Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 65

Full-Text Articles in Entire DC Network

Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz Jan 2022

Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz

VMASC Publications

Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …


Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker Jul 2021

Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker

Publications

The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthe-sizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) litera-ture. This methodology closes the gap between academic research and professional practice and aids in providing timely, practical insights related to cybersecurity and safety in virtual care environments. As …


Relational Uncertainty In Romantic Relationships: The Influence Of Attachment And Relational Maintenance Behaviors, Jay Cruz May 2020

Relational Uncertainty In Romantic Relationships: The Influence Of Attachment And Relational Maintenance Behaviors, Jay Cruz

Graduate Theses and Dissertations

This study examined the influence of attachment and relational maintenance behaviors on relational uncertainty. Ninety individuals currently involved in romantic relationships completed measures assessing their attachment (i.e., secure, preoccupied, dismissive, fearful), relational uncertainties (i.e., self, partner, relationship), and relational maintenance behaviors (i.e., shared tasks, shared networks, positivity, openness, assurances). Findings demonstrated that both secure attachment and fearful attachment were not significantly associated with self, partner, or relationship uncertainty. In addition, dismissive attachment was negatively associated with partner uncertainty and positively associated with relationship uncertainty. Preoccupied attachment was positively associated with both partner and relationship uncertainty. Furthermore, secure attachment was positively …


Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor Jan 2019

Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor

International Bulletin of Political Psychology

There have been reports of a growing number of Transportation Security Administration (TSA) agents calling in sick and refusing to work for no pay (1). The immediate question becomes, what’s the impact on aviation security? The answer is a negative one, but not as negative as one might think, and one only adding to festering, pre-shutdown problems.


Security Analysis Of The Uconn Husky One Card, Trevor Phillips May 2018

Security Analysis Of The Uconn Husky One Card, Trevor Phillips

Honors Scholar Theses

The “Husky One Card” is the name given to student IDs at the University of Connecticut. It can identify students, faculty, and staff in a variety of situations. The One Card is used for meal plans, Husky Bucks (an equivalent of money, but valid only in the Storrs area), residence hall/ university facility access, and student health services. The current Husky One Card consists of a picture identification on the front and a standard 1-dimensional barcode and 3-track magnetic strip on the back.

The goal of this thesis is to investigate the feasibility of cloning Husky One Cards, the ease …


The Economic And Psychological Metrics Of Political Decision-Making, Allyson Eslin May 2017

The Economic And Psychological Metrics Of Political Decision-Making, Allyson Eslin

Honors College

This project investigates what economic and psychological attributes influence Maine voters in their political decision-making. I examine how two typically separate disciplines—economics and psychology—combine, in order to understand unique characteristics that inform a voter’s political decision-making. This knowledge is vital to the legislators who seek to understand and represent the people who elected them. I examine the impact of economic stress on important political attitudes, a metric that has never been used to examine Maine voters. To gather this data, approximately 2,000 Maine residents were surveyed in 2013 using a questionnaire delivered through the mail. Using inferential statistics and regression …


Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning Oct 2014

Security Policies That Make Sense For Complex Systems: Comprehensible Formalism For The System Consumer, Rhonda R. Henning

CCE Theses and Dissertations

Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be …


The Perception Of The Economy Influencing Public Opinion On Immigration Policy, Jeff Sanchez Sep 2014

The Perception Of The Economy Influencing Public Opinion On Immigration Policy, Jeff Sanchez

e-Research: A Journal of Undergraduate Work

Does the majority express interest concerning immigration on the basis of perceived personal economic circumstance and security, or on the basis of its perception of the state of the national economy? This study explains how perception of the state of the economy influences opinion on immigration policy. This study finds that an individual's preferences for varying immigration policies are rooted in his or her perception of the state of the national economy, rather than being narrowly determined by his or her perception of their own economic circumstance and security.


Attachment And Attention: An Investigation Of Biases In Attention As They Relate To Attachment Security In Infancy And Adulthood, Paul J. Meinz Aug 2014

Attachment And Attention: An Investigation Of Biases In Attention As They Relate To Attachment Security In Infancy And Adulthood, Paul J. Meinz

Electronic Thesis and Dissertation Repository

At the advent of attachment theory, John Bowlby hypothesized that cognition and emotion are shaped by early experiences with primary caregivers (Bowlby, 1980). This idea – that aspects of cognition may be organized within early relationships – still plays a prominent role in contemporary attachment theory. The studies described within this dissertation provide support for the idea that attachment security in infancy and adulthood are associated with differences in cognition – particularly with differences in the way that people attend to certain forms of stimuli. Mothers and children in the studies described here were first assessed for individual differences in …


Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang Aug 2014

Integrating Visual Mnemonics And Input Feedback With Passphrases To Improve The Usability And Security Of Digital Authentication, Kevin Juang

All Dissertations

The need for both usable and secure authentication is more pronounced than ever before. Security researchers and professionals will need to have a deep understanding of human factors to address these issues. Due to their ubiquity, recoverability, and low barrier of entry, passwords remain the most common means of digital authentication. However, fundamental human nature dictates that it is exceedingly difficult for people to generate secure passwords on their own. System-generated random passwords can be secure but are often unusable, which is why most passwords are still created by humans. We developed a simple system for automatically generating mnemonic phrases …


Investigating The Relationship Between Reckless Behaviours, Gender, Psychological Mindedness, And Attachment Security, Aileen M. Pidgeon, Lucas Ford May 2014

Investigating The Relationship Between Reckless Behaviours, Gender, Psychological Mindedness, And Attachment Security, Aileen M. Pidgeon, Lucas Ford

Aileen M. Pidgeon

Reckless behaviours, such as reckless driving, sexual behaviours and drug use, are major lifestyle contributors to morbidity and mortality for young adults. The purpose of the current study is to investigate the relationship between reckless behaviours, gender, attachment security and psychological mindedness. Data was collected from university students (n = 101) aged between 18 to 30 years old (M = 21) and analysed using multivariate analysis of covariance. Gender was found to be a significant predictor of reckless behaviour (p = .004), with males reporting significantly higher levels. Participants reporting high levels of attachment security did not report significantly different …


Social Defense: An Evolutionary-Developmental Model Of Children’S Strategies For Coping With Threat In The Peer Group, Meredith J. Martin, Patrick T. Davies, Leigha A. Macneill Jan 2014

Social Defense: An Evolutionary-Developmental Model Of Children’S Strategies For Coping With Threat In The Peer Group, Meredith J. Martin, Patrick T. Davies, Leigha A. Macneill

Department of Educational Psychology: Faculty Publications

Navigating the ubiquitous conflict, competition, and complex group dynamics of the peer group is a pivotal developmental task of childhood. Difficulty negotiating these challenges represents a substantial source of risk for psychopathology. Evolutionary developmental psychology offers a unique perspective with the potential to reorganize the way we think about the role of peer relationships in shaping how children cope with the everyday challenges of establishing a social niche. To address this gap, we utilize the ethological reformulation of the emotional security theory as a guide to developing an evolutionary framework for advancing an understanding of the defense strategies children use …


The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor Jan 2011

The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the relevance of blame in the context of terrorism.


The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor Nov 2010

The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor

International Bulletin of Political Psychology

The author gives a psychological perspective on the security of aviation cargo shipments.


Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor Aug 2010

Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor

International Bulletin of Political Psychology

This article discusses the prevalence of identified proscribed personnel practices, and the power dynamics of such identifications among federal employees.


Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor May 2010

Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor

International Bulletin of Political Psychology

The United States Government Accountability Office (GAO) has recently Issued Efforts to Validate TSA’s Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Problems (May 2010, GAO-10-763). This IBPP article will describe and comment on the main GAO findings and additional data on which the findings are based. The article will end with some basic challenges to behavior detection as a useful security measure.


Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz Jan 2009

Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz

Publications and Research

This paper examines the benefits and obstacles to young people’s open-ended and unrestricted access to technological environments. While children and youth are frequently seen as threatened or threatening in this realm, their playful engagements suggest that they are self-possessed social actors, able to negotiate most of its challenges effectively. Whether it is proprietary software, the business practices of some technology providers, or the separation of play, work, and learning in most classrooms, the spatial-temporality of young people’s access to and use of technology is often configured to restrict their freedom of choice and behavior. We focus on these issues through …


When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor Nov 2003

When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor

International Bulletin of Political Psychology

The article discusses some of the dangers in labelling a risk as strategically and operationally insignificant in a security setting.


Trends. Non-Physical Approaches To Physical Security, Ibpp Editor Oct 2003

Trends. Non-Physical Approaches To Physical Security, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses the vulnerabilities of protecting physical assets with purely physical means, as well as the potential benefits of non-physical approaches.


The Psychology Of Intelligent Video Analysis, Ibpp Editor Oct 2003

The Psychology Of Intelligent Video Analysis, Ibpp Editor

International Bulletin of Political Psychology

This article examines issues surrounding software-enhanced video analysis in an intelligence context.


Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor Sep 2003

Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses multiple political psychological aspects of the August 29, 2003 car bomb explosion adjacent to the Imam Ali Mosque in Najaf, Iraq


Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor Aug 2003

Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses The Federal Bureau of Investigation Reform Act of 2003 (S.1440), and the continuing popularity of the polygraph with security bureaucracies.


Is Virtual Conferencing Virtually The Same?, Ibpp Editor Jun 2003

Is Virtual Conferencing Virtually The Same?, Ibpp Editor

International Bulletin of Political Psychology

The article discusses the pros and cons of virtual conferencing and the optimizing of decision making in a security context.


National Security And Multiple Selves, Ibpp Editor Jun 2003

National Security And Multiple Selves, Ibpp Editor

International Bulletin of Political Psychology

This article describes the positive and negative consequences for national security of the ontology and phenomenology of multiple selves.


Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor May 2003

Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor

International Bulletin of Political Psychology

The article evaluates the gain in security from no-fly zones from a security perspective.


Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor Apr 2003

Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses one aspect of sexual orientation – homosexuality - in a security and intelligence context.


Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor Apr 2003

Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses the impact of terrorism on the justice system and security.


Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor Nov 2002

Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses the Maslowian hierarchy of needs in the context of 9-11 terrorist attacks and the relationship between executive and judicial branches of American government.


The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor Sep 2002

The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor

International Bulletin of Political Psychology

This article explores some psychological phenomena bearing on the consequences of civil liberties constraints.


Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor Sep 2002

Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses what an appropriate level of commitment to a security bureaucracy might look like.