Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 65
Full-Text Articles in Entire DC Network
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
VMASC Publications
Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …
Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker
Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker
Publications
The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthe-sizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) litera-ture. This methodology closes the gap between academic research and professional practice and aids in providing timely, practical insights related to cybersecurity and safety in virtual care environments. As …
Relational Uncertainty In Romantic Relationships: The Influence Of Attachment And Relational Maintenance Behaviors, Jay Cruz
Graduate Theses and Dissertations
This study examined the influence of attachment and relational maintenance behaviors on relational uncertainty. Ninety individuals currently involved in romantic relationships completed measures assessing their attachment (i.e., secure, preoccupied, dismissive, fearful), relational uncertainties (i.e., self, partner, relationship), and relational maintenance behaviors (i.e., shared tasks, shared networks, positivity, openness, assurances). Findings demonstrated that both secure attachment and fearful attachment were not significantly associated with self, partner, or relationship uncertainty. In addition, dismissive attachment was negatively associated with partner uncertainty and positively associated with relationship uncertainty. Preoccupied attachment was positively associated with both partner and relationship uncertainty. Furthermore, secure attachment was positively …
Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor
Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor
International Bulletin of Political Psychology
There have been reports of a growing number of Transportation Security Administration (TSA) agents calling in sick and refusing to work for no pay (1). The immediate question becomes, what’s the impact on aviation security? The answer is a negative one, but not as negative as one might think, and one only adding to festering, pre-shutdown problems.
Security Analysis Of The Uconn Husky One Card, Trevor Phillips
Security Analysis Of The Uconn Husky One Card, Trevor Phillips
Honors Scholar Theses
The “Husky One Card” is the name given to student IDs at the University of Connecticut. It can identify students, faculty, and staff in a variety of situations. The One Card is used for meal plans, Husky Bucks (an equivalent of money, but valid only in the Storrs area), residence hall/ university facility access, and student health services. The current Husky One Card consists of a picture identification on the front and a standard 1-dimensional barcode and 3-track magnetic strip on the back.
The goal of this thesis is to investigate the feasibility of cloning Husky One Cards, the ease …
The Economic And Psychological Metrics Of Political Decision-Making, Allyson Eslin
The Economic And Psychological Metrics Of Political Decision-Making, Allyson Eslin
Honors College
This project investigates what economic and psychological attributes influence Maine voters in their political decision-making. I examine how two typically separate disciplines—economics and psychology—combine, in order to understand unique characteristics that inform a voter’s political decision-making. This knowledge is vital to the legislators who seek to understand and represent the people who elected them. I examine the impact of economic stress on important political attitudes, a metric that has never been used to examine Maine voters. To gather this data, approximately 2,000 Maine residents were surveyed in 2013 using a questionnaire delivered through the mail. Using inferential statistics and regression …
Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning
Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning
CCE Theses and Dissertations
Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be …
The Perception Of The Economy Influencing Public Opinion On Immigration Policy, Jeff Sanchez
The Perception Of The Economy Influencing Public Opinion On Immigration Policy, Jeff Sanchez
e-Research: A Journal of Undergraduate Work
Does the majority express interest concerning immigration on the basis of perceived personal economic circumstance and security, or on the basis of its perception of the state of the national economy? This study explains how perception of the state of the economy influences opinion on immigration policy. This study finds that an individual's preferences for varying immigration policies are rooted in his or her perception of the state of the national economy, rather than being narrowly determined by his or her perception of their own economic circumstance and security.
Attachment And Attention: An Investigation Of Biases In Attention As They Relate To Attachment Security In Infancy And Adulthood, Paul J. Meinz
Attachment And Attention: An Investigation Of Biases In Attention As They Relate To Attachment Security In Infancy And Adulthood, Paul J. Meinz
Electronic Thesis and Dissertation Repository
At the advent of attachment theory, John Bowlby hypothesized that cognition and emotion are shaped by early experiences with primary caregivers (Bowlby, 1980). This idea – that aspects of cognition may be organized within early relationships – still plays a prominent role in contemporary attachment theory. The studies described within this dissertation provide support for the idea that attachment security in infancy and adulthood are associated with differences in cognition – particularly with differences in the way that people attend to certain forms of stimuli. Mothers and children in the studies described here were first assessed for individual differences in …
Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang
All Dissertations
The need for both usable and secure authentication is more pronounced than ever before. Security researchers and professionals will need to have a deep understanding of human factors to address these issues. Due to their ubiquity, recoverability, and low barrier of entry, passwords remain the most common means of digital authentication. However, fundamental human nature dictates that it is exceedingly difficult for people to generate secure passwords on their own. System-generated random passwords can be secure but are often unusable, which is why most passwords are still created by humans. We developed a simple system for automatically generating mnemonic phrases …
Investigating The Relationship Between Reckless Behaviours, Gender, Psychological Mindedness, And Attachment Security, Aileen M. Pidgeon, Lucas Ford
Investigating The Relationship Between Reckless Behaviours, Gender, Psychological Mindedness, And Attachment Security, Aileen M. Pidgeon, Lucas Ford
Aileen M. Pidgeon
Reckless behaviours, such as reckless driving, sexual behaviours and drug use, are major lifestyle contributors to morbidity and mortality for young adults. The purpose of the current study is to investigate the relationship between reckless behaviours, gender, attachment security and psychological mindedness. Data was collected from university students (n = 101) aged between 18 to 30 years old (M = 21) and analysed using multivariate analysis of covariance. Gender was found to be a significant predictor of reckless behaviour (p = .004), with males reporting significantly higher levels. Participants reporting high levels of attachment security did not report significantly different …
Social Defense: An Evolutionary-Developmental Model Of Children’S Strategies For Coping With Threat In The Peer Group, Meredith J. Martin, Patrick T. Davies, Leigha A. Macneill
Social Defense: An Evolutionary-Developmental Model Of Children’S Strategies For Coping With Threat In The Peer Group, Meredith J. Martin, Patrick T. Davies, Leigha A. Macneill
Department of Educational Psychology: Faculty Publications
Navigating the ubiquitous conflict, competition, and complex group dynamics of the peer group is a pivotal developmental task of childhood. Difficulty negotiating these challenges represents a substantial source of risk for psychopathology. Evolutionary developmental psychology offers a unique perspective with the potential to reorganize the way we think about the role of peer relationships in shaping how children cope with the everyday challenges of establishing a social niche. To address this gap, we utilize the ethological reformulation of the emotional security theory as a guide to developing an evolutionary framework for advancing an understanding of the defense strategies children use …
The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor
The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the relevance of blame in the context of terrorism.
The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor
The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor
International Bulletin of Political Psychology
The author gives a psychological perspective on the security of aviation cargo shipments.
Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor
Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the prevalence of identified proscribed personnel practices, and the power dynamics of such identifications among federal employees.
Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor
Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor
International Bulletin of Political Psychology
The United States Government Accountability Office (GAO) has recently Issued Efforts to Validate TSA’s Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Problems (May 2010, GAO-10-763). This IBPP article will describe and comment on the main GAO findings and additional data on which the findings are based. The article will end with some basic challenges to behavior detection as a useful security measure.
Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz
Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz
Publications and Research
This paper examines the benefits and obstacles to young people’s open-ended and unrestricted access to technological environments. While children and youth are frequently seen as threatened or threatening in this realm, their playful engagements suggest that they are self-possessed social actors, able to negotiate most of its challenges effectively. Whether it is proprietary software, the business practices of some technology providers, or the separation of play, work, and learning in most classrooms, the spatial-temporality of young people’s access to and use of technology is often configured to restrict their freedom of choice and behavior. We focus on these issues through …
When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor
When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor
International Bulletin of Political Psychology
The article discusses some of the dangers in labelling a risk as strategically and operationally insignificant in a security setting.
Trends. Non-Physical Approaches To Physical Security, Ibpp Editor
Trends. Non-Physical Approaches To Physical Security, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses the vulnerabilities of protecting physical assets with purely physical means, as well as the potential benefits of non-physical approaches.
The Psychology Of Intelligent Video Analysis, Ibpp Editor
The Psychology Of Intelligent Video Analysis, Ibpp Editor
International Bulletin of Political Psychology
This article examines issues surrounding software-enhanced video analysis in an intelligence context.
Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor
Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses multiple political psychological aspects of the August 29, 2003 car bomb explosion adjacent to the Imam Ali Mosque in Najaf, Iraq
Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor
Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses The Federal Bureau of Investigation Reform Act of 2003 (S.1440), and the continuing popularity of the polygraph with security bureaucracies.
Is Virtual Conferencing Virtually The Same?, Ibpp Editor
Is Virtual Conferencing Virtually The Same?, Ibpp Editor
International Bulletin of Political Psychology
The article discusses the pros and cons of virtual conferencing and the optimizing of decision making in a security context.
National Security And Multiple Selves, Ibpp Editor
National Security And Multiple Selves, Ibpp Editor
International Bulletin of Political Psychology
This article describes the positive and negative consequences for national security of the ontology and phenomenology of multiple selves.
Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor
Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor
International Bulletin of Political Psychology
The article evaluates the gain in security from no-fly zones from a security perspective.
Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor
Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses one aspect of sexual orientation – homosexuality - in a security and intelligence context.
Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor
Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses the impact of terrorism on the justice system and security.
Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor
Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses the Maslowian hierarchy of needs in the context of 9-11 terrorist attacks and the relationship between executive and judicial branches of American government.
The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor
The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor
International Bulletin of Political Psychology
This article explores some psychological phenomena bearing on the consequences of civil liberties constraints.
Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor
Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses what an appropriate level of commitment to a security bureaucracy might look like.