons "turns off" the negative effects of stereotype threat. Specifically, Experiment 1 demonstrated that stereotype threat led to increased accessibility of participants' collective self (

  3. Smoking Out a Deadly Threat: Tobacco Use in the LGBT Community

    Science.gov (United States)

    ... Out a Deadly Threat: Tobacco Use in the LGBT Community Disparities in Lung Health Series "Smoking Out a Deadly Threat: Tobacco Use in the LGBT Community" is part of the American Lung Association's ...

  4. When nasty breeds nice: threats of violence amplify agreeableness at national, individual, and situational levels.

    Science.gov (United States)

    White, Andrew Edward; Kenrick, Douglas T; Li, Yexin Jessica; Mortensen, Chad R; Neuberg, Steven L; Cohen, Adam B

    2012-10-01

    Humans have perennially faced threats of violence from other humans and have developed functional strategies for surviving those threats. Five studies examined the relation between threats of violence and agreeableness at the level of nations, individuals, and situations. People living in countries with higher military spending (Study 1) and those who chronically perceive threats from others (Study 2) were more agreeable. However, this threat-linked agreeableness was selective (Studies 3-5). Participants primed with threat were more agreeable and willing to help familiar others but were less agreeable and willing to help unfamiliar others. Additionally, people from large families, for whom affiliation may be a salient response to threat, were more likely than people from small families to shift in agreeableness. Returning to the national level, military spending was associated with increased trust in ingroup members but decreased trust in outgroups. Together, these findings demonstrate that agreeableness is selectively modulated by threats of violence.

  5. An Ecological Assessment of the Pandemic Threat of Zika Virus

    OpenAIRE

    Carlson, Colin J.; Dougherty, Eric R.; Getz, Wayne

    2016-01-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset fr...

  6. Impact of predatory threat on fear extinction in Lewis rats

    OpenAIRE

    Goswami, Sonal; Cascardi, Michele; Rodríguez-Sierra, Olga E.; Duvarci, Sevil; Paré, Denis

    2010-01-01

    Humans with post-traumatic stress disorder (PTSD) are deficient at extinguishing conditioned fear responses. A study of identical twins concluded that this extinction deficit does not predate trauma but develops as a result of trauma. The present study tested whether the Lewis rat model of PTSD reproduces these features of the human syndrome. Lewis rats were subjected to classical auditory fear conditioning before or after exposure to a predatory threat that mimics a type of traumatic stress ...

  7. Rhabdomyolysis due to hair dye poisoning: An emerging threat

    Directory of Open Access Journals (Sweden)

    Sampathkumar Krishnaswamy

    2007-01-01

    Full Text Available Rhabdomyolysis can be caused by a variety of physical,chemical, metabolic, infective and toxic causes. We present two patients who developed rhabdomyolysis after consumption of hairdye containing paraphenylene diamine. Both of them developed renal, liver and respiratory failure requiring renal replacement. We were able to save one patient whereas the other died. Intentional hair dye poisoning is an emerging threat. Early recognition of the complications and prompt treatment is necessary for a successful outcome.

  8. Wildlife Poaching: Africa’s Surging Trafficking Threat

    Science.gov (United States)

    2014-05-01

    called keratin, an inert substance that is similar in composition to human fingernails and hair. Some of the consequences of wildlife trafficking are...of the few central figures to have been convicted is a Thai trafficker named Chumlong Lem- tongthai, who worked for businesses in Thailand and Laos...4 1 Wildlife Poaching: Africa’s Surging Trafficking Threat By Bradley anderson and Johan Jooste u Spikes in the prices of ivory and rhino horn have

  9. Threat modulates neural responses to looming visual stimuli.

    Science.gov (United States)

    Vagnoni, Eleonora; Lourenco, Stella F; Longo, Matthew R

    2015-09-01

    Objects on a collision course with an observer produce a specific pattern of optical expansion on the retina known as looming, which in theory exactly specifies the time-to-collision (TTC) of approaching objects. It was recently demonstrated that the affective content of looming stimuli influences perceived TTC, with threatening objects judged as approaching sooner than non-threatening objects. Here, the neural mechanisms by which perceived threat modulates spatiotemporal perception were investigated. Participants judged the TTC of threatening (snakes, spiders) or non-threatening (butterflies, rabbits) stimuli, which expanded in size at a rate indicating one of five TTCs. Visual-evoked potentials (VEPs) and oscillatory neural responses measured with electroencephalography were analysed. The arrival time of threatening stimuli was underestimated compared with non-threatening stimuli, though an interaction suggested that this underestimation was not constant across TTCs. Further, both speed of approach and threat modulated both VEPs and oscillatory responses. Speed of approach modulated the N1 parietal and oscillations in the beta band. Threat modulated several VEP components (P1, N1 frontal, N1 occipital, early posterior negativity and late positive potential) and oscillations in the alpha and high gamma band. The results for the high gamma band suggest an interaction between these two factors. Previous evidence suggests that looming stimuli activate sensorimotor areas, even in the absence of an intended action. The current results show that threat disrupts the synchronization over the sensorimotor areas that are likely activated by the presentation of a looming stimulus. © 2015 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  10. International trade drives biodiversity threats in developing nations.

    Science.gov (United States)

    Lenzen, M; Moran, D; Kanemoto, K; Foran, B; Lobefaro, L; Geschke, A

    2012-06-06

    Human activities are causing Earth's sixth major extinction event-an accelerating decline of the world's stocks of biological diversity at rates 100 to 1,000 times pre-human levels. Historically, low-impact intrusion into species habitats arose from local demands for food, fuel and living space. However, in today's increasingly globalized economy, international trade chains accelerate habitat degradation far removed from the place of consumption. Although adverse effects of economic prosperity and economic inequality have been confirmed, the importance of international trade as a driver of threats to species is poorly understood. Here we show that a significant number of species are threatened as a result of international trade along complex routes, and that, in particular, consumers in developed countries cause threats to species through their demand of commodities that are ultimately produced in developing countries. We linked 25,000 Animalia species threat records from the International Union for Conservation of Nature Red List to more than 15,000 commodities produced in 187 countries and evaluated more than 5 billion supply chains in terms of their biodiversity impacts. Excluding invasive species, we found that 30% of global species threats are due to international trade. In many developed countries, the consumption of imported coffee, tea, sugar, textiles, fish and other manufactured items causes a biodiversity footprint that is larger abroad than at home. Our results emphasize the importance of examining biodiversity loss as a global systemic phenomenon, instead of looking at the degrading or polluting producers in isolation. We anticipate that our findings will facilitate better regulation, sustainable supply-chain certification and consumer product labelling.

  11. Supply Chain Risk Management: An Introduction to the Credible Threat

    Science.gov (United States)

    2016-08-01

    instantaneously. While all this advanced communications technology constitutes one of the greatest things about living in a technologically advanced world, it...also exposes us to one of the biggest threats. How can we be sure that any and all of these devices were made to strict manufac­ turing standards...distributors and the weaknesses in their testing regime for electronic parts creates unacceptable risks and vulnerabilities. The defense industry

  12. Multi-Threat Real-Time Separating System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper describes a multi-threat real-time separating system for broadband anti-radiation missile seeker.It presents a method, with a dual-port memory as comparer, to perform PF and PW hardware real-time separation and to determine the time-of-arrival (TOA) by use of sequential difference histogram (SDIF). The method has been applied to practice, which has achieved good results.

  13. Applying Deterrence Strategy to Agents of Asymmetrical Threats

    Science.gov (United States)

    2014-09-01

    crime deterrent. A costly divorce is a deterrent to unfaithfulness in a spouse. Hell is a 13 deterrent from evil acts, for those who believe (see...terrorist-associated activity, any threat to influence behaviour will be coercive and not deterrent because the aim will be altering the status quo; to put...Square bomber, had a strained marriage at the time of his attempted act, and his wife had previously taken their two children to Saudi Arabia to live

  14. Traceability in Red Meat: Market Opportunity or Threat?

    OpenAIRE

    Liddell, Sterling; Bailey, DeeVon

    2001-01-01

    Traceability poses market opportunities and threats for U.S. red meat producers for at least two reasons. First, consumers are becoming more concerned about the inputs and practices used to produce food and the ability to trace red meat to its source is an essential step in providing information to consumers about inputs and practices. Second, our principal competitors and customers in international red meat trade have been developing traceability systems. If our competitors are successful in...

  15. Leadership during Crisis: Threat Identifcation and Solution Proposal

    Directory of Open Access Journals (Sweden)

    Lukáš Mazánek

    2016-01-01

    Full Text Available Purpose of the article: In the current dynamic market environment, companies are vulnerable to many problems of different character, which could result into a real business crisis. The submitted study summarizes possible approaches to leading through crisis situation. Therefore proposal of solutions which tools leader could use during crisis was made. Purpose of this study is to create theoretical background for the future research, in the field of application right leadership concept during crisis. Methodology/methods: For the purpose of the illustration possible threats which can lead to a business crisis was chosen the Ishikawa diagram. Next up review of scientific publication focused on leadership during crisis was made. With emphasis especially on research studies published in last 10 years in the Leadership Quarterly Journal. These results was precisely analyzed and then the most useful informations synthesized into proposed solutions. Scientific aim: The aim of this study, is to identify possible threats which could be a source of corporate crises. Subsequently propose solutions within the competence of corporate leader, how to prevent those threats or lower the intensity of crisis which already occur Findings: Proposed solutions was found in the field of HR leadership, crisis communication, leader´s behavior connected with leadership style used during crisis and increasing effectivity of leading crisis team. The application of mentioned approaches, contribute to preparedness on the possible negative future development and reduce the intensity of crisis, which has already af-fected the corporation. Conclusions: The contribution of this study is creation of synoptic overview of corporate threats and proposal of corresponding solutions of those. The implication is to summarize results from previous empirical studies to create enough theoretic foundation for the future research.

  16. Worldwide Threat Assessment of the U.S. Intelligence Community

    Science.gov (United States)

    2011-03-10

    seen a waning global commitment to immunization, resulting in a resurgence of vaccine -preventable diseases, particularly polio and measles . This is due...West by exploiting anti-Islamic incidents , legislation, and activities, such as threats of Koran burning and restrictions on Muslim attire...the expense of Annenia. Heightened rhetoric and distrust on both sides and violent incidents wong the Line of Contact throughout last summer increase

  17. Globalisation of water: Opportunities and threats of virtual water trade

    OpenAIRE

    Chapagain, A.K.

    2006-01-01

    Where the river basin is generally seen as the appropriate unit for analyzing freshwater availability and use, it becomes increasingly important to put freshwater issues in a global context. The book analyses the opportunities and threats of international virtual water trade in the context of solving national and regional problems of water shortages. Central questions addressed in the study are: What are the fluxes of virtual water related to the international trade of products? Is the import...

  18. MANAGEMENT OF MAIN THREATS DURING REALISATION OF BIG SPORT EVENTS

    OpenAIRE

    Agnieszka Ulfik; Stefan Nowak

    2009-01-01

    Organizing major sporting events is inextricably linked with reducing therisks. These risks may be caused by the uncontrolled behavior of the crowd, different typeof accidents or hardware failure as well as terrorist threats. Other main factors creatingdangers currently can be included: problems with safety of filling structure withaudience, control against carrying in dangerous objects, fans reactions which canchange into aggressive behaviours. Correct designing of all elements of sport spec...

  19. Ransomware: A Rising Threat of new age Digital Extortion

    OpenAIRE

    Bhardwaj, Akashdeep; Subrahmanyam, G.V.B.; Avasthi, Vinay; Sastry, Hanumat

    2015-01-01

    This article attempts to discover the surreptitious features of ransomware and to address it in information systems security research. It intends to elicit attention with regard to ransomware, a newly emerged cyber threat using such encryption technology as RSA, and to help both academic researchers and IT practitioners understand the technological characteristics of ransomware, along with its severity analysis. As ransomware infections continue to rise and attacks employing refined algorithm...

  20. Biosecurity: Addressing the Threats of Bioterrorism and Infectious Diseases

    Science.gov (United States)

    2010-03-22

    state and local assistance programs to prepare against threats or incidents of terrorism and other catastrophic events.32 To boost the resiliency and...the collective response of the government and the community against a bioterrorist incident . After the SARS episode, the Singapore government realised...2000), 219. 17 The introduction of smallpox and other imported diseases such as measles and pneumonic plague to the Americas in the 1500s had greatly

  1. Transatlantic Relations - Are Alliances a Function of an External Threat

    Science.gov (United States)

    2005-06-01

    event an external threat does arise, like the attack on the World Trade Center in New York on September 11, 2001, alliances are able to overcome self...Relations. (Washington D.C.: The Nixon Center , June 1999), 69. 16 Toynbee called: “Annihilation without...Under President Pompidou , French European policy gave priority to economic issues, with a reinforced attempt at engagement within Europe, for example

  2. Nonparametric Bayesian Context Learning for Buried Threat Detection

    Science.gov (United States)

    2012-01-01

    route clearance patrols, the vast majority of GPR data collected in the field will be free of buried threats. In current processing strategies , the large...mining competition spearheaded by Netflix , which sought to improve its movie recommen- dation algorithm [146]. As more customer data becomes available...no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control

  3. Pattern-Based Design of Insider Threat Programs

    Science.gov (United States)

    2014-12-01

    December 2014 TECHNICAL NOTE CMU /SEI-2014-TN-024 CERT Division http://www.sei.cmu.edu Copyright 2014 Carnegie Mellon University This...gineering Institute at permission@sei.cmu.edu. * These restrictions do not apply to U.S. government entities. DM-0001852 CMU /SEI-2014-TN-024 | i...Thumbnail Sketches 13 References/Bibliography 18 CMU /SEI-2014-TN-024 | ii List of Figures Figure 1: Preliminary Insider Threat Mitigation

  4. Finding the Balance to Combat a Hybrid Threat

    Science.gov (United States)

    2013-05-23

    Russell W. Glenn adds to Hoffman’s definition by stating, “a hybrid threat may employ political, military, economic, social , and information means, as...bud of the plant. Besides illegal opium, the poppy is used in the production of morphine . 134Department of Defense, JP 1-02, Department of Defense...consideration of the people through continuous interaction , but also supported building a rapport with the people, and promoting security through a

  5. Qualia: A Prescription for Developing a Quality Health Threat Assessment

    Science.gov (United States)

    2008-12-01

    Figure 10. Health Threat Assessment Strategy Canvas . (From: Kim and Mauborgne, 2005, p. 29...cost (p. 13). The development of a blue ocean strategy canvas includes consideration of four factors. These factors answer the questions, “What...is that of a starfish as opposed to that of a spider . The starfish organization represents a network of nodes that will continue to thrive if a leg

  6. Trojans in Early Design Steps—An Emerging Threat

    OpenAIRE

    Polian, Ilia; Becker, Georg T.; Regazzoni, Francesco

    2016-01-01

    Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design process. We show that third-party intellectual property cores and CAD tools constitute realistic attack surfaces and that even system specification can be targeted by adversaries. We discuss the devastating damage potential o...

  7. Sugary beverages represent a threat to global health.

    Science.gov (United States)

    Popkin, Barry M

    2012-12-01

    Sugary beverages represent a major global threat to the health of all populations. The shifts in distribution, marketing, and sales have made them the plague of the globe in terms of obesity, diabetes, and a host of other chronic health problems. The fructose-laden beverages have unique properties that lead to lack of dietary compensation and direct adverse effects on our health. Global efforts to limit marketing and sales are necessary to protect the health of the planet.

  8. Ransomware: A Rising Threat of new age Digital Extortion

    OpenAIRE

    Bhardwaj, Akashdeep; Subrahmanyam, G. V. B.; Avasthi, Vinay; Sastry, Hanumat

    2015-01-01

    This article attempts to discover the surreptitious features of ransomware and to address it in information systems security research. It intends to elicit attention with regard to ransomware, a newly emerged cyber threat using such encryption technology as RSA, and to help both academic researchers and IT practitioners understand the technological characteristics of ransomware, along with its severity analysis. As ransomware infections continue to rise and attacks employing refined algorithm...

  9. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    NAME OF RESPONSIBLE PERSON COL Marc A. Spinuzzi a. REPORT b. ABSTRACT c. THIS PAGE 19b. PHONE NUMBER (include area code) (U) (U) (U) 1+850-420...criminals and terrorists makes the proliferation of TOC a pressing national security concern.”4 Technological changes have also amplified the effects of...provide meaningful explanations for the seriousness and threat of organized crime,13 or a sound basis for the measurement of organized crime.14 The

  10. Artificial Intelligence: Threat or Boon to Radiologists?

    Science.gov (United States)

    Recht, Michael; Bryan, R Nick

    2017-08-19

    The development and integration of machine learning/artificial intelligence into routine clinical practice will significantly alter the current practice of radiology. Changes in reimbursement and practice patterns will also continue to affect radiology. But rather than being a significant threat to radiologists, we believe these changes, particularly machine learning/artificial intelligence, will be a boon to radiologists by increasing their value, efficiency, accuracy, and personal satisfaction. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  11. Surveillance of the bioterrorist threat: a primary care response.

    Science.gov (United States)

    Fleming, D M; Barley, M A; Chapman, R S

    2004-03-01

    Threats from bioterrorism are of national and international concern. We outline a system of disease surveillance covering a selection of diseases linked to potential bioterrorist threats, based on the weekly returns service of the Royal College of General Practitioners and covering a surveillance population of 650,000 in England and Wales. Practices record working diagnoses and the episode type (distinguishing new episodes of illness from ongoing consultations) on patients' computerised medical records. These are interrogated twice weekly by using automated routines. The registered population and persons consulting for each Read code (group of codes) are counted in sex and age specific groups and the data forwarded electronically to the Research Unit, where the results are consolidated by region (North, Central, South). Weekly incidence rates between October 2001 and September 2002 were compared with the weekly average over the past seven years for 13 selected conditions. Detailed data are presented for three conditions (asthma, infections of the skin, disorders of the peripheral nervous system). For asthma increased incidence was reported in weeks 31 and 32 of 2002, predominantly in the Central region. For the other two conditions no unusual peaks of incidence were observed in any region. Operational research based on disciplined recording of morbidity in general practice can deliver timely surveillance data on bioterrorist threats.

  12. THE THREATS TO THE ECONOMIC SAFETY OF STAVROPOL REGION

    Directory of Open Access Journals (Sweden)

    I.V. Novikova

    2009-12-01

    Full Text Available The article deals with defining of threats to the economic safety of Stavropol region in food, manufacturing, infrastructural, financial, social and innovative industries of the region. Among these threats besides those relating to the Russian Federation on the whole there are also specific regional threats. They are: extremis; resource depletion; uncivilized redistribution of property; the reduction of tax potential; the destruction of the regional agro-industrial sector; the depletion of agricultural (arable land; the low level of competitiveness of processing industries; the breakdown of social welfare in rural areas; the price and tariff increases exceeding the population income growth; the increasing differentiation of population income and its poverty level; the high level of unemployment; the decline in material and technical and financial opportunities of businesses in procedure implementation and innovation mastering; the drain on workers from the region and the dismantling of sector research; the drop in all kinds of financing; the decline of research and development activities efficiency; regular lowering of domestic innovative markets; the low level of innovative infrastructure development; the availability of high investment risks; low effectiveness of carried out scientific and technological programmers and projects.

  13. Parents' perceptions of skin cancer threat and children's physical activity.

    Science.gov (United States)

    Tran, Alexander D; Aalborg, Jenny; Asdigian, Nancy L; Morelli, Joseph G; Mokrohisky, Stefan T; Dellavalle, Robert P; Berwick, Marianne; Box, Neil F; Crane, Lori A

    2012-01-01

    Sun exposure is a major risk factor for skin cancer, but without physical activity, children are at risk of childhood obesity. The objective of this study was to explore relationships between parental perceptions of skin cancer threat, sun protection behaviors, physical activity, and body mass index (BMI) in children. This is a cross-sectional analysis nested within the Colorado Kids Sun Care Program sun safety intervention trial. In summer 2007, parent telephone interviews provided data on demographics, perceptions of skin cancer threat, sun protection behaviors, and physical activity. Physical examinations provided data on phenotype, freckling, and BMI. Data from 999 Colorado children born in 1998 were included in analysis. We used analysis of variance, Spearman's rho (ρ) correlation, and multivariable linear regression analysis to evaluate relationships with total amount of outdoor physical activity. After controlling for sex, race/ethnicity, skin color, and sun protection, regression analysis showed that each unit increase in perceived severity of nonmelanoma skin cancer was associated with a 30% increase in hours of outdoor physical activity (P = .005). Hours of outdoor physical activity were not related to perceived severity of melanoma or perceived susceptibility to skin cancer. BMI-for-age was not significantly correlated with perceptions of skin cancer threat, use of sun protection, or level of physical activity. The promotion of sun safety is not likely to inhibit physical activity. Skin cancer prevention programs should continue to promote midday sun avoidance and sun protection during outdoor activities.

  14. Astrology Pseudoscience and a Discussion About Its Threats to Society

    Directory of Open Access Journals (Sweden)

    Tevfik UYAR

    2016-05-01

    Full Text Available Astrology, a pseudoscience, is highly popular in Turkey. Astrologers, who are its practitioners, produce discourses in the scientific field at the media and at their own platforms. Furthermore, it is possible to find some instances of astrology related activities in Turkish universities. In this article, demarcation of science from pseudoscience and the pseudoscientific status of astrology were discussed in a first place. Next, threats of astrological discourse within economic, educational and medical fields and their threats to society were expressed with some examples. Instances of the astrological activities within higher education institutions, such as an astrology-based master degree thesis, the astrology certificate programs, and an astrology column in an official medical school magazine were evaluated, and it was put forward that they contributed to increase the level of threat and it was also claimed that the existence of astrological activities in the universities contradicts the main purpose and principles of the higher education. In conclusion, some regulatory actions like the implementation of the scientific literacy and demarcation problem to each level of educational curriculum, a general policy for excluding the pseudoscience from higher education institutions and a recommended health warning at the top of the astrology were suggested.

  15. DETERMINANTS OF DISTRIBUTION OF TERRORIST THREAT IN NORTH CAUCASUS

    Directory of Open Access Journals (Sweden)

    Beslan A. Tarchokov

    2016-01-01

    Full Text Available Our country, like the rest of the world, has been for many years, it is taking all possible measures in order to find an effective response to terrorism, which, sadly aware, has indeed become one of the main threats to all mankind, one of the most burning issues of the day.Theoretical and practical problems of the nature and spread of the modern terrorist threat in the North Caucasus are subject to careful scrutiny and a greater or lesser extent taken into account in the practice of public authorities.In recent years, in the North Caucasus region remains sufficiently high level of terrorist threats. Illegal armed groups, despite the adoption of various measures, including force action on the part of the security services and police forces, still retain the ability to recover its numerical capacity and infrastructure.Terrorist practice under religious banners is the most well-known, very widespread and prolonged in time. Increasingly growing terrorist potential, largely with religious overtones, it is formed and acutely manifested in the present time in connection with a number of negative processes characteristic of globalization.The special features that define the ability to determine the religion as an effective ideological cover acquire certain conditions extremist, including terrorist orientation, include deep rootedness of religion in the minds of the society as a certain unifying symbols as socialization factor for certain people, their ideas and actions. 

  16. Postural threat influences conscious perception of postural sway.

    Science.gov (United States)

    Cleworth, Taylor W; Carpenter, Mark G

    2016-05-04

    This study examined how changes in threat influenced conscious perceptions of postural sway. Young healthy adults stood on a forceplate mounted to a hydraulic lift placed at two heights (0.8m and 3.2m). At each height, subjects stood quietly with eyes open and eyes closed for 60s. Subjects were instructed to either stand normal, or stand normal and track their perceived sway in the antero-posterior plane by rotating a hand-held potentiometer. Participants reported an increased level of fear, anxiety, arousal and a decreased level of balance confidence when standing at height. In addition, postural sway amplitude decreased and frequency increased at height. However, there were no effects of height on perceived sway. When standing under conditions of increased postural threat, sway amplitude is reduced, while sway perception appears to remain unchanged. Therefore, when threat is increased, sensory gain may be increased to compensate for postural strategies that reduce sway (i.e. stiffening strategy), thereby ensuring sufficient afferent information is available to maintain, or even increase the conscious perception of postural sway. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  17. From WMD to WME: An Ever-Expanding Threat Spectrum

    Directory of Open Access Journals (Sweden)

    Bowman H. Miller

    2015-10-01

    Full Text Available One of the challenges the United States and its intelligence community confronts today, if not the foremost challenge, is the girth of its national security problem set. The array of threat types, as well as the potential sources of those threats, is unprecedented and growing. The burdensome task for intelligence at all times, but especially given the present rate of change and the increasing porosity of borders, is to try to cope with an escalating mix of challenges and rising expectations of what intelligence can provide. Existing tasks persist; they are not replaced. The number and types of potentially threatening actors have exploded. Nation-states are now joined by countless ethno-religious groupings, terrorists, criminals of all stripes, drug cartels, transnational movements and issue groups, and malevolent and delinquent individuals. Threats come from all quarters and in all sizes these days, and the mission of intelligence, i.e., to track indicators to provide warning and to reduce uncertainty for decision-makers, is monumental.

  18. Wearable Ring-Based Sensing Platform for Detecting Chemical Threats.

    Science.gov (United States)

    Sempionatto, Juliane R; Mishra, Rupesh K; Martín, Aida; Tang, Guangda; Nakagawa, Tatsuo; Lu, Xiaolong; Campbell, Alan S; Lyu, Kay Mengjia; Wang, Joseph

    2017-10-11

    This work describes a wireless wearable ring-based multiplexed chemical sensor platform for rapid electrochemical monitoring of explosive and nerve-agent threats in vapor and liquid phases. The ring-based sensor system consists of two parts: a set of printed electrochemical sensors and a miniaturized electronic interface, based on a battery-powered stamp-size potentiostat, for signal processing and wireless transmission of data. A wide range of electrochemical capabilities have thus been fully integrated into a 3D printed compact ring structure, toward performing fast square-wave voltammetry and chronoamperometric analyses, along with interchangeable screen-printed sensing electrodes for the rapid detection of different chemical threats. High analytical performance is demonstrated despite the remarkable miniaturization and integration of the ring system. The attractive capabilities of the wearable sensor ring system have been demonstrated for sensitive and rapid voltammetric and amperometric monitoring of nitroaromatic and peroxide explosives, respectively, along with amperometric biosensing of organophosphate (OP) nerve agents. Such ability of the miniaturized wearable sensor ring platform to simultaneously detect multiple chemical threats in both liquid and vapor phases and alert the wearer of such hazards offers considerable promise for meeting the demands of diverse defense and security scenarios.

  19. Technological Innovations to Counter CBRNE Threat Vectors and Ecotage

    Science.gov (United States)

    Vaseashta, Ashok

    The ubiquitous presence of sensors for enhanced situational awareness necessitates an innovative, articulate, and focused review of their design, architecture, functionality, and interoperability. A comprehensive overview of the latest and state-of-the art technological innovations in point and stand-off sensing/detection platforms with the objective of countering threats arising from chemical-biological-nuclear-high yield explosives (CBRNE) is the focus of this investigation. Ongoing research efforts and future research directions based on advanced approaches, including nanomaterials to develop materials, devices, and systems for potential use in sensing and detection of such threat vectors are articulated. The concept of advanced sciences convergences is introduced to examine the feasibility of potentially new and innovative research directions for persistent surveillance of CBRNE agents and infectious diseases. The intentional release of such agents in the environment constitutes ecological sabotage. Advanced sensing/detection platforms for CBRNE are used to detect threats to the environment. Issues associated with the use of nanomaterials regarding societal implications and dual-use concerns are addressed by studying fate and transport and the development of guidelines for a risk-assessment model. A roadmap of the future of nanomaterials, in terms of complexity, a nexus of disciplines, and its emerging potential to provide advanced, futuristic, and a paradigm-shifting platform is presented.

  20. Detecting Threat E-mails using Bayesian Approach

    CERN Document Server

    Banday, M Tariq; Jan, Tariq R; Shah, Nisar A

    2011-01-01

    Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of terror network, and v) information gathering. A major challenge for law enforcement and intelligence agencies is efficient and accurate gathering of relevant and growing volume of crime data. This paper reports on use of established Na\\"ive Bayesian filter for classification of threat e-mails. Efficiency in filtering threat e-mail by use of three different Na\\"ive Bayesian filter approaches i.e. single keywords, weighted multiple keywords and weighted multiple keywords with keyword context matching are evaluated on a threat e-mail corpus created by extracting data from sources that are very close to terrorism.

  1. Attention bias to threat indicates anxiety differences in sheep.

    Science.gov (United States)

    Lee, Caroline; Verbeek, Else; Doyle, Rebecca; Bateson, Melissa

    2016-06-01

    Humans and animals show increased attention towards threatening stimuli when they are in increased states of anxiety. The few animal studies that have examined this phenomenon, known as attention bias, have applied environmental manipulations to induce anxiety but the effects of drug-induced anxiety levels on attention bias have not been demonstrated. Here, we present an attention bias test to identify high and low anxiety states in sheep using pharmacological manipulation. Increased anxiety was induced using 1-methyl-chlorophenylpiperazine (m-CPP) and decreased anxiety with diazepam, and then we examined the behaviour of sheep in response to the presence of a dog as a threat. Increased attention towards the threat and increased vigilance were shown in sheep that received the m-CPP and reduced in sheep receiving the diazepam. The modulated attention towards a threat displayed by the m-CPP and diazepam animals suggests that attention bias can assess different levels of anxiety in sheep. Measuring attention bias has the potential to improve animal welfare assessment protocols.

  2. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  3. Familiarity promotes the blurring of self and other in the neural representation of threat

    OpenAIRE

    2012-01-01

    Neurobiological investigations of empathy often support an embodied simulation account. Using functional magnetic resonance imaging (fMRI), we monitored statistical associations between brain activations indicating self-focused threat to those indicating threats to a familiar friend or an unfamiliar stranger. Results in regions such as the anterior insula, putamen and supramarginal gyrus indicate that self-focused threat activations are robustly correlated with friend-focused threat activatio...

  4. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    OpenAIRE

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, ste...

  5. The Threat Effect of Active Labor Market Programs: A Systematic Review

    DEFF Research Database (Denmark)

    Filges, Trine; Hansen, Anne Toft

    2017-01-01

    This paper is a systematic review of the threat effect of active labor market programs for unemployed individuals. The threat effect is the induced change in the hazard rate of leaving unemployment prior to program participation. Studies included in the review all estimated a threat effect...... a hazard rate of 1.27 for the pooled estimate. It has thus been concluded that active labor market programs constitute a significant threat effect....

  6. Environmental consequences of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Toon, Owen B. [Department of Atmospheric and Oceanic Sciences, Laboratory for Atmospheric and Space Physics, University of Colorado, Boulder, Colorado (United States); Robock, Alan [Department of Environmental Sciences, Rutgers University, New Brunswick, New Jersey (United States); Turco, Richard P. [Department of Atmospheric and Oceanic Sciences, University of California, Los Angeles, Los Angeles, California (United States)

    2014-05-09

    A regional war involving 100 Hiroshima-sized weapons would pose a worldwide threat due to ozone destruction and climate change. A superpower confrontation with a few thousand weapons would be catastrophic.

  7. Basal cortisol is positively correlated to threat vigilance in patients with psychogenic nonepileptic seizures

    NARCIS (Netherlands)

    Bakvis, P.; Spinhoven, P.; Roelofs, K.

    2009-01-01

    Previous studies have provided evidence for a vigilant attentional bias toward threat stimuli and increased basal diurnal cortisol levels in patients with psychogenic nonepileptic seizures (PNES). Because cortisol levels may be predictive of threat vigilance, we reanalyzed previous data on threat vi

  8. Hot or cold: is communicating anger or threats more effective in negotiation?

    NARCIS (Netherlands)

    Sinaceur, M.; van Kleef, G.A.; Neale, M.A.; Adam, H.; Haag, C.

    2011-01-01

    Is communicating anger or threats more effective in eliciting concessions in negotiation? Recent research has emphasized the effectiveness of anger communication, an emotional strategy. In this article, we argue that anger communication conveys an implied threat, and we document that issuing threats

  9. Attitudes toward Stillbirth and Death Threat Level in a Sample of Obstetricians.

    Science.gov (United States)

    Kirkley-Best, Elizabeth; And Others

    1985-01-01

    Obstetricians and obstetrical residents (N=70) were polled on their attitudes regarding stillbirth and simultaneously were assessed for their level of death threat as measured by the Threat Index. No effect of death threat level on attitudes toward stillbirth was observed, even when extreme scores were isolated and compared. (Author/NRB)

  10. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  11. Strategic threat management: an exploration of nursing strategies in the pediatric intensive care unit.

    Science.gov (United States)

    Durso, Francis T; Ferguson, Ashley N; Kazi, Sadaf; Cunningham, Charlene; Ryan, Christina

    2015-03-01

    Part of the work of a critical care nurse is to manage the threats that arise that could impede efficient and effective job performance. Nurses manage threats by employing various strategies to keep performance high and workload manageable. We investigated strategic threat management by using the Threat-Strategy Interview. Threats frequently involved technology, staff, or organizational components. The threats were managed by a toolbox of multifaceted strategies, the most frequent of which involved staff-, treatment- (patient + technology), examination- (patient + clinician), and patient-oriented strategies. The profile of strategies for a particular threat often leveraged work facets similar to the work facet that characterized the threat. In such cases, the nurse's strategy was directed at eliminating the threat (not working around it). A description at both a domain invariant level - useful for understanding strategic threat management generally - and a description at an operational, specific level - useful for guiding interventions-- are presented. A structural description of the relationship among threats, strategies, and the cues that trigger them is presented in the form of an evidence accumulation framework of strategic threat management.

  12. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  13. Stigma and Glucose Levels: Testing Ego Depletion and Arousal Explanations of Stereotype Threat Effects

    Science.gov (United States)

    Penner, Andrew M.; Willer, Robb

    2011-01-01

    Stereotype threat research shows that when stigmatized group membership is made salient, group members' cognitive performance is lowered; however, the mechanism through which this effect operates is not well understood. This study tests between arousal and ego depletion accounts of stereotype threat by examining whether stereotype threat effects…

  14. Hot or cold: is communicating anger or threats more effective in negotiation?

    NARCIS (Netherlands)

    M. Sinaceur; G.A. van Kleef; M.A. Neale; H. Adam; C. Haag

    2011-01-01

    Is communicating anger or threats more effective in eliciting concessions in negotiation? Recent research has emphasized the effectiveness of anger communication, an emotional strategy. In this article, we argue that anger communication conveys an implied threat, and we document that issuing threats

  15. Stigma and Glucose Levels: Testing Ego Depletion and Arousal Explanations of Stereotype Threat Effects

    Science.gov (United States)

    Penner, Andrew M.; Willer, Robb

    2011-01-01

    Stereotype threat research shows that when stigmatized group membership is made salient, group members' cognitive performance is lowered; however, the mechanism through which this effect operates is not well understood. This study tests between arousal and ego depletion accounts of stereotype threat by examining whether stereotype threat effects…

  16. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  17. Attitudes toward Peers with Physical Disabilities at High School: Applying the Integrated Threat Theory

    Science.gov (United States)

    Bustillos, Antonio; Silvan-Ferrero, Maria del Prado

    2013-01-01

    The aim of this work was to study attitudes toward people with disabilities from the viewpoint of the integrated threat theory of prejudice. This theory postulates that threat may cause negative attitudes toward a group and posits that such threat may come from different sources. To test this model, a study was carried out with high school…

  18. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Eck, van P.A.T.; Pernici, B.; Gulla, J. A.

    2007-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not

  19. The effects of physical threat on team processes during complex task performance

    NARCIS (Netherlands)

    Kamphuis, W.; Gaillard, A.W.K.; Vogelaar, A.L.W.

    2011-01-01

    Teams have become the norm for operating in dangerous and complex situations. To investigate how physical threat affects team performance, 27 threeperson teams engaged in a complex planning and problem-solving task, either under physical threat or under normal conditions. Threat consisted of the pos

  20. The Role of Threat Assessment and Management in College Counseling: How's That Net Working?

    Science.gov (United States)

    Pollard, Jeffrey W.; Flynn, Christopher; Eells, Gregory T.

    2015-01-01

    The authors respond to Goodwin's (2014) "Threat Assessment: Are We Using the Wrong Nets?" and use that article as a springboard to discuss various aspects of the threat assessment and management process. We find that Goodwin misses critical elements of the threat assessment and management process, conflates the process with two types of…