68 Matching Results

Search Results

Advanced search parameters have been applied.

Patterns of Cardiac Arousal in the Classroom Determined by Telemetry During Response to Speech Messages

Description: The purposes of this study were (1) to determine the relationship between recitation in the classroom and changes in the cardiac rate, (2) to determine the effects on cardiac rate of anticipation of recitation and tests, (3) to determine the effects on cardiac rate of compliments and assurance directed toward students by the teacher, and (4) to determine the effects on the cardiac rate of verbal threats and ridicule.
Date: August 1969
Creator: Manning, Reuben David
Partner: UNT Libraries

Nothing to fear? Neural systems supporting avoidance behavior in healthy youths

Description: Article discussing neural systems supporting avoidance behavior in healthy youths. The author's investigation examined brain activation patterns to threatening cues that prompted avoidance in healthy youths.
Date: August 15, 2010
Creator: Schlund, Michael W.; Siegle, Greg J.; Ladouceur, Cecile D.; Silk, Jennifer S.; Cataldo, Michael F.; Forbes, Erika E. et al.
Partner: UNT College of Public Affairs and Community Service

Countering Overseas Threats: DOD and State Need to Address Gaps in Monitoring of Security Equipment Transferred to Lebanon

Description: A letter report issued by the Government Accountability Office with an abstract that begins "The United States allocated $671 million for Lebanese security forces from fiscal year 2009 through fiscal year 2013. Of these total allocated funds, $477 million, or 71 percent, had been disbursed or committed by the end of fiscal year 2013. Nearly all of the allocations made in fiscal years 2009 through 2011 had been disbursed or committed. For the largest program, Foreign Military Financing, the Department of Defense (DOD) had committed about $352 million of the $481 million allocated in fiscal years 2009 through 2013."
Date: February 26, 2014
Creator: United States. Government Accountability Office.
Partner: UNT Libraries Government Documents Department

Diffuse Security Threats: Technologies for Mail Sanitization Exist, but Challenges Remain

Description: A briefing report issued by the General Accounting Office with an abstract that begins "The attacks of September 11, 2001, and recent anthrax exposures have heightened long-standing concerns about the proliferation of biological weapons and the United States' ability to quickly respond to such incidents. The United States must identify technologies to protect against biological weapons, such as anthrax, without harming humans. Ionizing radiation has emerged as the leading current technology for mail sanitization. However, ionizing radiation may have adverse effects on mailed material, and it may not be applicable to some types of parcels, boxes, and large packages. In addition, applying ionizing radiation in a mail-processing environment requires radiation and biohazard precautions, such as shielding the radiation source and wearing protective gear."
Date: April 23, 2002
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department

Countering Overseas Threats: Gaps in State Department Management of Security Training May Increase Risk to U.S. Personnel

Description: A letter report issued by the Government Accountability Office with an abstract that begins "Using data from multiple sources, GAO determined that 675 of 708 Department of State (State) personnel and all 143 U.S. Agency for International Development (USAID) personnel on assignments longer than 6 months (assigned personnel) in the designated high-threat countries on March 31, 2013, were in compliance with the Foreign Affairs Counter Threat (FACT) training requirement. GAO found that the remaining 33 State assigned personnel on such assignments had not complied with the mandatory requirement. For State and USAID personnel on temporary duty of 6 months or less (short-term TDY personnel), GAO was unable to assess compliance because of gaps in State's data. State does not systematically maintain data on the universe of U.S. personnel on short-term TDY status to designated high-threat countries who were required to complete FACT training. This is because State lacks a mechanism for identifying those who are subject to the training requirement. These data gaps prevent State or an independent reviewer from assessing compliance with the FACT training requirement among short-term TDY personnel. According to Standards for Internal Control in the Federal Government , program managers need operating information to determine whether they are meeting compliance requirements."
Date: March 10, 2014
Creator: United States. Government Accountability Office.
Partner: UNT Libraries Government Documents Department

MX Missile Basing

Description: A study by the Office of Technology Assessment (OTA) that examines a new intercontinental ballistic missile known as the MX, identifies MX basing modes and assesses "the major advantages, disadvantages, risks, and uncertainties of each" (p. 3).
Date: September 1981
Creator: United States. Congress. Office of Technology Assessment.
Partner: UNT Libraries Government Documents Department

Diffuse Security Threats: USPS Air Filtration Systems Need More Testing and Cost Benefit Analysis before Implementation

Description: A letter report issued by the General Accounting Office with an abstract that begins "Following the anthrax attacks of October 2001, the United States Postal Service (USPS) has started to look at various technologies that could be implemented in the event of another bioterror attack. The high-efficiency particulate air (HEPA) filtration system is being used as a prototype at two facilities and is planned for implementation throughout the country. HEPA filtering technology is the state-of-the-art technology for the removal of particulate biohazards and other particles of micron-sized range. USPS has not adequately tested the HEPA filtration system to confirm that it will meet its intended purpose of trapping anthrax spores and its secondary purpose of cleaning the mail processing equipment. USPS's testing has not shown conclusively (1) the HEPA filtration system's ability to trap released hazards and other contaminants, and (2) what level of hazards or contaminants could be released into the mail processing environment as a result of the air filtration system's design. Furthermore, USPS has not verified through testing that the air filtration system will not interfere with the air sampling and detection equipment. Even though HEPA filtration systems could reduce the risk of exposure to biohazards, they may negate the benefits of other technologies being considered by USPS to protect its employees and customers in the event of another anthrax attack. Finally, the design and installation of the HEPA filtration system requires custom modification to USPS equipment nationwide and will likely cost more than USPS projected in its Emergency Preparedness Plan."
Date: August 22, 2002
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department

Reducing Wildfire Threats: Funds Should Be Targeted to the Highest Risk Areas

Description: Testimony issued by the General Accounting Office with an abstract that begins "Pursuant to a congressional request, GAO discussed the efforts to reduce the future risk of catastrophic wildfires to human lives and property, focusing on (1) why conditions on federal forests and rangelands have reached the point that they pose a significant risk to nearby communities and to the ecological sustainability of lands and natural resources; (2) the history and status of efforts by the Forest Service and the Department of the Interior to reduce the risk; and (3) budget-related issues that should be addressed to better ensure that the agencies spend effectively and account accurately for funds appropriated to reduce hazardous fuels."
Date: September 13, 2000
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department

When Patients Threaten to Kill: A Texas View of Tarasoff

Description: A serious problem confronts the psychologist whose patient threatens, within the privacy of a therapy session, to inflict violent harm upon some third person. Therapists in Texas face a risk of unjust legal liability because of a lack of widely accepted, clearly and fully articulated standards. A questionnaire was submitted to Texas psychologists and Texas judges of mental illness courts. It involved a hypothetical case of a patient who threatened to kill his girlfriend. The hypothesis that no consensus exists at present among psychologists or judges appears to be supported by the data. Comparisons are made of the attitudes of psychologists and judges. Correlations between psychologist attitudes and certain demographic and practice variables are reported. The need for new legislation in Texas concerning legal liability of therapists for the violent behavior of patients is discussed. Proposed legislation for Texas is set out. Among its important features are (1) recognition that continued therapy is itself a protective strategy and (2) establishment of good faith as the standard by which the behavior of the therapist is to be judged.
Date: August 1986
Creator: Morgan, Minor Latham
Partner: UNT Libraries

Adapting to Climate Change in Europe and Central Asia

Description: Contrary to popular perception, ECA faces significant threats from climate change, with a number of the most serious risks already in evidence. Vulnerability over the next ten to twenty years will be dominated by socio‐economic factors and legacy issues. Even countries and sectors that stand to benefit from climate change are poorly positioned to do so. The next decade offers a window of opportunity for ECA countries to make their development more resilient to climate change while reaping numerous co‐benefits.
Date: June 1, 2009
Creator: The International Bank for Reconstruction and Development / The World Bank
Partner: UNT Libraries

General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses

Description: This research sought to shed light on information systems security (ISS) by conceptualizing an organization's use of countermeasures using general deterrence theory, positing a non-recursive relationship between threats and countermeasures, and by extending the ISS construct developed in prior research. Industry affiliation and organizational size are considered in terms of differences in threats that firms face, the different countermeasures in use by various firms, and ultimately, how a firm's ISS effectiveness is affected. Six information systems professionals were interviewed in order to develop the appropriate instruments necessary to assess the research model put forth; the final instrument was further refined by pilot testing with the intent of further clarifying the wording and layout of the instrument. Finally, the Association of Information Technology Professionals was surveyed using an online survey. The model was assessed using SmartPLS and a two-stage least squares analysis. Results indicate that a non-recursive relationship does indeed exist between threats and countermeasures and that countermeasures can be used to effectively frame an organization's use of countermeasures. Implications for practitioners include the ability to target the use of certain countermeasures to have desired effects on both ISS effectiveness and future threats. Additionally, the model put forth in this research can be used by practitioners to both assess their current ISS effectiveness as well as to prescriptively target desired levels of ISS effectiveness.
Date: May 2009
Creator: Schuessler, Joseph H.
Partner: UNT Libraries

[News Script: Korea]

Description: Script from the WBAP-TV/NBC station in Fort Worth, Texas, relating a news story.
Date: August 17, 1969, 10:00 p.m.
Creator: WBAP-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections

[News Script: Statler]

Description: Script from the WBAP-TV station in Fort Worth, Texas, covering a news story about a false bomb threat at the Statler hotel in Dallas.
Date: June 30, 1957
Creator: WBAP-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections

2013 Proceedings of the Eight Annual Cyber Security and Information Intelligence Research Workshop

Description: Today's cyberspace is a powerful, virtual environment enabled by our global digital infrastructure that provides a bright landscape for commerce, science, education, communication, and government. The future of America's prosperity hinges on rebalancing cyberspace to mitigate threats and maximize benefits, ensuring security and privacy in a constantly changing adversarial environment. Recognizing this great need, we requested original paper submissions in four general areas derived from the Federal Cybersecurity R&D program thrusts: Designed-In-Security (DIS) Builds the capability to design, develop, and evolve high-assurance, software-intensive systems predictably and reliably while effectively managing risk, cost, schedule, quality, and complexity. Tailored Trustworthy Spaces (TTS) Provides flexible, adaptive, distributed trust environments that can support functional and policy requirements arising from a wide spectrum of activities in the face of an evolving range of threats--recognizing the user's context and evolves as the context evolves. Moving Target (MT) Enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency. Cyber Economic Incentives (CEI) Develops effective incentives to make cybersecurity ubiquitous, including incentives affecting individuals and organizations.
Date: January 2013
Creator: Sheldon, Frederick T.; Giani, Annarita N.; Krings, Axel & Abercrombie, Robert K.
Partner: UNT Libraries Government Documents Department

Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

Description: Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.
Date: September 1, 2006
Creator: Darby, John L.
Partner: UNT Libraries Government Documents Department

[News Clip: Police Await New Bomb Threat Clues]

Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story about an investigation into a bomb threat linked to a complex, "treasure hunt" extortion plot against an unnamed chain store in Texas.
Date: August 27, 1956
Creator: WBAP-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections