Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Applied Behavior Analysis (2)
- Computer Sciences (2)
- Education (2)
- Physical Sciences and Mathematics (2)
- Advertising and Promotion Management (1)
-
- Animal Studies (1)
- Artificial Intelligence and Robotics (1)
- Behavioral Neurobiology (1)
- Business (1)
- Cognitive Psychology (1)
- Engineering (1)
- Experimental Analysis of Behavior (1)
- Gifted Education (1)
- Higher Education (1)
- Information Security (1)
- Life Sciences (1)
- Neuroscience and Neurobiology (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Pharmacology (1)
- Pharmacology, Toxicology and Environmental Health (1)
- Institution
Articles 1 - 6 of 6
Full-Text Articles in Psychology
Reinforcement In The Information Revolution, Phillip M. Baker
Reinforcement In The Information Revolution, Phillip M. Baker
SPU Works
This chapter will outline what it means to be a behaving human and how AI makes sense of these concepts. It will then explore possible near-future implications of our remarkable progress in understanding how human behavior works with the assistance of AI from a neurobiological basis. A focus on understanding the reinforcement mechanisms of the brain will reveal the consequences of ceding control of so much of our brain-environment interactions to AI. It will conclude by offering a potential Christian response to this digital reality from a uniquely Anabaptist perspective.
Buprenorphine Effects On Anxiety-Like Behavior In B6 Mice, Megan K. Thibert
Buprenorphine Effects On Anxiety-Like Behavior In B6 Mice, Megan K. Thibert
Select or Award-Winning Individual Scholarship
Buprenorphine, a semi-synthetic opioid prescribed for the treatment of opioid use disorder (OUD), has been suggested as a potential pharmacological treatment for anxiety. Some preclinical and clinical studies provide support for the anxiolytic effects of buprenorphine, but research in this area is scarce, and findings to date have been mixed. The present study was designed to test the hypothesis that buprenorphine alters anxiety-like behavior in C57BL/IJ (B6) mice measured using the elevated zero maze (EZM). Adult, male mice (n=10) were given subcutaneous injections of saline (control) and three doses of buprenorphine (0.3, 1, and 10 mg/kg). One hour following injection, …
Effects Of Socioeconomic Status On Consumer Behavior And Attitudes Towards A Brand’S Image, Abbey Haymond
Effects Of Socioeconomic Status On Consumer Behavior And Attitudes Towards A Brand’S Image, Abbey Haymond
Honors Theses
This research seeks to understand more about the effects of socioeconomic background on consumer behavior and its impact on the perception of brand images. Data from people of different SES were compared to understand how they view advertisements intended for different audiences and their corresponding effects. It was conducted by sending out a confidential, voluntary survey to a convenience sample targeting 100 consumers. Consumers were asked to rate statements, on a scale of one to five, for each of the research questions to assess specific aspects of their consumer attitudes and behaviors. The high SES group has a higher average …
The Relationship Between The Amount Of Training Time And Perceived Training Effectiveness To Teacher Perceptions About The Positive Behavioral Interventions And Supports Framework, Victoria Leigh Harr Morley
The Relationship Between The Amount Of Training Time And Perceived Training Effectiveness To Teacher Perceptions About The Positive Behavioral Interventions And Supports Framework, Victoria Leigh Harr Morley
Doctoral Dissertations and Projects
With a rise of behavioral concerns in the classroom, education systems have turned to positive behavior interventions and supports (PBIS) to reinforce positive behaviors. The purpose of this quantitative predictive correlational study was to examine the relationship between the fidelity of PBIS implementation, teacher perceived effectiveness of the programs, and time spent implementing the program. The theoretical framework for this study came from the applied behavior analysis theory. The researcher used a quantitative predictive correlational design to examine the relationship between the fidelity of implementation of PBIS programs, teacher perception of effectiveness of the PBIS framework, and time spent implementing …
Owner-Implemented Functional Analyses And Reinforcement-Based Treatments For Mouthing In Dogs, Mindy Waite, Tiffany Kodak
Owner-Implemented Functional Analyses And Reinforcement-Based Treatments For Mouthing In Dogs, Mindy Waite, Tiffany Kodak
Psychology Faculty Research and Publications
The most effective behavioral interventions are function based, which requires the identification of the behavioral function. A functional analysis is conducted to isolate and identify the environmental variables maintaining target behavior, and this method is effective across species. In domesticated dogs, mouthing is a common behavior and is considered problematic by many people. However, mouthing is not always simple to treat with standard interventions without identifying the function of the dog’s mouthing. Without efficacious interventions, undesirable behavior in companion animals may result in reduced welfare, an increased likelihood of relinquishment, or an increased probability of euthanasia. The purpose of this …
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Engineering Management & Systems Engineering Faculty Publications
In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …