Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Psychology

Buprenorphine Effects On Anxiety-Like Behavior In B6 Mice, Megan K. Thibert Apr 2022

Buprenorphine Effects On Anxiety-Like Behavior In B6 Mice, Megan K. Thibert

Select or Award-Winning Individual Scholarship

Buprenorphine, a semi-synthetic opioid prescribed for the treatment of opioid use disorder (OUD), has been suggested as a potential pharmacological treatment for anxiety. Some preclinical and clinical studies provide support for the anxiolytic effects of buprenorphine, but research in this area is scarce, and findings to date have been mixed. The present study was designed to test the hypothesis that buprenorphine alters anxiety-like behavior in C57BL/IJ (B6) mice measured using the elevated zero maze (EZM). Adult, male mice (n=10) were given subcutaneous injections of saline (control) and three doses of buprenorphine (0.3, 1, and 10 mg/kg). One hour following injection, …


Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla Jan 2022

Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla

Engineering Management & Systems Engineering Faculty Publications

In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …