Feeney, Brooke C.; Collins, Nancy L.; Van Vleet, Meredith; Tomlinson, Jennifer
2015-01-01
This investigation examined the importance of underlying motivations in predicting secure base support behavior, as well as the extent to which support motivations are predicted by individual differences in attachment orientation. Participants were 189 married couples who participated in two laboratory sessions: During a questionnaire session, couples completed assessments of their underlying motivations for providing, and for not providing, support for their partner's exploration (i.e., goal-strivings), as well as assessments of their typical secure base support behavior. In an observational session, couples engaged in a discussion of one member's personal goals, during which the partner's secure base support was assessed. Results revealed a variety of distinct motivations for providing, and for not providing, secure base support to one's partner, as well as theoretically expected links between these motivations and both secure base behavior and attachment orientation. This work establishes motivations as important mechanisms that underlie the effective or ineffective provision of relational support. PMID:23581972
Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J; Peña, Paola P; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J; Monteiro, Ligia; Lay, Keng-Ling
2013-01-01
The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the organization of children's behavior in naturalistic settings. Children (N = 547) were 10-72 months old. Child development experts (N = 81) from all countries provided definitions of optimal child secure base use. Findings indicate that children from all countries use their mother as a secure base. Children's organization of secure base behavior was modestly related to each other both within and across countries. Experts' descriptions of the optimally attached child were highly similar across cultures. © 2013 The Authors. Child Development © 2013 Society for Research in Child Development, Inc.
Jones, Jason D; Cassidy, Jude
2014-01-01
The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.
Jones, Jason D.; Cassidy, Jude
2014-01-01
The secure base construct is a core aspect of attachment theory and, according to Bowlby (1988), represents one of attachment theory’s most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents’ self-reported attachment styles relate to parental secure base provision and adolescent (Mage = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers’, as well as mothers’, attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers’ self-reported hostile behavior toward their adolescents and through adolescents’ less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers’ self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research. PMID:24897927
Use of behavioral biometrics in intrusion detection and online gaming
NASA Astrophysics Data System (ADS)
Yampolskiy, Roman V.; Govindaraju, Venu
2006-04-01
Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.
Huth-Bocks, Alissa C.; Muzik, Maria; Beeghly, Marjorie; Earls, Lauren; Stacks, Ann M.
2015-01-01
There is growing evidence that ‘secure-base scripts’ (Waters & Waters, 2006) are an important part of the cognitive underpinnings of internal working models of attachment. Recent research in middle class samples has shown that secure-base scripts are linked to maternal attachment-oriented behavior and child outcomes. However, little is known about the correlates of secure base scripts in higher-risk samples. Participants in the current study included 115 mothers who were oversampled for childhood maltreatment and their infants. Results revealed that a higher level of secure base scriptedness was significantly related to more positive and less negative maternal parenting in both unstructured free play and structured teaching contexts, and to higher reflective functioning scores on the Parent Development Interview-Revised Short Form (Slade, Aber, Berger, Bresgi, & Kaplan, 2003). Associations with parent-child secure base scripts, specifically, indicate some level of relationship-specificity in attachment scripts. Many, but not all, significant associations remained after controlling for family income and maternal age. Findings suggest that assessing secure base scripts among mothers known to be at risk for parenting difficulties may be important for interventions aimed at altering problematic parental representations and caregiving behavior. PMID:25319230
ERIC Educational Resources Information Center
Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J.; Peña, Paola P.; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M.; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J.; Monteiro, Ligia; Lay, Keng-Ling
2013-01-01
The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the…
Exploring Factors that Influence Students' Behaviors in Information Security
ERIC Educational Resources Information Center
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary
2012-01-01
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6
2012-12-01
Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for
A Study on Corporate Security Awareness and Compliance Behavior Intent
ERIC Educational Resources Information Center
Clark, Christine Y.
2013-01-01
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
ERIC Educational Resources Information Center
Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan
2007-01-01
The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…
Maternal secure-base scripts and children's attachment security in an adopted sample.
Veríssimo, Manuela; Salvaterra, Fernanda
2006-09-01
Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth. These results complement the findings and conceptual arguments offered by Bowlby and Ainsworth concerning the critical influence of maternal representations of attachment to the quality of attachment security in children.
The Cybercitizen Dimension: A Quantitative Study Using a Threat Avoidance Perspective
ERIC Educational Resources Information Center
Manzano, Debbie L.
2012-01-01
The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…
Lockhart, Ginger; Phillips, Samantha; Bolland, Anneliese; Delgado, Melissa; Tietjen, Juliet; Bolland, John
2017-01-01
This study examined prospective mediating relations among mother-adolescent attachment security, self-worth, and risk behaviors, including substance use and violence, across ages 13–17 in a sample of 901 low-income African American adolescents. Path analyses revealed that self-worth was a significant mediator between attachment security and risk behaviors, such that earlier attachment security predicted self-worth 1 year later, which in turn, predicted substance use, weapon carrying, and fighting in the 3rd year. Implications for the role of the secure base concept within the context of urban poverty are discussed. PMID:28174548
Statistical Models for Predicting Threat Detection From Human Behavior.
Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I
2018-01-01
Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking.
Shahri, Ahmad Bakhtiyari; Ismail, Zuraini; Mohanna, Shahram
2016-11-01
The security effectiveness based on users' behaviors is becoming a top priority of Health Information System (HIS). In the first step of this study, through the review of previous studies 'Self-efficacy in Information Security' (SEIS) and 'Security Competency' (SCMP) were identified as the important factors to transforming HIS users to the first line of defense in the security. Subsequently, a conceptual model was proposed taking into mentioned factors for HIS security effectiveness. Then, this quantitative study used the structural equation modeling to examine the proposed model based on survey data collected from a sample of 263 HIS users from eight hospitals in Iran. The result shows that SEIS is one of the important factors to cultivate of good end users' behaviors toward HIS security effectiveness. However SCMP appears a feasible alternative to providing SEIS. This study also confirms the mediation effects of SEIS on the relationship between SCMP and HIS security effectiveness. The results of this research paper can be used by HIS and IT managers to implement their information security process more effectively.
Statistical Models for Predicting Threat Detection From Human Behavior
Kelley, Timothy; Amon, Mary J.; Bertenthal, Bennett I.
2018-01-01
Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking. PMID:29713296
Umemura, Tomo; Traphagan, John W
2015-12-01
Attachment theorists believe that children rely on their caregivers for protection and exploration. Due to this emphasis on independent exploration, however, the extent to which this notion of secure-base behavior is valid in societies emphasizing belongingness, such as Japan, has been questioned. By conducting an in-depth exploration of two Japanese collectivistic concepts, amae and ie, the present paper reexamines the relevance of secure-base behavior in Japan. Current discussions of amae have relied on psychoanalytic concepts that were developed in Western culture, and thus may not accurately represent Japanese parent-child relations. By examining another traditional concept of the family system, ie, this paper proposes that attachment theory is relevant in Japanese culture because children's individual competence is important to their families.
Horn, Lisa; Huber, Ludwig; Range, Friederike
2013-01-01
Background It has been suggested that dogs display a secure base effect similar to that found in human children (i.e., using the owner as a secure base for interacting with the environment). In children, this effect influences their daily lives and importantly also their performance in cognitive testing. Here, we investigate the importance of the secure base effect for dogs in a problem-solving task. Methodology/Principal Findings Using a manipulative task, we tested dogs in three conditions, in which we varied the owner's presence and behavior (Experiment 1: “Absent owner”, “Silent owner”, “Encouraging owner”) and in one additional condition, in which the owner was replaced by an unfamiliar human (Experiment 2: “Replaced owner”). We found that the dogs' duration of manipulating the apparatus was longer when their owner was present than absent, irrespective of the owner's behavior. The presence of an unfamiliar human however did not increase their manipulation. Furthermore, the reduced manipulation during the absence of the owner was not correlated with the dog's degree of separation distress scored in a preceding attachment experiment. Conclusions/Significance Our study is the first to provide evidence for an owner-specific secure base effect in dogs that extends from attachment tests to other areas of dogs' lives and also manifests itself in cognitive testing – thereby confirming the remarkable similarity between the secure base effect in dogs and in human children. These results also have important implications for behavioral testing in dogs, because the presence or absence of the owner during a test situation might substantially influence dogs' motivation and therefore the outcome of the test. PMID:23734243
Neural evidence for a multifaceted model of attachment security.
Canterberry, Melanie; Gillath, Omri
2013-06-01
The sense of attachment security has been linked with a host of beneficial outcomes related to personal and relational well-being. Moreover, research has demonstrated that the sense of attachment security can be enhanced via cognitive priming techniques. Studies using such techniques have shown that security priming results with similar outcomes as dispositional attachment security. The way security priming leads to these effects, however, is yet to be unveiled. Using fMRI we took one step in that direction and examined the neural mechanisms underlying enhanced attachment security. Participants were exposed to explicit and implicit security- and insecurity-related words. Security priming led to co-occurring activation in brain areas reflective of cognitive, affective, and behavioral processes (e.g., medial frontal cortex, parahippocampus, BA 6). There were activation differences based on attachment style. This research serves as an important step in mapping out the security process and supports a conceptualization of security as part of a behavioral system with multiple components. Copyright © 2012 Elsevier B.V. All rights reserved.
Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.
Framework for behavioral analytics in anomaly identification
NASA Astrophysics Data System (ADS)
Touma, Maroun; Bertino, Elisa; Rivera, Brian; Verma, Dinesh; Calo, Seraphin
2017-05-01
Behavioral Analytics (BA) relies on digital breadcrumbs to build user profiles and create clusters of entities that exhibit a large degree of similarity. The prevailing assumption is that an entity will assimilate the group behavior of the cluster it belongs to. Our understanding of BA and its application in different domains continues to evolve and is a direct result of the growing interest in Machine Learning research. When trying to detect security threats, we use BA techniques to identify anomalies, defined in this paper as deviation from the group behavior. Early research papers in this field reveal a high number of false positives where a security alert is triggered based on deviation from the cluster learned behavior but still within the norm of what the system defines as an acceptable behavior. Further, domain specific security policies tend to be narrow and inadequately represent what an entity can do. Hence, they: a) limit the amount of useful data during the learning phase; and, b) lead to violation of policy during the execution phase. In this paper, we propose a framework for future research on the role of policies and behavior security in a coalition setting with emphasis on anomaly detection and individual's deviation from group activities.
Children's Representations of Attachment and Positive Teacher-Child Relationships.
Veríssimo, Manuela; Torres, Nuno; Silva, Filipa; Fernandes, Carla; Vaughn, Brian E; Santos, António J
2017-01-01
This study was designed to explore whether children's representations of attachment contribute to the co-construction of positive teacher-child relationships. An assessment of verbal intelligence was included as a predictor on the assumption that teachers might perceive themselves as having better relationships with more verbally competent children. Participants were 52 children from two pre-schools, in the district of Lisbon. The Attachment Story Completion Task (ASCT) was used to assess children's attachment security. The PCV-P (a scale developed in portuguese language) was used to describe teacher-child relationships through teachers' ratings of child secure base behavior and emotion regulation and the Wechsler Preschool and Primary Scale of Intelligence (WPPSI-R) was used to access verbal skills. Bivariate correlations showed that the teachers' rating of child secure base behavior was significantly associated with both child attachment security and verbal IQ. In a multiple regression analysis, the overall model R 2 was significant, as was the interaction term showing a moderating effect of attachment security on the relation between verbal IQ and teachers' ratings of secure base. The results suggest that co-construction of a close attachment-relevant relationship with teachers in early childhood is, in part, a function of the security in the context of parent-child attachment, but also of child verbal development.
Children's Representations of Attachment and Positive Teacher–Child Relationships
Veríssimo, Manuela; Torres, Nuno; Silva, Filipa; Fernandes, Carla; Vaughn, Brian E.; Santos, António J.
2017-01-01
This study was designed to explore whether children's representations of attachment contribute to the co-construction of positive teacher–child relationships. An assessment of verbal intelligence was included as a predictor on the assumption that teachers might perceive themselves as having better relationships with more verbally competent children. Participants were 52 children from two pre-schools, in the district of Lisbon. The Attachment Story Completion Task (ASCT) was used to assess children's attachment security. The PCV-P (a scale developed in portuguese language) was used to describe teacher–child relationships through teachers' ratings of child secure base behavior and emotion regulation and the Wechsler Preschool and Primary Scale of Intelligence (WPPSI-R) was used to access verbal skills. Bivariate correlations showed that the teachers' rating of child secure base behavior was significantly associated with both child attachment security and verbal IQ. In a multiple regression analysis, the overall model R2 was significant, as was the interaction term showing a moderating effect of attachment security on the relation between verbal IQ and teachers' ratings of secure base. The results suggest that co-construction of a close attachment-relevant relationship with teachers in early childhood is, in part, a function of the security in the context of parent-child attachment, but also of child verbal development. PMID:29312099
Ormerod, Thomas C; Dando, Coral J
2015-02-01
Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts. In an in vivo double-blind randomized-control trial conducted in international airports, security agents detected 66% of deceptive passengers using the veracity test method compared with less than 5% using behavioral indicator recognition. As well as revealing advantages of veracity testing over behavioral indicator identification, the study provides the highest levels to date of deception detection in a realistic setting where the known base rate of deceptive individuals is low.
iCrowd: agent-based behavior modeling and crowd simulator
NASA Astrophysics Data System (ADS)
Kountouriotis, Vassilios I.; Paterakis, Manolis; Thomopoulos, Stelios C. A.
2016-05-01
Initially designed in the context of the TASS (Total Airport Security System) FP-7 project, the Crowd Simulation platform developed by the Integrated Systems Lab of the Institute of Informatics and Telecommunications at N.C.S.R. Demokritos, has evolved into a complete domain-independent agent-based behavior simulator with an emphasis on crowd behavior and building evacuation simulation. Under continuous development, it reflects an effort to implement a modern, multithreaded, data-oriented simulation engine employing latest state-of-the-art programming technologies and paradigms. It is based on an extensible architecture that separates core services from the individual layers of agent behavior, offering a concrete simulation kernel designed for high-performance and stability. Its primary goal is to deliver an abstract platform to facilitate implementation of several Agent-Based Simulation solutions with applicability in several domains of knowledge, such as: (i) Crowd behavior simulation during [in/out] door evacuation. (ii) Non-Player Character AI for Game-oriented applications and Gamification activities. (iii) Vessel traffic modeling and simulation for Maritime Security and Surveillance applications. (iv) Urban and Highway Traffic and Transportation Simulations. (v) Social Behavior Simulation and Modeling.
An Integrative Behavioral Model of Information Security Policy Compliance
Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung
2014-01-01
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. PMID:24971373
An integrative behavioral model of information security policy compliance.
Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung
2014-01-01
The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.
A security mechanism based on evolutionary game in fog computing.
Sun, Yan; Lin, Fuhong; Zhang, Nan
2018-02-01
Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.
Securing BGP Using External Security Monitors
2006-01-01
forms. In Proc. SOSP, Brighton , UK , Oct. 2005. [19] A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: Software-based Attestation for...Williams, E. G. Sirer, and F. B. Schnei- der. Nexus: A New Operating System for Trustwor- thy Computing (extended abstract). In Proc. SOSP, Brighton , UK ...as a distributed database of untrustworthy hosts or messages. An ESM that detects invalid behavior issues a certifi- cate describing the behavior or
Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661
The effects of environmental resource and security on aggressive behavior.
Ng, Henry Kin Shing; Chow, Tak Sang
2017-05-01
Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Trumbell, Jill M; Hibel, Leah C; Mercado, Evelyn; Posada, Germán
2018-06-21
The current study examines associations between marital conflict and negative parenting behaviors among fathers and mothers, and the extent to which internal working models (IWMs) of attachment relationships may serve as sources of risk or resilience during family interactions. The sample consisted of 115 families (mothers, fathers, and their 6-month-old infants) who participated in a controlled experiment. Couples were randomly assigned to engage in either a conflict or positive marital discussion, followed by parent-infant freeplay sessions and assessment of parental IWMs of attachment (i.e., secure base script knowledge). While no differences in parenting behaviors emerged between the conflict and positive groups, findings revealed that couple withdrawal during the marital discussion was related to more intrusive and emotionally disengaged parenting for mothers and fathers. Interestingly, secure base script knowledge was inversely related to intrusion and emotional disengagement for fathers, but not for mothers. Furthermore, only among fathers did secure base script knowledge serve to significantly buffer the impact of marital disengagement on negative parenting (emotional disengagement). Findings are discussed using a family systems framework and expand our understanding of families, and family members, at risk. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Warfield, James J; Kondo-Ikemura, Kiyomi; Waters, Everett
2011-02-01
John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult's availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant's typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This article reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. © 2010 Wiley-Liss, Inc.
Machine Learning in Intrusion Detection
2005-07-01
machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate
Safer Schools through Environmental Design. ERIC Digest Number 144.
ERIC Educational Resources Information Center
Schneider, Tod
This digest describes the key elements of Crime Prevention Through Environmental Design (CPTED). CPTED is based on the recognition that the physical environment influences human behavior. It is different from conventional security measures, which many times are based on prohibitions, in that it focuses on desired behaviors and attempts to solve…
ERIC Educational Resources Information Center
Johnson, David P.
2017-01-01
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…
ERIC Educational Resources Information Center
Schneider, Tod
This digest in Spanish describes the key elements of Crime Prevention Through Environmental Design (CPTED). CPTED is based on the recognition that the physical environment influences human behavior. It is different from conventional security measures, which many times are based on prohibitions, in that it focuses on desired behaviors and attempts…
Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Jason Wright
Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrainedmore » computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.« less
Lee, Gyungjoo; McCreary, Linda; Breitmayer, Bonnie; Kim, Mi Ja; Yang, Soo
2013-10-01
This study evaluated the attachment-based cognitive behavioral approach (ACBA) to enhance mother-infant interaction and infant mental health. This quasi-experimental study used a pre-posttest control group design. Participants were 40 low-income, mother-infant (infant ages 12-36 months) dyads, 20 dyads per group. The ACBA group received 10 weekly 90-min sessions. Dependent variables were changes in mother-infant interaction and infant mental health. Additionally, we explored changes in mothers' attachment security. The groups differed significantly in changes in mother-infant interaction, infant mental health problems, and mothers' attachment security. ACBA may enhance mother-infant interaction and infants' mental health. © 2013, Wiley Periodicals, Inc.
Social Marketing Traction: A Practical Resource Book for Social Marketing.
ERIC Educational Resources Information Center
Hanlon, Eileen; Lane, Amy; Romano, Rose Mary
This book is about understanding people's behavior and changing that behavior using a discipline called "social marketing." It is based on the idea that all marketing is an exchange: if you want people to change their behavior, you have to offer them something, be it security, information, an image, or a feeling of belonging. The book…
Zhou, Ming; Zheng, Xiliang; Wang, Jin; Dong, Shaojun
2011-02-01
Biofuel cells (BFCs) based on enzymes and microbes are the promising future alternative sources of sustainable electrical energy under mild conditions (i.e. ambient temperature and neutral pH). By combining the adaptive behavior of BFCs self-regulating energy release with the versatility of biocomputing, we construct a novel gas-controlled biocomputing security system, which could be used as the potential implantable self-powered and 'smart' medical system with the logic diagnosis aim. We have demonstrated a biocomputing security system based on BFCs. Due to the unique 'RESET' reagent of N(2) applied in this work, the prepared biocomputing security system can be reset and cycled for a large number of times with no 'RESET' reagent-based 'waste'. This would be advantageous for the potential practical applications of such keypad lock as well as the development of biocomputing security devices. In order to validate the universality of the system and also to harvest energy directly from biofuels with enhanced power output, we replace the glucose with orange juice as the biofuel to operate BFCs-based biocomputing system, which also possesses the function of keypad lock. In addition, by introducing BFCs into the biocomputing security system, the adaptive behavior of the BFCs self-regulating the power release would be an immense advantage of such security keypad lock devices in potential self-powered implantable medical systems. The designed sequence gives the maximum power output and discriminate itself from the rest of the sequences. From this, we find that maximizing the dimensionless ratio of gap versus SD of the power output spectrum (a funnel in power outputs) gives the quantitative optimal design criterion. Therefore, our construction here may also provide a practical example and microscopic structural basis for mimicking the real biological network systems and bridge the gaps between the theoretical concepts and experiments important for biomolecular systems and synthetic biology.
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.
A short-term longitudinal study of correlates and sequelae of attachment security in autism
Rozga, Agata; Hesse, Erik; Main, Mary; Duschinsky, Robbie; Beckwith, Leila; Sigman, Marian
2018-01-01
ABSTRACT In this short-term longitudinal study, 30 preschool-aged children with autism were first observed in Ainsworth’s Strange Situation Procedure and, separately, interacting with the primary caregiver in the home. One year later, each child completed both a developmental assessment and an observational assessment of empathic responding. Behaviors typical for children with autism were distinguished from behaviors suggestive of relationally based attachment disorganization. Forty-five percent of the children were classified as securely attached. The secure group demonstrated language skills superior to those of the insecurely attached group, concurrently and during the follow-up. Compared to parents of children who were insecurely attached, parents of securely attached children were rated as more sensitive. Compared to both organized insecure and disorganized children, secure children were rated as more responsive to an examiner’s apparent distress during the follow-up relative to their ratings at intake, whereas empathy ratings of children with insecure classifications did not increase. Importantly, attachment security was associated with empathy above and beyond the contribution of children’s language level. These results indicate that the sequelae of attachment security in autism may be similar to those documented for typically developing children. PMID:28959921
High Assurance Control of Cyber-Physical Systems with Application to Unmanned Aircraft Systems
NASA Astrophysics Data System (ADS)
Kwon, Cheolhyeon
With recent progress in the networked embedded control technology, cyber attacks have become one of the major threats to Cyber-Physical Systems (CPSs) due to their close integration of physical processes, computational resources, and communication capabilities. While CPSs have various applications in both military and civilian uses, their on-board automation and communication afford significant advantages over a system without such abilities, but these benefits come at the cost of possible vulnerability to cyber attacks. Traditionally, most cyber security studies in CPSs are mainly based on the computer security perspective, focusing on issues such as the trustworthiness of data flow, without rigorously considering the system's physical processes such as real-time dynamic behaviors. While computer security components are key elements in the hardware/software layer, these methods alone are not sufficient for diagnosing the healthiness of the CPSs' physical behavior. In seeking to address this problem, this research work proposes a control theoretic perspective approach which can accurately represent the interactions between the physical behavior and the logical behavior (computing resources) of the CPS. Then a controls domain aspect is explored extending beyond just the logical process of the CPS to include the underlying physical behavior. This approach will allow the CPS whose physical operations are robust/resilient to the damage caused by cyber attacks, successfully complementing the existing CPS security architecture. It is important to note that traditional fault-tolerant/robust control methods could not be directly applicable to achieve resiliency against malicious cyber attacks which can be designed sophisticatedly to spoof the security/safety monitoring system (note this is different from common faults). Thus, security issues at this layer require different risk management to detect cyber attacks and mitigate their impact within the context of a unified physical and logical process model of the CPS. Specifically, three main tasks are discussed in this presentation: (i) we first investigate diverse granularity of the interactions inside the CPS and propose feasible cyber attack models to characterize the compromised behavior of the CPS with various measures, from its severity to detectability; (ii) based on this risk information, our approach to securing the CPS addresses both monitoring of and high assurance control design against cyber attacks by developing on-line safety assessment and mitigation algorithms; and (iii) by extending the developed theories and methods from a single CPS to multiple CPSs, we examine the security and safety of multi-CPS network that are strongly dependent on the network topology, cooperation protocols between individual CPSs, etc. The effectiveness of the analytical findings is demonstrated and validated with illustrative examples, especially unmanned aircraft system (UAS) applications.
Using time series structural characteristics to analyze grain prices in food insecure countries
Davenport, Frank; Funk, Chris
2015-01-01
Two components of food security monitoring are accurate forecasts of local grain prices and the ability to identify unusual price behavior. We evaluated a method that can both facilitate forecasts of cross-country grain price data and identify dissimilarities in price behavior across multiple markets. This method, characteristic based clustering (CBC), identifies similarities in multiple time series based on structural characteristics in the data. Here, we conducted a simulation experiment to determine if CBC can be used to improve the accuracy of maize price forecasts. We then compared forecast accuracies among clustered and non-clustered price series over a rolling time horizon. We found that the accuracy of forecasts on clusters of time series were equal to or worse than forecasts based on individual time series. However, in the following experiment we found that CBC was still useful for price analysis. We used the clusters to explore the similarity of price behavior among Kenyan maize markets. We found that price behavior in the isolated markets of Mandera and Marsabit has become increasingly dissimilar from markets in other Kenyan cities, and that these dissimilarities could not be explained solely by geographic distance. The structural isolation of Mandera and Marsabit that we find in this paper is supported by field studies on food security and market integration in Kenya. Our results suggest that a market with a unique price series (as measured by structural characteristics that differ from neighboring markets) may lack market integration and food security.
ERIC Educational Resources Information Center
Buyse, Evelien; Verschueren, Karine; Doumen, Sarah
2011-01-01
Based on attachment theory, two aims were addressed. Firstly, we tested whether close teacher-child relationships may buffer children who are less securely attached to their mothers against negative outcomes, such as aggressive behavior. Secondly, our study evaluated whether teacher sensitivity may protect less securely attached children against…
Measuring Human Performance within Computer Security Incident Response Teams
DOE Office of Scientific and Technical Information (OSTI.GOV)
McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel
Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less
Perceptual security of encrypted images based on wavelet scaling analysis
NASA Astrophysics Data System (ADS)
Vargas-Olmos, C.; Murguía, J. S.; Ramírez-Torres, M. T.; Mejía Carlos, M.; Rosu, H. C.; González-Aguilar, H.
2016-08-01
The scaling behavior of the pixel fluctuations of encrypted images is evaluated by using the detrended fluctuation analysis based on wavelets, a modern technique that has been successfully used recently for a wide range of natural phenomena and technological processes. As encryption algorithms, we use the Advanced Encryption System (AES) in RBT mode and two versions of a cryptosystem based on cellular automata, with the encryption process applied both fully and partially by selecting different bitplanes. In all cases, the results show that the encrypted images in which no understandable information can be visually appreciated and whose pixels look totally random present a persistent scaling behavior with the scaling exponent α close to 0.5, implying no correlation between pixels when the DFA with wavelets is applied. This suggests that the scaling exponents of the encrypted images can be used as a perceptual security criterion in the sense that when their values are close to 0.5 (the white noise value) the encrypted images are more secure also from the perceptual point of view.
Cloud Based Electronic Health Record Applications are Essential to Expeditionary Patient Care
2017-05-01
security46 and privacy concerns47). Privacy/Security Risks of Cloud Computing A quantitative study based on the preceding literature review...to medical IT wherever there is a Wi-Fi connection and a computing device (desktop, laptop , tablet, phone, etc.). In 2015 the DoD launched MiCare, a...Hosting Services: a Study on Students’ Acceptance,” Computers in Human Behavior, 2013. Takai, Teri. DoD CIO’s 10-Point Plan for IT Modernization
Case Study of Online Banking in India: User Behaviors and Design Guidelines
NASA Astrophysics Data System (ADS)
Iyengar, Jhumkee; Belvalkar, Manisha
This paper documents online banking trends, behaviors and expectations of Indian consumers and banks. It is based on excerpts of a large industry case study of users from 4 leading banks. While banks view online banking essentially as a technology solution, it is a relatively new area for Indian consumers and not yet self-supporting. Being a savings based culture still, Indian consumers are cautious about their financial assets. They are also relatively recent entrants to internet based services. Design of these systems must therefore be based on an understanding of these users' outlook and priorities through task centric, security assured and service oriented solutions minus the technological challenges. Design lessons suggest viewing online banking not just as a convenience alone anymore but beyond it, to provide service, simplicity and security. This will create satisfied online banking customers and therefore profitability for the bank.
Drosou, A.; Ioannidis, D.; Moustakas, K.; Tzovaras, D.
2011-01-01
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities. PMID:21380485
Drosou, A; Ioannidis, D; Moustakas, K; Tzovaras, D
2011-03-01
Unobtrusive Authentication Using ACTIvity-Related and Soft BIOmetrics (ACTIBIO) is an EU Specific Targeted Research Project (STREP) where new types of biometrics are combined with state-of-the-art unobtrusive technologies in order to enhance security in a wide spectrum of applications. The project aims to develop a modular, robust, multimodal biometrics security authentication and monitoring system, which uses a biodynamic physiological profile, unique for each individual, and advancements of the state of the art in unobtrusive behavioral and other biometrics, such as face, gait recognition, and seat-based anthropometrics. Several shortcomings of existing biometric recognition systems are addressed within this project, which have helped in improving existing sensors, in developing new algorithms, and in designing applications, towards creating new, unobtrusive, biometric authentication procedures in security-sensitive, Ambient Intelligence environments. This paper presents the concept of the ACTIBIO project and describes its unobtrusive authentication demonstrator in a real scenario by focusing on the vision-based biometric recognition modalities.
The US/Global Achilles heel : economic terrorism.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.
2005-04-01
While loss of life is the operating concern of Department of Homeland Security (DHS), the security of the economy ultimately decides the success of the war on terrorism. This project focuses on mitigation, containment, response, and impact of terrorist events on the economy. Conventional economic methods are inadequate, but agent-based methods (Discrete Simulation) appears to uniquely capture the dynamics and emergent (human) behaviors.
Breastfeeding, Parenting, and Infant Attachment Behaviors.
Gibbs, Benjamin G; Forste, Renata; Lybbert, Emily
2018-04-01
Objectives Infants and toddlers need secure attachments in order to develop the social competence required to successfully navigate later peer and adult relationships. Breastfeeding is a parenting factor that has been associated with child emotional development-specifically the attachment between children and their mothers. Yet, this link may simply be the result of other parenting behaviors that are associated with breastfeeding. Thus, our objective is to examine whether the link between infant attachment behaviors and breastfeeding endures when accounting for a broad array of in-depth measures of parenting. Methods We use the Early Childhood Longitudinal Study of children from 9 months to 2 years of age collected by the National Center for Education Statistics. Using Ordinary Least Squares regression, data analyses examine the association between the Toddler Attachment Sort-45 (TAS-45) measures of toddler-parent attachment (infant attachment security and temperamental dependency) and breastfeeding practices. We also examine individual items of the TAS-45 to isolate specific attachment behaviors that have the strongest associations with breastfeeding. Results We find an enduring link between children who are predominantly breastfed for six or more months and infant attachment security. However, we find no evidence that breastfeeding is linked to a child's temperamental dependency. Of the nine items used to examine infant attachment behaviors, we find that breastfed children are rated as having slightly higher scores on two measures ("warm and cuddly," "cooperative") and lower scores on one measure ("demanding/angry"). Conclusions for Practice Breastfeeding has an important link to the child's use of their caregiver as a secure base for exploration and a place of comfort when distressed (infant attachment security). Yet, breastfeeding does not appear to reduce a child's temperamental dependency or level of clinginess as measured by how demanding, fussy or distressed the child becomes when separated.
Marfeo, Elizabeth E; Ni, Pengsheng; Haley, Stephen M; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Rasch, Elizabeth K; Brandt, Diane E; Jette, Alan M
2013-09-01
To use item response theory (IRT) data simulations to construct and perform initial psychometric testing of a newly developed instrument, the Social Security Administration Behavioral Health Function (SSA-BH) instrument, that aims to assess behavioral health functioning relevant to the context of work. Cross-sectional survey followed by IRT calibration data simulations. Community. Sample of individuals applying for Social Security Administration disability benefits: claimants (n=1015) and a normative comparative sample of U.S. adults (n=1000). None. SSA-BH measurement instrument. IRT analyses supported the unidimensionality of 4 SSA-BH scales: mood and emotions (35 items), self-efficacy (23 items), social interactions (6 items), and behavioral control (15 items). All SSA-BH scales demonstrated strong psychometric properties including reliability, accuracy, and breadth of coverage. High correlations of the simulated 5- or 10-item computer adaptive tests with the full item bank indicated robust ability of the computer adaptive testing approach to comprehensively characterize behavioral health function along 4 distinct dimensions. Initial testing and evaluation of the SSA-BH instrument demonstrated good accuracy, reliability, and content coverage along all 4 scales. Behavioral function profiles of Social Security Administration claimants were generated and compared with age- and sex-matched norms along 4 scales: mood and emotions, behavioral control, social interactions, and self-efficacy. Using the computer adaptive test-based approach offers the ability to collect standardized, comprehensive functional information about claimants in an efficient way, which may prove useful in the context of the Social Security Administration's work disability programs. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
Beyond a series of security nets: Applying STAMP & STPA to port security
Williams, Adam D.
2015-11-17
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Beyond a series of security nets: Applying STAMP & STPA to port security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Adam D.
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Simulating human behavior for national security human interactions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.
2007-01-01
This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humansmore » were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.« less
NASA Astrophysics Data System (ADS)
Xu, Mingfeng; Pan, Wei; Zhang, Liyue
2018-07-01
Despite the intuition that synchronization of different nodes in coupled oscillator networks results from information exchange between them, it has recently been shown that remote nodes could be partially synchronous even when they are separated by intermediately unsynchronized nodes. Here based on electro-optic system, we report on a more stronger form of such synchronization pattern that is termed as secure remote synchronization, in which two remotely separated nodes could have identically synchronized dynamical behaviors while the rest of the network are both statistically and information-theoretically incoherent relative to the two synchronized nodes. The generalized form of mirror symmetry in the network structure is identified to be a key mechanism allowing for secure remote synchronization. Moreover, this synchronization mode is robust against a wild range of system parameters and noise perturbing the intermediary dynamics. The lack of information about the synchronized dynamics in the rest of the network suggests that our results could potentially lead to network-based solutions for secure key distribution and secure communication.
A review of attachment theory in the context of adolescent parenting.
Flaherty, Serena Cherry; Sadler, Lois S
2011-01-01
The purpose of this article is to review attachment theory and relate the attachment perspective to adolescent mothers and their children. Attachment theory explains positive maternal-infant attachment as a dyadic relationship between the infant and mother that provides the infant with a secure base from which to explore the world. With respect to cognitive, social, and behavioral domains, securely attached infants tend to have more favorable long-term outcomes, while insecurely attached infants are more likely to have adverse outcomes. Adolescent parenthood can disrupt normal adolescent development, and this disruption influences development of the emotional and cognitive capacities necessary for maternal behaviors that foster secure attachment. However, it appears that if specialized supports are in place to facilitate the process of developing attachment, infants of adolescent mothers can obtain higher rates of secure attachment than normative samples in this population. Copyright © 2011 National Association of Pediatric Nurse Practitioners. Published by Mosby, Inc. All rights reserved.
Stability and Change in Attachment Security Across Adolescence
Allen, Joseph P.; McElhaney, Kathleen Boykin; Kuperminc, Gabriel P.; Jodl, Kathleen M.
2006-01-01
This study examined both continuity and familial, intrapsychic, and environmental predictors of change in adolescent attachment security across a two-year period from mid- to late-adolescence. Assessments included the Adult Attachment Interview, observed mother-adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socio-economically diverse sample of moderately at-risk adolescents interviewed at ages 16 and 18. Substantial stability in security was identified. Beyond this stability, however, relative declines in attachment security were predicted by adolescents’ enmeshed, overpersonalizing behavior with their mothers, depressive symptoms, and poverty status. Results suggest that while security may trend upward for non-stressed adolescents, stressors that overwhelm the capacity for affect regulation and that are not easily assuaged by parents predict relative declines in security. over time. PMID:15566380
Asfour, Lila; Natale, Ruby; Uhlhorn, Susan; Arheart, Kris L; Haney, Kanathy; Messiah, Sarah E
2015-01-01
This study evaluated the relationship between food security and child nutritional intake, sedentary behavior, and body mass index (BMI) and potential moderation by ethnic subgroup membership. Cross-sectional data analysis from baseline data of a preschool intervention trial. Twenty-eight subsidized child care centers in Miami-Dade County, FL. Children ages 2 to 5 (n = 1,211) and their caregivers. The BMI percentile and the following 4 factors (via confirmatory factor analysis): food security, consumption of fruits/vegetables, consumption of unhealthy foods, and sedentary behaviors. Separate linear mixed models tested relationships between food security and main outcome measures with an interaction term to test for possible moderation by ethnicity. Results indicated a significant relationship (P < .05) between food security and child consumption of fruit/vegetables, consumption of unhealthy foods, and sedentary behavior, but not with BMI percentile. With greater food security, Haitians reported greater consumption of fruit/vegetables and sedentary behavior. With greater food security, Cubans and non-Hispanic whites reported less consumption of unhealthy foods, while Haitians reported greater consumption. Results showed higher food security was associated with higher consumption of fruit/vegetables, consumption of unhealthy foods, and sedentary behavior, but this was moderated by ethnicity. Implications for healthy weight interventions among low-income preschoolers should focus on the importance of food security and tailor intervention strategies for diverse ethnic groups accordingly. Copyright © 2015 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
New insight on intergenerational attachment from a relationship-based analysis.
Bailey, Heidi N; Tarabulsy, George M; Moran, Greg; Pederson, David R; Bento, Sandi
2017-05-01
Research on attachment transmission has focused on variable-centered analyses, where hypotheses are tested by examining linear associations between variables. The purpose of this study was to apply a relationship-centered approach to data analysis, where adult states of mind, maternal sensitivity, and infant attachment were conceived as being three components of a single, intergenerational relationship. These variables were assessed in 90 adolescent and 99 adult mother-infant dyads when infants were 12 months old. Initial variable-centered analyses replicated the frequently observed associations between these three core attachment variables. Relationship-based, latent class analyses then revealed that the most common pattern among young mother dyads featured maternal unresolved trauma, insensitive interactive behavior, and disorganized infant attachment (61%), whereas the most prevalent adult mother dyad relationship pattern involved maternal autonomy, sensitive maternal behavior, and secure infant attachment (59%). Three less prevalent relationship patterns were also observed. Moderation analyses revealed that the adolescent-adult mother distinction differentiated between secure and disorganized intergenerational relationship patterns, whereas experience of traumatic events distinguished between disorganized and avoidant patterns. Finally, socioeconomic status distinguished between avoidant and secure patterns. Results emphasize the value of a relationship-based approach, adding an angle of understanding to the study of attachment transmission.
Economy Over Security: Why Crises Fail to Impact Economic Behavior in East Asia
2017-12-01
SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST ASIA by Aaron R. Sipos December 2017 Thesis Advisor: Michael Glosny Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ECONOMY OVER SECURITY: WHY CRISES FAIL TO IMPACT ECONOMIC BEHAVIOR IN EAST...release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) This study examines changes in economic behavior in
Andretta, James R; Ramirez, Aaron M; Barnes, Michael E; Odom, Terri; Roberson-Adams, Shelia; Woodland, Malcolm H
2015-12-01
Many researchers have shown the importance of parent attachment in childhood and adolescence. The present study extends the attachment literature to African Americans involved in the juvenile justice system (N = 213), and provides an initial inquiry using person-oriented methods. The average age was 16.17 years (SD = 1.44), and the sample was predominantly male (71%). Results of a confirmatory factor analysis of Inventory of Parent and Peer Attachment-Short Form (IPPA-S) scores supported a 3-factor model: (a) Communication, (b) Trust, and (c) Alienation. Model-based clustering was applied to IPPA-S scores, and results pointed to 4 perceived parental security profiles: high security, moderately high security, moderately low security, and low security. In keeping with our hypotheses, IPPA-S profiles were associated with prosocial behaviors, depression, anxiety, and oppositional defiance. Contrary to hypotheses, IPPA-S profiles were not associated with perspective taking, emotional concern, or behaviors characteristic of a conduct disorder. Results also showed that gender, age, family member with whom the participant resides, charge severity, and offense history did not have an effect on IPPA-S clustering. Implications for therapeutic jurisprudence in African Americans involved with the juvenile justice system are provided. (c) 2015 APA, all rights reserved).
Goffin, Kathryn C; Boldt, Lea J; Kochanska, Grazyna
2017-10-17
Early secure attachment plays a key role in socialization by inaugurating a long-term mutual positive, collaborative interpersonal orientation within the parent-child dyad. We report findings from Family Study (community mothers, fathers, and children, from age 2 to 12, N = 102, 51 girls) and Play Study (exclusively low-income mothers and children, from age 3.5 to 7, N = 186, 90 girls). We examined links among observed secure attachment at toddler age, child and parent receptive, willing stance to each other, observed in parent-child contexts at early school age, and developmental outcomes. The developmental outcomes included parent-rated child antisocial behavior problems and observed positive mutuality with regard to conflict issues at age 12 in Family Study, and mother-rated child antisocial behavior problems and observed child regard for rules and moral self at age 7 in Play Study. In mother-child relationships, the child's willing stance mediated indirect effects of child security on positive mutuality in Family Study and on all outcomes in Play Study. In father-child relationships, both the child's and the parent's willing stance mediated indirect effects of child security on both outcomes. Early security initiates an adaptive developmental cascade by enlisting the child and the parent as active, willingly receptive and cooperative agents in the socialization process. Implications for children's parenting interventions are noted.
ERIC Educational Resources Information Center
Clarke, Marlon
2011-01-01
As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors…
Kim, Monica; Woodhouse, Susan S; Dai, Chenchen
2018-05-21
Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.
Waters, Theodore E A; Bosmans, Guy; Vandevivere, Eva; Dujardin, Adinda; Waters, Harriet S
2015-08-01
Recent work examining the content and organization of attachment representations suggests that 1 way in which we represent the attachment relationship is in the form of a cognitive script. This work has largely focused on early childhood or adolescence/adulthood, leaving a large gap in our understanding of script-like attachment representations in the middle childhood period. We present 2 studies and provide 3 critical pieces of evidence regarding the presence of a script-like representation of the attachment relationship in middle childhood. We present evidence that a middle childhood attachment script assessment tapped a stable underlying script using samples drawn from 2 western cultures, the United States (Study 1) and Belgium (Study 2). We also found evidence suggestive of the intergenerational transmission of secure base script knowledge (Study 1) and relations between secure base script knowledge and symptoms of psychopathology in middle childhood (Study 2). The results from this investigation represent an important downward extension of the secure base script construct. (c) 2015 APA, all rights reserved).
Waters, Theodore E. A.; Bosmans, Guy; Vandevivere, Eva; Dujardin, Adinda; Waters, Harriet S.
2015-01-01
Recent work examining the content and organization of attachment representations suggests that one way in which we represent the attachment relationship is in the form of a cognitive script. That said, this work has largely focused on early childhood or adolescence/adulthood, leaving a large gap in our understanding of script-like attachment representations in the middle childhood period. We present two studies and provide three critical pieces of evidence regarding the presence of a script-like representation of the attachment relationship in middle childhood. We present evidence that a middle childhood attachment script assessment tapped a stable underlying script using samples drawn from two western cultures, the United States (Study 1) and Belgium (Study 2). We also found evidence suggestive of the intergenerational transmission of secure base script knowledge (Study 1) and relations between secure base script knowledge and symptoms of psychopathology in middle childhood (Study 2). The results from this investigation represent an important downward extension of the secure base script construct. PMID:26147774
ERIC Educational Resources Information Center
Al-Yagon, Michal
2016-01-01
This study examined the role of adolescents' perceived close relationships with significant others (attachment relationships with mothers/fathers, appraisal of homeroom teacher as secure base, and quality of peer friendship) in explaining differences in their socioemotional and behavioral functioning (peer-network/peer-dyadic loneliness,…
Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT
NASA Astrophysics Data System (ADS)
Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep
2014-08-01
In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.
Goeke-Morey, Marcie C; Cairns, Ed; Merrilees, Christine E; Schermerhorn, Alice C; Shirlow, Peter; Cummings, E Mark
2013-02-01
This study explores the associations between mothers' religiosity, and families' and children's functioning in a stratified random sample of 695 Catholic and Protestant mother-child dyads in socially deprived areas in Belfast, Northern Ireland, a region which has experienced centuries of sectarian conflict between Protestant Unionists and Catholics Nationalists. Findings based on mother and child surveys indicated that even in this context of historical political violence associated with religious affiliation, mothers' religiosity played a consistently positive role, including associations with multiple indicators of better family functioning (i.e., more cohesion and behavioral control and less conflict, psychological distress, and adjustment problems) and greater parent-child attachment security. Mothers' religiosity also moderated the association between parent-child attachment security and family resources and family stressors, enhancing positive effects of cohesion and mother behavioral control on mother-child attachment security, and providing protection against risks associated with mothers' psychological distress. Findings are discussed in terms of implications for understanding the role of religiosity in serving as a protective or risk factor for children and families.
Use of Security Officers on Inpatient Psychiatry Units.
Lawrence, Ryan E; Perez-Coste, Maria M; Arkow, Stan D; Appelbaum, Paul S; Dixon, Lisa B
2018-04-02
Violent and aggressive behaviors are common among psychiatric inpatients. Hospital security officers are sometimes used to address such behaviors. Research on the role of security in inpatient units is scant. This study examined when security is utilized and what happens when officers arrive. The authors reviewed the security logbook and the medical records for all patients discharged from an inpatient psychiatry unit over a six-month period. Authors recorded when security calls happened, what behaviors triggered security calls, what outcomes occurred, and whether any patient characteristics were associated with security calls. A total of 272 unique patients were included. A total of 49 patients (18%) generated security calls (N=157 calls). Security calls were most common in the first week of hospitalization (N=45 calls), and roughly half of the patients (N=25 patients) had only one call. The most common inciting behavior was "threats to persons" (N=34 calls), and the most common intervention was intramuscular antipsychotic injection (N=49 calls). The patient variables associated with security calls were having more than one prior hospitalization (odds ratio [OR]=4.56, p=.001, 95% confidence interval [CI]=1.80-11.57), involuntary hospitalization (OR=5.09, p<.001, CI=2.28-11.33), and going to court for any reason (OR=5.80, p=.004, CI=1.75-19.15). Security officers were often called for threats of violence and occasionally called for actual violence. Patient variables associated with security calls are common among inpatients, and thus clinicians should stay attuned to patients' moment-to-moment care needs.
Su, Yishan; Han, Guangyao; Fu, Xiaomei; Xu, Naishen; Jin, Zhigang
2017-04-06
Physical layer security is an attractive security mechanism, which exploits the randomness characteristics of wireless transmission channel to achieve security. However, it is hampered by the limitation of the channel condition that the main channel must be better than the eavesdropper channel. To alleviate the limitation, cooperative communication is introduced. Few studies have investigated the physical layer security of the relay transmission model. In this paper, we performed some experiments to evaluate the physical layer security of a cooperative communication system, with a relay operating in decode-and-forward (DF) cooperative mode, selfish and malicious behavior in real non-ideal transmission environment. Security performance is evaluated in terms of the probability of non-zero secrecy capacity. Experiments showed some different results compared to theoretical simulation: (1) to achieve the maximum secrecy capacity, the optimal relay power according to the experiments result is larger than that of ideal theoretical results under both cooperative and selfish behavior relay; (2) the relay in malicious behavior who forwards noise to deteriorate the main channel may deteriorate the eavesdropper channel more seriously than the main channel; (3) the optimal relay positions under cooperative and selfish behavior relay cases are both located near the destination because of non-ideal transmission.
A cloud computing based platform for sleep behavior and chronic diseases collaborative research.
Kuo, Mu-Hsing; Borycki, Elizabeth; Kushniruk, Andre; Huang, Yueh-Min; Hung, Shu-Hui
2014-01-01
The objective of this study is to propose a Cloud Computing based platform for sleep behavior and chronic disease collaborative research. The platform consists of two main components: (1) a sensing bed sheet with textile sensors to automatically record patient's sleep behaviors and vital signs, and (2) a service-oriented cloud computing architecture (SOCCA) that provides a data repository and allows for sharing and analysis of collected data. Also, we describe our systematic approach to implementing the SOCCA. We believe that the new cloud-based platform can provide nurse and other health professional researchers located in differing geographic locations with a cost effective, flexible, secure and privacy-preserved research environment.
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.
Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen
2015-01-01
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Linger, Richard C; Pleszkoch, Mark G; Prowell, Stacy J
Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and securitymore » vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.« less
McElwain, Nancy L; Holland, Ashley S; Engle, Jennifer M; Wong, Maria S
2012-02-01
Child-mother attachment security, assessed via a modified Strange Situation procedure (Cassidy & Marvin, with the MacArthur Attachment Working Group, 1992), and parent-reported child proneness to anger were examined as correlates of observed child behavior toward mothers during a series of interactive tasks (N = 120, 60 girls). Controlling for maternal sensitivity and child gender and expressive language ability, greater attachment security, and lower levels of anger proneness were related to more child responsiveness to maternal requests and suggestions during play and snack sessions. As hypothesized, anger proneness also moderated several security-behavior associations. Greater attachment security was related to (a) more committed compliance during clean-up and snack-delay tasks for children high on anger proneness, (b) more self-assertiveness during play and snack for children moderate or high on anger proneness, and (c) more help-seeking during play and snack for children moderate or low on anger proneness. Findings further our understanding of the behavioral correlates of child-mother attachment security assessed during late toddlerhood via the Cassidy-Marvin system and underscore child anger proneness as a moderator of attachment-related differences in child behavior during this developmental period.
McElwain, Nancy L; Holland, Ashley S; Engle, Jennifer M; Ogolsky, Brian G
2014-06-01
Guided by a dyadic view of children's peer behavior, this study assessed actor and partner effects of attachment security and temperament on young children's behavior with an unfamiliar peer. At 33 months of age, child-mother attachment security was assessed via a modified Strange Situation procedure, and parents reported on child temperament (anger proneness and social fearfulness). At 39 months, same-sex children (N = 114, 58 girls) were randomly paired, and child dyads were observed during 3 laboratory visits occurring over 1 month. Actor-partner interdependence models, tested via multilevel modeling, revealed that actor security, partner anger proneness, and acquaintanceship (e.g., initial vs. later visits) combined to predict child behavior. Actor security predicted more responsiveness to the new peer partner at the initial visit, regardless of partner anger proneness. Actor security continued to predict responsiveness at the 2nd and 3rd visits when partner anger was low, but these associations were nonsignificant when partner anger was high. Actor security also predicted a less controlling assertiveness style at the initial visit when partner anger proneness was high, yet this association was nonsignificant by the final visit. The findings shed light on the dynamic nature of young children's peer behavior and indicate that attachment security is related to behavior in expected ways during initial interactions with a new peer, but may change as children become acquainted. PsycINFO Database Record (c) 2014 APA, all rights reserved.
Jin, Mi Kyoung; Jacobvitz, Deborah; Hazen, Nancy; Jung, Sung Hoon
2012-01-01
The present study sought to analyze infant and maternal behavior both during the Strange Situation Procedure (SSP) and a free play session in a Korean sample (N = 87) to help understand whether mother-infant attachment relationships are universal or culture-specific. Distributions of attachment classifications in the Korean sample were compared with a cross-national sample. Behavior of mothers and infants following the two separation episodes in the SSP, including mothers' proximity to their infants and infants' approach to the caregiver, was also observed, as was the association between maternal sensitivity observed during free play session and infant security. The percentage of Korean infants classified as secure versus insecure mirrored the global distribution, however, only one Korean baby was classified as avoidant. Following the separation episodes in the Strange Situation, Korean mothers were more likely than mothers in Ainsworth's Baltimore sample to approach their babies immediately and sit beside them throughout the reunion episodes, even when their babies were no longer distressed. Also, Korean babies less often approached their mothers during reunions than did infants in the Baltimore sample. Finally, the link between maternal sensitivity and infant security was significant. The findings support the idea that the basic secure base function of attachment is universal and the SSP is a valid measure of secure attachment, but cultural differences in caregiving may result in variations in how this function is manifested.
Allen, Joseph P.; Porter, Maryfrances R.; McFarland, F. Christy; Marsh, Penny; McElhaney, Kathleen Boykin
2006-01-01
This study assessed the hypothesis that popularity in adolescence takes on a twofold role, both marking high levels of concurrent psychosocial adaptation, but also predicting increases over time in both positive and negative behaviors sanctioned by peer norms. This hypothesis was tested with multi-method, longitudinal data obtained on a diverse community sample of 185 adolescents. Sociometric popularity data were examined in relation to data from interview-based assessments of attachment security and ego development, observations of mother-adolescent interactions, and repeated self- and peer-report assessments of delinquency and alcohol use. Results indicated that popular adolescents displayed higher concurrent levels of ego development, secure attachment and more adaptive interactions with mothers and best friends. Longitudinal analyses supported a “popularity-socialization” hypothesis, however, in which popular adolescents were more likely to increase in behaviors that receive approval in the peer group (e.g., minor levels of drug use and delinquency) and decrease in behaviors unlikely to be well-received by peers (e.g., hostile behavior with peers). PMID:15892790
ERIC Educational Resources Information Center
Leerkes, Esther M.; Wong, Maria S.
2012-01-01
Differences in infant distress and regulatory behaviors based on the quality of attachment to mother, emotion context (frustration versus fear), and whether or not mothers were actively involved in the emotion-eliciting tasks were examined in a sample of ninety-eight 16-month-old infants and their mothers. Dyads participated in the Strange…
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
ERIC Educational Resources Information Center
Richardson, Linda B., Comp.; And Others
This collection includes four handouts: (1) "Selection Critria Considerations for Computer-Based Resources" (Linda B. Richardson); (2) "Software Collection Policies in Academic Libraries" (a 24-item bibliography, Jane W. Johnson); (3) "Circulation and Security of Software" (a 19-item bibliography, Sara Elizabeth Williams); and (4) "Bibliography of…
Cheung, Rebecca Y M; Cummings, E Mark; Zhang, Zhiyong; Davies, Patrick T
2016-11-01
Recognizing the significance of interacting family subsystems, the present study addresses how interparental conflict is linked to adolescent emotional security as a function of parental gender. A total of 272 families with a child at 12.60 years of age (133 boys, 139 girls) were invited to participate each year for three consecutive years. A multi-informant method was used, along with trivariate models to test the associations among mothers, fathers, and their adolescent children's behaviors. The findings from separate models of destructive and constructive interparental conflict revealed intricate linkages among family members. In the model of destructive interparental conflict, mothers and fathers predicted each other's conflict behaviors over time. Moreover, adolescents' exposure to negativity expressed by either parent dampened their emotional security. Consistent with child effects models, adolescent emotional insecurity predicted fathers' destructive conflict behaviors. As for the model of constructive interparental conflict, fathers predicted mothers' conflict behaviors over time. Adolescents' exposure to fathers' constructive conflict behaviors also enhanced their sense of emotional security. Consistent with child effects models, adolescent emotional security predicted mothers' and fathers' constructive conflict behaviors. These findings extended the family and the adolescent literature by indicating that family processes are multiidirectional, involving multiple dyads in the study of parents' and adolescents' functioning. Contributions of these findings to the understanding of interparental conflict and emotional security in adolescence are discussed.
Attachment insecurity, mentalization and their relation to symptoms in eating disorder patients.
Kuipers, Greet S; van Loenhout, Zara; van der Ark, L Andries; Bekker, Marrie H J
2016-01-01
To investigate the relationships of attachment security and mentalization with core and co-morbid symptoms in eating disorder patients. We compared 51 eating disorder patients at the start of intensive treatment and 20 healthy controls on attachment, mentalization, eating disorder symptoms, depression, anxiety, personality disorders, psycho-neuroticism, autonomy problems and self-injurious behavior, using the Adult Attachment Interview, the SCID-I and II and several questionnaires. Compared with the controls, the eating disorder patients showed a higher prevalence of insecure attachment; eating disorder patients more often than controls received the AAI classification Unresolved for loss or abuse. They also had a lower level of mentalization and more autonomy problems. In the patient group eating disorder symptoms, depression, anxiety, psycho-neuroticism and autonomy problems were neither related to attachment security nor to mentalization; self-injurious behavior was associated with lesser attachment security and lower mentalization; borderline personality disorder was related to lower mentalization. In the control group no relations were found between attachment, mentalization and psychopathologic variables. Eating disorder patients' low level of mentalization suggests the usefulness of Mentalization Based Treatment techniques for eating disorder treatment, especially in case of self-injurious behavior and/or co-morbid borderline personality disorder.
van Rosmalen, Lenny; van der Horst, Frank C P; van der Veer, René
2016-02-01
John Bowlby is generally regarded as the founder of attachment theory, with the help of Mary Ainsworth. Through her Uganda and Baltimore studies Ainsworth provided empirical evidence for attachment theory, and she contributed the notion of the secure base and exploratory behavior, the Strange Situation Procedure and its classification system, and the notion of maternal sensitivity. On closer scrutiny, many of these contributions appear to be heavily influenced by William Blatz and his security theory. Even though Blatz's influence on Ainsworth has been generally acknowledged, this article, partly based on understudied correspondence from several personal archives, is the first to show which specific parts of attachment theory can be traced back directly to Blatz and his security theory. When Ainsworth started working with Bowlby in the 1950s, around the time he turned to evolutionary theory for an explanation of his findings, she integrated much of Blatzian security theory into Bowlby's theory in the making and used her theoretical and practical experience to enrich attachment theory. Even though Blatz is hardly mentioned nowadays, several of his ideas live on in attachment theory. (c) 2016 APA, all rights reserved).
Fehrenbacher, Anne E; Chowdhury, Debasish; Ghose, Toorjo; Swendeman, Dallas
2016-10-01
Consistent condom use (CCU) is the primary HIV/STI prevention option available to sex workers globally but may be undermined by economic insecurity, life-course vulnerabilities, behavioral factors, disempowerment, or lack of effective interventions. This study examines predictors of CCU in a random household survey of brothel-based female sex workers (n = 200) in two neighborhoods served by Durbar (the Sonagachi Project) in Kolkata, India. Multivariate logistic regression analyses indicated that CCU was significantly associated with perceived HIV risk, community mobilization participation, working more days in sex work, and higher proportion of occasional clients to regular clients. Exploratory analyses stratifying by economic insecurity indicators (i.e., debt, savings, income, housing security) indicate that perceived HIV risk and community mobilization were only associated with CCU for economically secure FSW. Interventions with FSW must prioritize economic security and access to social protections as economic insecurity may undermine the efficacy of more direct condom use intervention strategies.
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
Systematic Assessment of the Impact of User Roles on Network Flow Patterns
2017-09-01
Protocol SNMP Simple Network Management Protocol SQL Structured Query Language SSH Secure Shell SYN TCP Sync Flag SVDD Support Vector Data Description SVM...and evaluating users based on roles provide the best approach for defining normal digital behaviors? People are individuals, with different interests...activities on the network. We evaluate the assumption that users sharing similar roles exhibit similar network behaviors, and contrast the level of similarity
Intervention Effects on Foster Preschoolers’ Attachment-Related Behaviors From a Randomized Trial
Fisher, Philip A.; Kim, Hyoun K.
2008-01-01
This study examines change in attachment-related behaviors among foster preschoolers participating in a randomized trial of the Multidimensional Treatment Foster Care Program for Preschoolers (MTFC-P). Measures of secure, resistant, and avoidant behaviors were collected using a caregiver-report diary at 3-month intervals during the 12 months following a new foster placement. Children randomly assigned to the MTFC-P intervention condition (n = 57) showed significant increases in secure behavior and significant decreases in avoidant behavior relative to children assigned to a regular foster care condition (n = 60). Both groups showed significant decreases in resistant behavior over time. Analyses also revealed a significant interaction between treatment condition and age at first foster placement on change in secure behavior. Results are discussed in terms of the importance of early intervention and prevention services for foster preschoolers. PMID:17340186
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Forgery quality and its implications for behavioral biometric security.
Ballard, Lucas; Lopresti, Daniel; Monrose, Fabian
2007-10-01
Biometric security is a topic of rapidly growing importance in the areas of user authentication and cryptographic key generation. In this paper, we describe our steps toward developing evaluation methodologies for behavioral biometrics that take into account threat models that have been largely ignored. We argue that the pervasive assumption that forgers are minimally motivated (or, even worse, naive) is too optimistic and even dangerous. Taking handwriting as a case in point, we show through a series of experiments that some users are significantly better forgers than others, that such forgers can be trained in a relatively straightforward fashion to pose an even greater threat, that certain users are easy targets for forgers, and that most humans are a relatively poor judge of handwriting authenticity, and hence, their unaided instincts cannot be trusted. Additionally, to overcome current labor-intensive hurdles in performing more accurate assessments of system security, we present a generative attack model based on concatenative synthesis that can provide a rapid indication of the security afforded by the system. We show that our generative attacks match or exceed the effectiveness of forgeries rendered by the skilled humans we have encountered.
Dykstra, Holly; Davey, Adam; Fisher, Jennifer O; Polonsky, Heather; Sherman, Sandra; Abel, Michelle L; Dale, Lauren C; Foster, Gary D; Bauer, Katherine W
2016-03-01
Universal access to the School Breakfast Program (SBP) is intended to help low-income and food-insecure students overcome barriers to eating breakfast. However, SBP participation is often still low despite universal access. Further information is needed with regard to these children's breakfast behaviors, and in particular breakfast behaviors among youth from food-insecure families, to inform effective breakfast interventions. The objective of this study was to examine breakfast behaviors among a large sample of urban students with universal access to the SBP and to identify differences in breakfast behaviors among children from food-secure compared with food-insecure households. A cross-sectional study of 821 fourth- through sixth-grade students and their parents from 16 schools was conducted. Students reported the foods/drinks selected and location of obtaining food/drink on the morning of data collection, parents reported household food security status using the 6-item Food Security Survey Module, and the school district provided SBP participation data during the fall semester of 2013. Multivariable linear regression models accounting for school-level clustering were used to examine differences in breakfast behaviors across 3 levels of household food security: food secure, low food secure, and very low food secure. Students participated in the SBP 31.2% of possible days, with 13% never participating in the SBP. One-fifth (19.4%) of students purchased something from a corner store for breakfast, and 16.9% skipped breakfast. Forty-six percent of students were food insecure; few differences in breakfast behaviors were observed across levels of food security. Despite universal access to the SBP, participation in the SBP is low. Breakfast skipping and selection of foods of low nutritional quality in the morning are common, regardless of household food security status. Additional novel implementation of the SBP and addressing students' breakfast preferences may be necessary to further reduce barriers to students obtaining a free, healthful breakfast. This trial was registered at clinicaltrials.gov as NCT01924130. © 2016 American Society for Nutrition.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
Comprehensive Quantitative Analysis on Privacy Leak Behavior
Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan
2013-01-01
Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects. PMID:24066046
Comprehensive quantitative analysis on privacy leak behavior.
Fan, Lejun; Wang, Yuanzhuo; Jin, Xiaolong; Li, Jingyuan; Cheng, Xueqi; Jin, Shuyuan
2013-01-01
Privacy information is prone to be leaked by illegal software providers with various motivations. Privacy leak behavior has thus become an important research issue of cyber security. However, existing approaches can only qualitatively analyze privacy leak behavior of software applications. No quantitative approach, to the best of our knowledge, has been developed in the open literature. To fill this gap, in this paper we propose for the first time four quantitative metrics, namely, possibility, severity, crypticity, and manipulability, for privacy leak behavior analysis based on Privacy Petri Net (PPN). In order to compare the privacy leak behavior among different software, we further propose a comprehensive metric, namely, overall leak degree, based on these four metrics. Finally, we validate the effectiveness of the proposed approach using real-world software applications. The experimental results demonstrate that our approach can quantitatively analyze the privacy leak behaviors of various software types and reveal their characteristics from different aspects.
Security in Father-child Relationship and Behavior Problems in Sexually Abused Children.
Parent-Boursier, Claudel; Hébert, Martine
2015-01-01
While the influence of mother-child relationships on children's recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children's perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children's perception of security to fathers contributed to the prediction of parental reports of children's behavior problems, even after controlling for maternal psychological distress and perception of security to mothers.
ERIC Educational Resources Information Center
Goldner, Limor; Berenshtein-Dagan, Tal
2016-01-01
Associations between security within the family, satisfaction of basic psychological needs, true-self behavior, and knowledge of true self, as well as levels of adjustment, were explored in a sample of early adolescents and midadolescents in Israel (N = 302, mean age = 14.19 years). Both security within the family and needs satisfaction were found…
Behavioral analysis of use personal service e-balance Indonesian social security
NASA Astrophysics Data System (ADS)
Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad
2017-09-01
Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.
1980-09-01
Structural Behavior".4- D) , o 1413 MDfs or INOVSISSSOLETE UNCLASSIFIED tL?& SECURITY CLASSIFICATION Of THIS PAGE (,"en Dote Entered) .4 UNCLASSIFIED...BEHAVIOR, DEVELOP IMPROVED PLAS- TICS LASER HARDENING • PROVIDE MATERIALS AND STRUCTURES TECH- NOLOGY BASE TO MEET HIGH ENERGY LASER THREAT DAMAGE...technology at this " cutting -edge" have been consistently responsible for the many facets of the technological advantage this country needs on a continuing
Mehta, Neera; Cowan, Philip A; Cowan, Carolyn P
2009-12-01
This study examined whether working models of attachment are associated with observed positive emotion, sadness, and anger during marital conflict. Individuals (n = 176) from a longitudinal study of families participated in the current cross-sectional study. Narrative interviews assessed the unique and combined contribution of attachment representations based on parents (adult attachment) and partner (couple attachment). The influence of partner's attachment, depression symptoms, and sex of participant was also examined. Hierarchical linear models demonstrated that one's couple attachment security predicts one's observed positive emotion, whereas the partner's couple attachment security predicts one's observed negative emotion. Partner's depression symptoms moderated the effects of partner's couple attachment. Adult attachment was not related to observed emotional behavior between partners. These findings have important clinical implications for individual, couple, and family therapy.
An analysis of herding behavior in security analysts’ networks
NASA Astrophysics Data System (ADS)
Zhao, Zheng; Zhang, YongJie; Feng, Xu; Zhang, Wei
2014-11-01
In this paper, we build undirected weighted networks to study herding behavior among analysts and to analyze the characteristics and the structure of these networks. We then construct a new indicator based on the average degree of nodes and the average weighted clustering coefficient to research the various types of herding behavior. Our findings suggest that every industry has, to a certain degree, herding behavior among analysts. While there is obvious uninformed herding behavior in real estate and certain other industries, industries such as mining and nonferrous metals have informed herding behavior caused by analysts’ similar reactions to public information. Furthermore, we relate the two types of herding behavior to stock price and find that uninformed herding behavior has a positive effect on market prices, whereas informed herding behavior has a negative effect.
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2011 CFR
2011-07-01
... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (10) Techniques used to circumvent security...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2010 CFR
2010-07-01
... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (10) Techniques used to circumvent security...
On the security of semi-device-independent QKD protocols
NASA Astrophysics Data System (ADS)
Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin
2018-06-01
While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.
Analysis of health professional security behaviors in a real clinical setting: an empirical study.
Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis
2015-06-01
The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Driving profile modeling and recognition based on soft computing approach.
Wahab, Abdul; Quek, Chai; Tan, Chin Keong; Takeda, Kazuya
2009-04-01
Advancements in biometrics-based authentication have led to its increasing prominence and are being incorporated into everyday tasks. Existing vehicle security systems rely only on alarms or smart card as forms of protection. A biometric driver recognition system utilizing driving behaviors is a highly novel and personalized approach and could be incorporated into existing vehicle security system to form a multimodal identification system and offer a greater degree of multilevel protection. In this paper, detailed studies have been conducted to model individual driving behavior in order to identify features that may be efficiently and effectively used to profile each driver. Feature extraction techniques based on Gaussian mixture models (GMMs) are proposed and implemented. Features extracted from the accelerator and brake pedal pressure were then used as inputs to a fuzzy neural network (FNN) system to ascertain the identity of the driver. Two fuzzy neural networks, namely, the evolving fuzzy neural network (EFuNN) and the adaptive network-based fuzzy inference system (ANFIS), are used to demonstrate the viability of the two proposed feature extraction techniques. The performances were compared against an artificial neural network (NN) implementation using the multilayer perceptron (MLP) network and a statistical method based on the GMM. Extensive testing was conducted and the results show great potential in the use of the FNN for real-time driver identification and verification. In addition, the profiling of driver behaviors has numerous other potential applications for use by law enforcement and companies dealing with buses and truck drivers.
Atypical dimensions of caregiver–adolescent interaction in an economically disadvantaged sample
Kobak, Roger; Zajac, Kristyn; Abbott, Caroline; Zisk, Abby; Bounoua, Nadia
2018-01-01
The Goal-corrected Partnership Adolescent Coding System (GPACS) has shown promise in assessing a secure as well as three atypical patterns of parent-adolescent interaction during a conflict discussion. The current study of 186 economically disadvantaged families examines the degree to which four GPACS patterns: Secure/Collaborative, Punitive, Role Confused and Disoriented—account for residual change in adolescents’ social competence and maladaptive behavior (internalizing, externalizing, and risk behaviors) between ages 13 to 15. Adolescents from Secure/Collaborative dyads at age 13 were more likely to have a secure state of mind in the AAI at age 15 and showed increases in teachers’ ratings of empathy and decreases in teachers’ ratings of externalizing behaviors between ages 13 and 15. Adolescents in Disoriented dyads showed a dramatic increase in teacher-rated internalizing problems, while male adolescents in Role Confused dyads reported increased involvement in risk behaviors including unprotected sexual activity and substance use problems. PMID:28401833
A neural-visualization IDS for honeynet data.
Herrero, Álvaro; Zurutuza, Urko; Corchado, Emilio
2012-04-01
Neural intelligent systems can provide a visualization of the network traffic for security staff, in order to reduce the widely known high false-positive rate associated with misuse-based Intrusion Detection Systems (IDSs). Unlike previous work, this study proposes an unsupervised neural models that generate an intuitive visualization of the captured traffic, rather than network statistics. These snapshots of network events are immensely useful for security personnel that monitor network behavior. The system is based on the use of different neural projection and unsupervised methods for the visual inspection of honeypot data, and may be seen as a complementary network security tool that sheds light on internal data structures through visual inspection of the traffic itself. Furthermore, it is intended to facilitate verification and assessment of Snort performance (a well-known and widely-used misuse-based IDS), through the visualization of attack patterns. Empirical verification and comparison of the proposed projection methods are performed in a real domain, where two different case studies are defined and analyzed.
Laurent, Heidemarie K.; Kim, Hyoun K.; Capaldi, Deborah M.
2009-01-01
This study investigated the impact of parents' observed conflict behavior on subsequent child attachment security, both as a main effect and as moderated by parents' romantic attachment. Participants were 80 heterosexual couples involving men from the Oregon Youth Study and their first-born children. We used hierarchical linear modeling to predict child security with each parent. Interparental psychological aggression predicted lower child security with father, regardless of romantic attachment. If the father was insecure, interparental positive engagement predicted lower child security with him. If either the mother or father was avoidant, interparental withdrawal did not predict lower child security, though it did for more secure parents. Results are discussed in terms of implications of attachment-(in)congruent behavior for parents' emotional availability. PMID:18540766
ERIC Educational Resources Information Center
Fracasso, Maria P.; And Others
1994-01-01
Studied the relationship of parenting behavior and acculturation to the quality of attachment in 26 Puerto Rican and Dominican infants. Results revealed equal numbers of secure and insecure infants, although more boys than girls were secure. Mothers of secure infants were more sensitive and engaged in more frequent abrupt-interfering pick-ups. (KS)
Security in Father-child Relationship and Behavior Problems in Sexually Abused Children
Parent-Boursier, Claudel; Hébert, Martine
2017-01-01
While the influence of mother-child relationships on children’s recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children’s perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children’s perception of security to fathers contributed to the prediction of parental reports of children’s behavior problems, even after controlling for maternal psychological distress and perception of security to mothers. PMID:29321696
ERIC Educational Resources Information Center
McElwain, Nancy L.; Holland, Ashley S.; Engle, Jennifer M.; Ogolsky, Brian G.
2014-01-01
Guided by a dyadic view of children's peer behavior, this study assessed actor and partner effects of attachment security and temperament on young children's behavior with an unfamiliar peer. At 33 months of age, child-mother attachment security was assessed via a modified Strange Situation procedure, and parents reported on child temperament…
Lindsey, Eric W; Caldera, Yvonne M; Tankersley, Laura
2009-04-01
Parent-child attachment security and dyadic measures of parent-child positive and negative emotional reciprocity were examined as possible mediators and moderators of the connection between marital conflict and children's peer play behavior. Eighty parents were observed in a laboratory play session with their 15- to 18-month-old child. Subsequently, at 36 months children were observed interacting with peers at their child care setting. Connections between marital conflict and children's positive peer interaction were mediated by mother-child attachment security, mother-child positive emotional reciprocity, and father-child negative emotional reciprocity. Connections between marital conflict and children's negative peer interaction were mediated by mother-child positive emotional reciprocity and father-child attachment security. Parent-child attachment security and negative emotional reciprocity emerged as important moderators of the connection between marital conflict and children's peer play behavior.
The Role Of Moral Awareness In Computer Security
NASA Astrophysics Data System (ADS)
Stawinski, Arthur
1984-08-01
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
Yogeeswaran, Kumar; Dasgupta, Nilanjana
2010-10-01
Three studies tested whether implicit prototypes about who is authentically American predict discriminatory behavior and judgments against Americans of non-European descent. These studies identified specific contexts in which discrimination is more versus less likely to occur, the underlying mechanism driving it, and moderators of such discrimination. Studies 1 and 2 demonstrated that the more participants held implicit beliefs that the prototypical American is White, the less willing they were to hire qualified Asian Americans in national security jobs; however, this relation did not hold in identical corporate jobs where national security was irrelevant. The implicit belief-behavior link was mediated by doubts about Asian Americans' national loyalty. Study 3 demonstrated a similar effect in a different domain: The more participants harbored race-based national prototypes, the more negatively they evaluated an immigration policy proposed by an Asian American but not a White policy writer. Political conservatism magnified this effect because of greater concerns about the national loyalty of Asian Americans.
Zhang, Lin; Yin, Na; Fu, Xiong; Lin, Qiaomin; Wang, Ruchuan
2017-01-01
With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR). This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service. PMID:28282894
A new approach for willingness test in biometric systems
NASA Astrophysics Data System (ADS)
Yang, Kai; Du, Yingzi; Zhou, Zhi
2011-06-01
Biometrics identifies/verifies a person using his/her physiological or behavioral characteristics. It is becoming an important ally for law enforcement and homeland security. However, there are some safety and privacy concerns: biometric based systems can be accessed when users are under threat, reluctant or even unconscious states. In this paper, we introduce a new method which can identify a person and detect his/her willingness. Our experimental results show that the new approach can enhance the security by checking the consent signature while achieving very high recognition accuracy.
Dietary Intake Contributions of Food and Beverages by Source and Food Security Status in US Adults.
Spees, Colleen K; Clark, Jill E; Hooker, Neal H; Watowicz, Rosanna P; Taylor, Christopher A
2017-09-01
To compare the consumption patterns and diet quality of foods and beverages obtained from various sources by food security status. Cross-sectional analysis of 2011-2012 National Health and Nutrition Examination Survey data. A total of 4,789 adults (aged >19 years) with dietary intake and food security data. The contribution of foods and beverages to energy, nutrients, and diet quality by locations where food was obtained was compared across food security status. Descriptive analysis and logistic regression. Almost all US adults consumed food and beverages obtained from grocery stores, regardless of food security status (about 95%), which accounted for one half to two thirds of total macronutrient intakes. The diet quality of foods from grocery stores was better in highly food-secure adults. Convenience stores are used most by very low food-secure adults; those foods had the poorest diet quality profile. Dietary patterns of marginally food-secure adults more closely resembled sources and intakes of low and very low food-secure adults. Food-insecure adults use food sources differently, resulting in diet quality differences of foods and beverages obtained. Place-based interventions in the food environment may have differential effects by food security status. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Statistics-based email communication security behavior recognition
NASA Astrophysics Data System (ADS)
Yi, Junkai; Su, Yueyang; Zhao, Xianghui
2017-08-01
With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.
Constructive and destructive marital conflict, emotional security and children's prosocial behavior
McCoy, Kathleen; Cummings, E. Mark; Davies, Patrick T.
2010-01-01
Background This study addresses the gaps in understanding the relationship between constructive and destructive marital conflict and children's prosocial behavior from a process-oriented perspective. Method Data were drawn from a three-wave study of 235 families with children ages 5–7 at wave 1. Relations between constructive and destructive marital conflict, children's emotional security, warm parenting and children's prosocial behavior were examined through the use of structural equation modeling. Results Even after controlling for prior levels of children's prosocial behavior at wave 1, children's emotional security acted as an intervening variable between both constructive and destructive marital conflict and children's prosocial behavior over time. Conclusions These findings advance the relationship between marital conflict and children's adjustment by focusing on children's prosocial behavior and highlight the need to further investigate the impact of positive dimensions of marital conflict on dimensions of children's positive social functioning. PMID:18673403
Constructive and destructive marital conflict, emotional security and children's prosocial behavior.
McCoy, Kathleen; Cummings, E Mark; Davies, Patrick T
2009-03-01
This study addresses the gaps in understanding the relationship between constructive and destructive marital conflict and children's prosocial behavior from a process-oriented perspective. Data were drawn from a three-wave study of 235 families with children ages 5-7 at wave 1. Relations between constructive and destructive marital conflict, children's emotional security, warm parenting and children's prosocial behavior were examined through the use of structural equation modeling. Even after controlling for prior levels of children's prosocial behavior at wave 1, children's emotional security acted as an intervening variable between both constructive and destructive marital conflict and children's prosocial behavior over time. These findings advance the relationship between marital conflict and children's adjustment by focusing on children's prosocial behavior and highlight the need to further investigate the impact of positive dimensions of marital conflict on dimensions of children's positive social functioning.
Thielke, Lauren E.; Rosenlicht, Giovanna; Saturn, Sarina R.; Udell, Monique A. R.
2017-01-01
The present study explored the effects of intranasal oxytocin, a naturally occurring hormone, on the behavior of pet dogs during an attachment test. Each dog participated in two testing sessions. On one visit saline was administered nasally, and on another, oxytocin was administered nasally. For half of the dogs (n = 20), solutions were administered with a Mucosal Atomization Device (MAD) and for half of the dogs (n = 20), solutions were administered using a nasal spray bottle. Condition order was counterbalanced and a double-blind methodology was employed. Following a 30-min wait period after administration of solutions, dog-owner pairs participated in the Secure Base Test, a short attachment test consisting of three 2-min phases: (1) Baseline- the owner was present, dogs were able to freely explore the testing room (2) Alone- dogs were left alone in the testing room (3) Return- owners re-entered the room and were reunited with their dog. In each phase the dog was evaluated for contact seeking, exploration, and avoidance behaviors. Although, oxytocin administration was expected to increase owner-directed proximity and contact seeking behavior, this effect was not observed. In fact, in the baseline phase, dogs spent significantly more time seeking the proximity of their owners when they received saline than when they received OT (p < 0.05). Sex differences were also assessed for the behavioral variables of interest in the Secure Base Test, and results indicated that OT did not affect dogs' behavior in the alone phase, but when saline was administered, females spent significantly more time in contact with the door than males in the alone phase (p < 0.05). Overall, the effects of nasally administered oxytocin on attachment related behavior appeared to be limited or inconsistent for this pet dog population. PMID:29033879
School Security and Crisis Preparedness: Make It Your Business.
ERIC Educational Resources Information Center
Trump, Kenneth S.
1999-01-01
The top five security risks in today's schools include aggressive behavior, weapons possession or use, drug trafficking, gangs, and "stranger danger." Home-made bomb threats are common. This article also discusses security system costs, risk-reduction frameworks, security assessments, crisis-preparedness guidelines, and security-related…
ERIC Educational Resources Information Center
Reddy, Dinesh Sampangirama
2017-01-01
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
ERIC Educational Resources Information Center
Seifer, Ronald; Schiller, Masha
1995-01-01
Describes the core constructs of attachment theory, namely, the attachment system and secure-base behavior. Discusses contextual factors thought to be crucial in development of individual differences in attachment, especially maternal sensitivity, and considers child characteristics, especially temperament, that may contribute to the attachment…
MOTIVES INFLUENCING NEEDS TO ACHIEVE IN VOCATIONAL EDUCATION.
ERIC Educational Resources Information Center
HELTZEL, FRANCES B.
THIS RESEARCH SOUGHT TO MEASURE M TIVATION UNDERLYING ACHIEVEMENT-ORIENTED BEHAVIOR AT THE SECONDARY LEVEL, SPECIFICALLY OF STUDENTS IN VOCATIONAL PROGRAMS. PARALLEL INSTRUMENTS OF 42 ITEMS WERE CONSTRUCTED TO MEASURE MOTIVE FOR STRIVING, BASED ON MASLOW'S HIERARCHY OF NEED FOR SECURITY, BELONGINGNESS, ESTEEM, AND SELF-ACTUALIZATION. STRENGTH OF…
Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.
ERIC Educational Resources Information Center
Trinkaus-Randall, Gregor
1998-01-01
Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…
ERIC Educational Resources Information Center
Smith, Gwendolynn T.
2012-01-01
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.
2008-08-01
This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less
Use of concept mapping to explore the influence of food security on food buying practices.
Walker, Renee E; Kawachi, Ichiro
2012-05-01
Paradoxically, individuals with food insecurity have been observed to have higher rates of obesity compared with their counterparts with food security. The factors influencing food purchasing behaviors in households with food security vs food insecurity are poorly understood. Using the mixed methods approach of concept mapping, we examined the perceptions and preferences driving the food purchasing behaviors of households with food security vs food insecurity. Twenty-six men and women with food security and 41 men and women with food insecurity from four neighborhoods in Boston, MA, completed the concept mapping process during 2010. Prevalence of overweight and obesity was greater among participants with food insecurity (80.5%) compared with those with food security (61.5%). Participants identified 163 unique factors that influenced their food purchasing behavior. Using multivariate analyses, these factors were grouped into eight unique concepts or clusters that reflected their perceptions of factors hindering healthy eating. Average cluster ratings were similar between participants with food security and food insecurity, suggesting that similar food purchasing behaviors are employed and are perceived similarly in how they hinder or promote healthy eating. The use of emergency food assistance programs may play a role in minimizing the burden of food insecurity while providing access to foods with varying degrees of nutritional quality that may be associated with increased risk of overweight and obesity observed in individuals and households with food insecurity. Copyright © 2012 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Rozalski, Michael; Drasgow, Erik; Drasgow, Fritz; Yell, Mitchell
2009-01-01
The purpose of this study was to examine the relationships among students' disruptive and violent behavior and staff's use of proactive and reactive strategies in a secure residential treatment center serving delinquent adolescent males. One hundred hours of observational data were collected, and linear regression models were used to explore the…
ERIC Educational Resources Information Center
Weber, Ruth A.; And Others
1986-01-01
Results suggest that various aspects of Strange Situation behavior are related to both maternal and infant temperament, and that maternal temperament is a predictor of attachment security, particularly for Type A mother-avoidant infants. (Author/RH)
Bovenschen, Ina; Lang, Katrin; Zimmermann, Janin; Förthner, Judith; Nowacki, Katja; Roland, Inga; Spangler, Gottfried
2016-01-01
Although the majority of foster children have been exposed to early adversity in their biological families and have experienced one or more disruptions of attachment relationships, most studies surprisingly found foster children to be as securely attached as children in low-risk samples. However, attention has been paid almost exclusively to attachment formation in young children up to two years of age, and the majority of studies solely investigated attachment behavior whereas few is known about foster children's representations about attachment relationships. To extend findings on attachment in foster children and its predictors, our study examined both attachment behavior and representations in foster children aged between 3 and 8 years. Diverse potential predictors including child variables, birth parents' variables, pre-placement experiences, and foster caregiver's behavior were included in the analyses. Results revealed that foster children showed both lower attachment security and higher disorganization scores than children in low-risk samples. Attachment behavior and representation were found to be widely independent from each other. Different factors contributed to attachment behavior and representation: whereas foster children's attachment behavior was mainly influenced by foster parents' behavior, pre-placement experiences did predict hyperactivation and disorganization on the representational level. The results indicate that, when intervening with foster families, it seems crucial to focus not exclusively on the promotion of secure attachment behavior but also to develop interventions enhancing secure and organized attachment representations. Copyright © 2015 Elsevier Ltd. All rights reserved.
1998-09-01
to characterize the weakening constraint power of the matrix as opposed to earlier analyses that used an additional eigenstrain term. It also...matrix Poisson ratio was constant and the inclusions were rigid, he showed that the disturbed strain and the eigenstrain in the Eshelby method could...Eshelby, elastic properties, prediction, energy balance, mechanical behavior, eigenstrain , nonlinear dcd03e So7S&3 UNCLASSIFIED SECURITY CLASSIFICATION OF FORM (Highest classification of Title, Abstract, Keywords)
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments
2010-11-01
behavioral feature values. This would provide a baseline notional object trust and is formally defined as follows: TO(1)[0, 1] = ∑ 0,n:νbt wtP (S) (8...TO(2)[0, 1] = ∑ wtP (S) · identity(O,P ) (9) 28- 12 RTO-MP-IST-091 Combining Trust and Behavioral Analysis to Detect Security Threats in Open...respectively. The wtP weight function determines the significance of a particular behavioral feature in the final trust calculation. Note that the weight
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2010 CFR
2010-01-01
... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
SecureCPS: Defending a nanosatellite cyber-physical system
NASA Astrophysics Data System (ADS)
Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark
2014-06-01
Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-the-shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical - Attack Description Language (CP-ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.
77 FR 16846 - Published Privacy Impact Assessments on the Web
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-22
... Security Advanced Research Projects Agency (HSARPA), S&T Directorate seeks to develop physiological and behavioral screening technologies that will enable security officials to test the effectiveness of current... FAST research is adding a new type of research, the Passive Methods for Precision Behavioral Screening...
Troxel, Wendy M; Trentacosta, Christopher J; Forbes, Erika E; Campbell, Susan B
2013-02-01
Secure parent-child relationships are implicated in children's self-regulation, including the ability to self-soothe at bedtime. Sleep, in turn, may serve as a pathway linking attachment security with subsequent emotional and behavioral problems in children. We used path analysis to examine the direct relationship between attachment security and maternal reports of sleep problems during toddlerhood and the degree to which sleep serves as a pathway linking attachment with subsequent teacher-reported emotional and behavioral problems. We also examined infant negative emotionality as a vulnerability factor that may potentiate attachment-sleep-adjustment outcomes. Data were drawn from 776 mother-infant dyads participating in the National Institute of Child and Human Development Study of Early Child Care. After statistically adjusting for mother and child characteristics, including child sleep and emotional and behavioral problems at 24 months, we found no evidence for a statistically significant direct path between attachment security and sleep problems at 36 months; however, there was a direct relationship between sleep problems at 36 months and internalizing problems at 54 months. Path models that examined the moderating influence of infant negative emotionality demonstrated significant direct relationships between attachment security and toddler sleep problems and between sleep problems and subsequent emotional and behavioral problems, but only among children characterized by high negative emotionality at 6 months. In addition, among this subset, there was a significant indirect path between attachment and internalizing problems through sleep problems. These longitudinal findings implicate sleep as one critical pathway linking attachment security with adjustment difficulties, particularly among temperamentally vulnerable children. PsycINFO Database Record (c) 2013 APA, all rights reserved.
Troxel, Wendy M.; Trentacosta, Christopher J.; Forbes, Erika E.; Campbell, Susan B.
2013-01-01
Secure parent-child relationships are implicated in children’s self-regulation, including the ability to self-soothe at bedtime. Sleep, in turn, may serve as a pathway linking attachment security with subsequent emotional and behavioral problems in children. We used path analysis to examine the direct relationship between attachment security and maternal-reports of sleep problems during toddlerhood, and the degree to which sleep serves as a pathway linking attachment with subsequent teacher-reported emotional and behavioral problems. We also examined infant negative emotionality as a vulnerability factor that may potentiate attachment-sleep-adjustment outcomes. Data were drawn from 776 mother-infant dyads participating in the NICHD Study of Early Child Care (SECC). In the full sample, after statistically adjusting for mother and child characteristics, including child sleep and emotional and behavioral problems at 24 months, we did not find evidence for a statistically significant direct path between attachment security and sleep problems at 36 months; however, there was a direct relationship between sleep problems at 36 months and internalizing problems at 54 months. Path models that examined the moderating influence of infant negative emotionality demonstrated significant direct relationships between attachment security and toddler sleep problems, and sleep problems and subsequent emotional and behavioral problems, but only among children characterized by high negative emotionality at 6 months of age. In addition, among this subset, there was a significant indirect path between attachment and internalizing problems through sleep problems. These longitudinal findings implicate sleep as one critical pathway linking attachment security with adjustment difficulties, particularly among temperamentally vulnerable children. PMID:23421840
1994-12-01
1991. 114 22. Nimmer, R. P. et al. "Fiber Array Geometry Effects Upon Composite Transverse Tensile Behavior," Titanium Aluminide Composites. February... Titanium , Silicon Carbide, Strain Control Mode 17. SECURITY CLASSIFICATION I18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFIKATION 20. LIMITATION OF...ends. Boyum was the first to examine fully reversed (R=-l) fatigue of a titanium composite under the load control mode, at both room and elevated
33 CFR 104.220 - Company or vessel personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Techniques used to circumvent security...
33 CFR 104.220 - Company or vessel personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
... the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Techniques used to circumvent security...
A decoy chain deployment method based on SDN and NFV against penetration attack
Zhao, Qi; Zhang, Chuanhao
2017-01-01
Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. PMID:29216257
A decoy chain deployment method based on SDN and NFV against penetration attack.
Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng
2017-01-01
Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack.
Do infant behaviors following immunization predict attachment? An exploratory study.
Horton, Rachel; Pillai Riddell, Rebecca; Moran, Greg; Lisi, Diana
2016-01-01
The relationship between infant behaviors during routine immunization, pre- and post-needle, and infant attachment was explored. A total of 130 parent-infant dyads were recruited from a larger longitudinal study and videotaped during routine immunization at 12 months and the Strange Situation Procedure (SSP) at 14 months. Six infant behaviors were coded for 1-minute pre-needle and 3-minutes post-needle. Attachment was operationalized according to the secure/avoidant/resistant/disorganized categories. As expected, none of the pre-needle behaviors predicted attachment. Proximity-seeking post-needle significantly discriminated attachment categorizations. Secure infants were more likely to seek proximity to caregivers post-needle in comparison with avoidant and disorganized infants. Proximity-seeking following immunization was positively correlated with proximity-seeking during the SSP and negatively correlated with avoidance and disorganization during the SSP. Infant proximity-seeking during immunization is associated with attachment security and parallels behaviors observed during the SSP. More research is needed to identify behavioral markers of disorganization.
Qu, Jin; Leerkes, Esther M; King, Elizabeth K
2016-08-01
Children (N=98) with higher attachment security scores, and lower resistance and avoidance scores during the Strange Situation at 16 months demonstrated somewhat more adaptive observed and mother-reported emotion regulation as preschoolers independent of maternal behavior. Copyright © 2016 Elsevier Inc. All rights reserved.
Miller-Graff, Laura E; Cummings, E Mark; Bergman, Kathleen N
2016-10-01
The role of emotional security in promoting positive adjustment following exposure to marital conflict has been identified in a large number of empirical investigations, yet to date, no interventions have explicitly addressed the processes that predict child adjustment after marital conflict. The current study evaluated a randomized controlled trial of a family intervention program aimed at promoting constructive marital conflict behaviors thereby increasing adolescent emotional security and adjustment. Families (n = 225) were randomized into 1 of 4 conditions: Parent-Adolescent (n = 75), Parent-Only (n = 75), Self-Study (n = 38) and No Treatment (n = 37). Multi-informant and multi-method assessments were conducted at baseline, post-treatment and 6-month follow-up. Effects of treatment on destructive and constructive conflict behaviors were evaluated using multilevel models where observations were nested within individuals over time. Process models assessing the impact of constructive and destructive conflict behaviors on emotional insecurity and adolescent adjustment were evaluated using path modeling. Results indicated that the treatment was effective in increasing constructive conflict behaviors (d = 0.89) and decreasing destructive conflict behaviors (d = -0.30). For the Parent-Only Group, post-test constructive conflict behaviors directly predicted lower levels of adolescent externalizing behaviors at 6-month follow-up. Post-test constructive conflict skills also indirectly affected adolescent internalizing behaviors through adolescent emotional security. These findings support the use of a brief psychoeducational intervention in improving post-treatment conflict and emotional security about interparental relationships.
Quantification and Formalization of Security
2010-02-01
Quantification of Information Flow . . . . . . . . . . . . . . . . . . 30 2.4 Language Semantics . . . . . . . . . . . . . . . . . . . . . . . . . . 46...system behavior observed by users holding low clearances. This policy, or a variant of it, is enforced by many pro- gramming language -based mechanisms...illustrates with a particular programming language (while-programs plus probabilistic choice). The model is extended in §2.5 to programs in which
Substance Use and HIV Prevention for Youth in Correctional Facilities
ERIC Educational Resources Information Center
Mouttapa, Michele; Watson, Donnie W.; McCuller, William J.; Reiber, Chris; Tsai, Winnie
2009-01-01
Evidence-based programs for substance use and HIV prevention (SUHIP) were adapted for high-risk juveniles detained at 24-hour secure correctional facilities. In this pilot study, comparisons were made between adolescents who received the SUHIP intervention and a control group on changes in: (1) knowledge of HIV prevention behaviors, (2) attitudes…
ERIC Educational Resources Information Center
De Laet, Steven; Colpin, Hilde; Goossens, Luc; Van Leeuwen, Karla; Verschueren, Karine
2014-01-01
Through an examination of measurement invariance, this study investigated whether attachment-related dimensions (i.e., secure base, safe haven, and negative interactions as measured with the Network of Relationships Inventory-Behavioral Systems Version) have the same psychological meaning for early adolescents in their relationships with parents…
ERIC Educational Resources Information Center
Thurber, Christopher A.
2003-01-01
Summaries of four studies in child psychology reveal that children's attachment to caregivers depends on physical contact more than food; secure attachment to loving caregivers provides a base from which children explore and learn; children's separation behaviors reveal much about their attachment relationship; and children are born with traits…
Infant Nutrition and 12 and 18 Months Secure Base Behavior: An Exploratory Study
ERIC Educational Resources Information Center
Wachs, Theodore D.; Posada, German; Carbonell, Olga A.; Creed-Kanashiro, Hillary; Gurkas, Pinar
2011-01-01
A notable omission in studies of developmental links to early nutritional deficiencies is infant attachment. In those few studies investigating associations between infant nutrition and attachment, nutrition was defined solely by physical growth, and infants had moderate-severe growth retardation. In this study, we utilized multiple markers of…
Martin, Meredith J.; Sturge-Apple, Melissa L.; Davies, Patrick T.; Romero, Christine V.; Buckholz, Abigail
2017-01-01
Drawing on a two-wave, multimethod, multi-informant design, this study provides the first test of a process model of spillover specifying why and how disruptions in the coparenting relationship influence the parent–adolescent attachment relationship. One hundred ninety-four families with an adolescent aged 12–14 (M age = 12.4) were followed for 1 year. Mothers and adolescents participated in two experimental tasks designed to elicit behavioral expressions of parent and adolescent functioning within the attachment relationship. Using a novel observational approach, maternal safe haven, secure base, and harshness (i.e., hostility and control) were compared as potential unique mediators of the association between conflict in the coparenting relationship and adolescent problems. Path models indicated that, although coparenting conflicts were broadly associated with maternal parenting difficulties, only secure base explained the link to adolescent adjustment. Adding further specificity to the process model, maternal secure base support was uniquely associated with adolescent adjustment through deficits in adolescents’ secure exploration. Results support the hypothesis that coparenting disagreements undermine adolescent adjustment in multiple domains specifically by disrupting mothers’ ability to provide a caregiving environment that supports adolescent exploration during a developmental period in which developing autonomy is a crucial stage-salient task. PMID:28401834
Grilo, Stephanie A; Shallcross, Amanda J; Ogedegbe, Gbenga; Odedosu, Taiye; Levy, Natalie; Lehrer, Susan; Chaplin, William; Spruill, Tanya M
2015-02-12
Food insecurity is associated with diet-sensitive diseases and may be a barrier to successful chronic disease self-management. To evaluate the impact of food insecurity on blood pressure reduction in a pilot clinical trial, we tested the effectiveness of 2 behavioral interventions for hypertension in people with and without food security. A group of 28 men and women with type 2 diabetes and uncontrolled hypertension were randomized to either 1) home blood pressure telemonitoring alone or 2) home blood pressure telemonitoring plus telephone-based nurse case management. The primary outcome was 6-month change in systolic blood pressure. The 2 interventions resulted in modest, nonsignificant blood pressure reductions. Food-secure patients experienced clinically and statistically significant reductions in blood pressure, whereas no significant change was seen among food-insecure patients. Screening for food insecurity may help identify patients in need of tailored disease management interventions.
33 CFR 106.215 - Company or OCS facility personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
... appropriate: (a) Knowledge of current and anticipated security threats and patterns. (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Recognition of techniques used to circumvent security...
33 CFR 106.215 - Company or OCS facility personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... appropriate: (a) Knowledge of current and anticipated security threats and patterns. (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Recognition of techniques used to circumvent security...
NASA Astrophysics Data System (ADS)
Koehler-Sidki, A.; Dynes, J. F.; Lucamarini, M.; Roberts, G. L.; Sharpe, A. W.; Yuan, Z. L.; Shields, A. J.
2018-04-01
Fast-gated avalanche photodiodes (APDs) are the most commonly used single photon detectors for high-bit-rate quantum key distribution (QKD). Their robustness against external attacks is crucial to the overall security of a QKD system, or even an entire QKD network. We investigate the behavior of a gigahertz-gated, self-differencing (In,Ga)As APD under strong illumination, a tactic Eve often uses to bring detectors under her control. Our experiment and modeling reveal that the negative feedback by the photocurrent safeguards the detector from being blinded through reducing its avalanche probability and/or strengthening the capacitive response. Based on this finding, we propose a set of best-practice criteria for designing and operating fast-gated APD detectors to ensure their practical security in QKD.
Zicko, Cdr Jennifer M; Schroeder, Lcdr Rebecca A; Byers, Cdr William S; Taylor, Lt Adam M; Spence, Cdr Dennis L
2017-10-01
Staff members working on our nonmental health (non-MH) units (i.e., medical-surgical [MS] units) were not educated in recognizing or deescalating behavioral emergencies. Published evidence suggests a behavioral emergency response team (BERT) composed of MH experts who assist with deescalating behavioral emergencies may be beneficial in these situations. Therefore, we sought to implement a BERT on the inpatient non-MH units at our military treatment facility. The objectives of this evidence-based practice process improvement project were to determine how implementation of a BERT affects staff and patient safety and to examine nursing staffs' level of knowledge, confidence, and support in caring for psychiatric patients and patients exhibiting behavioral emergencies. A BERT was piloted on one MS unit for 5 months and expanded to two additional units for 3 months. Pre- and postimplementation staff surveys were conducted, and the number of staff assaults and injuries, restraint usage, and security intervention were compared. The BERT responded to 17 behavioral emergencies. The number of assaults decreased from 10 (pre) to 1 (post); security intervention decreased from 14 to 1; and restraint use decreased from 8 to 1. MS staffs' level of BERT knowledge and rating of support between MH staff and their staff significantly increased. Both MS and MH nurses rated the BERT as supportive and effective. A BERT can assist with deescalating behavioral emergencies, and improve staff collaboration and patient and staff safety. © 2017 Sigma Theta Tau International.
Cummings, E Mark; Merrilees, Christine E; Schermerhorn, Alice C; Goeke-Morey, Marcie C; Shirlow, Peter; Cairns, Ed
2010-05-01
Relations between political violence and child adjustment are matters of international concern. Past research demonstrates the significance of community, family, and child psychological processes in child adjustment, supporting study of interrelations between multiple social ecological factors and child adjustment in contexts of political violence. Testing a social ecological model, 300 mothers and their children (M = 12.28 years, SD = 1.77) from Catholic and Protestant working class neighborhoods in Belfast, Northern Ireland, completed measures of community discord, family relations, and children's regulatory processes (i.e., emotional security) and outcomes. Historical political violence in neighborhoods based on objective records (i.e., politically motivated deaths) were related to family members' reports of current sectarian antisocial behavior and nonsectarian antisocial behavior. Interparental conflict and parental monitoring and children's emotional security about both the community and family contributed to explanatory pathways for relations between sectarian antisocial behavior in communities and children's adjustment problems. The discussion evaluates support for social ecological models for relations between political violence and child adjustment and its implications for understanding relations in other parts of the world.
Erosion of Digital Professionalism During Medical Students' Core Clinical Clerkships.
Mostaghimi, Arash; Olszewski, Aleksandra E; Bell, Sigall K; Roberts, David H; Crotty, Bradley H
2017-05-03
The increased use of social media, cloud computing, and mobile devices has led to the emergence of guidelines and novel teaching efforts to guide students toward the appropriate use of technology. Despite this, violations of professional conduct are common. We sought to explore professional behaviors specific to appropriate use of technology by looking at changes in third-year medical students' attitudes and behaviors at the beginning and conclusion of their clinical clerkships. After formal teaching about digital professionalism, we administered a survey to medical students that described 35 technology-related behaviors and queried students about professionalism of the behavior (on a 5-point Likert scale), observation of others engaging in the behavior (yes or no), as well as personal participation in the behavior (yes or no). Students were resurveyed at the end of the academic year. Over the year, perceptions of what is considered acceptable behavior regarding privacy, data security, communications, and social media boundaries changed, despite formal teaching sessions to reinforce professional behavior. Furthermore, medical students who observed unprofessional behaviors were more likely to participate in such behaviors. Although technology is a useful tool to enhance teaching and learning, our results reflect an erosion of professionalism related to information security that occurred despite medical school and hospital-based teaching sessions to promote digital professionalism. True alteration of trainee behavior will require a cultural shift that includes continual education, better role models, and frequent reminders for faculty, house staff, students, and staff. ©Arash Mostaghimi, Aleksandra E Olszewski, Sigall K Bell, David H Roberts, Bradley H Crotty. Originally published in JMIR Medical Education (http://mededu.jmir.org), 03.05.2017.
Dover, Robert V H; Lambert, Estelle V
2016-03-16
Using the nexus between food consumption, food security and obesity, this paper addresses the complexity of health behavior decision-making moments that reflect relational social dynamics in context-specific dialogues, often in choice-constrained conditions. A pragmatic review of literature regarding social determinants of health in relation to food consumption, food security and obesity was used to advance this theoretical model. We suggest that health choice, such as food consumption, is based on more than the capacity and volition of individuals to make "healthy" choices, but is dialogic and adaptive. In terms of food consumption, there will always be choice-constrained conditions, along a continuum representing factors over which the individual has little or no control, to those for which they have greater agency. These range from food store geographies and inventories and food availability, logistical considerations such as transportation, food distribution, the structure of equity in food systems, state and non-government food and nutrition programs, to factors where the individual exercises a greater degree of autonomy, such as sociocultural foodways, family and neighborhood shopping strategies, and personal and family food preferences. At any given food decision-making moment, many factors of the continuum are present consciously or unconsciously when the individual makes a decision. These health behavior decision-making moments are mutable, whether from an individual perspective, or within a broader social or policy context. We review the construct of "choice set", the confluence of factors that are temporally weighted by the differentiated and relationally-contextualized importance of certain factors over others in that moment. The choice transition represents an essential shift of the choice set based on the conscious and unconscious weighting of accumulated evidence, such that people can project certain outcomes. Policies and interventions should avoid dichotomies of "good and bad" food choices or health behaviors, but focus on those issues that contribute to the weightedness of factors influencing food choice behavior at a given decision-making moment and within a given choice set.
Security and confidentiality of health information systems: implications for physicians.
Dorodny, V S
1998-01-01
Adopting and developing the new generation of information systems will be essential to remain competitive in a quality conscious health care environment. These systems enable physicians to document patient encounters and aggregate the information from the population they treat, while capturing detailed data on chronic medical conditions, medications, treatment plans, risk factors, severity of conditions, and health care resource utilization and management. Today, the knowledge-based information systems should offer instant, around-the-clock access for the provider, support simple order entry, facilitate data capture and retrieval, and provide eligibility verification, electronic authentication, prescription writing, security, and reporting that benchmarks outcomes management based upon clinical/financial decisions and treatment plans. It is an integral part of any information system to incorporate and integrate transactional (financial/administrative) information, as well as analytical (clinical/medical) data in a user-friendly, readily accessible, and secure form. This article explores the technical, financial, logistical, and behavioral obstacles on the way to the Promised Land.
Examining the Relationship between Organization Systems and Information Security Awareness
ERIC Educational Resources Information Center
Tintamusik, Yanarong
2010-01-01
The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…
Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Oehmen, Christopher S.
This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less
ERIC Educational Resources Information Center
Warrington, Cartmell
2017-01-01
In this study, the Big Five factor model of personality traits theory was tested for its ability to predict or explain Employee Information Security Behavior (EISB), when Generational Cohort (GCOHORT) moderated the relationship between the five factors of personality and EISB. The independent variables (IVs) Extraversion, Agreeableness,…
Behavior analysis of video object in complicated background
NASA Astrophysics Data System (ADS)
Zhao, Wenting; Wang, Shigang; Liang, Chao; Wu, Wei; Lu, Yang
2016-10-01
This paper aims to achieve robust behavior recognition of video object in complicated background. Features of the video object are described and modeled according to the depth information of three-dimensional video. Multi-dimensional eigen vector are constructed and used to process high-dimensional data. Stable object tracing in complex scenes can be achieved with multi-feature based behavior analysis, so as to obtain the motion trail. Subsequently, effective behavior recognition of video object is obtained according to the decision criteria. What's more, the real-time of algorithms and accuracy of analysis are both improved greatly. The theory and method on the behavior analysis of video object in reality scenes put forward by this project have broad application prospect and important practical significance in the security, terrorism, military and many other fields.
A user authentication scheme using physiological and behavioral biometrics for multitouch devices.
Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.
A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices
Koong, Chorng-Shiuh; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864
Savoie-Roskos, Mateja; Durward, Carrie; Jeweks, Melanie; LeBlanc, Heidi
2016-01-01
To determine whether participation in a farmers' market incentive pilot program had an impact on food security and fruit and vegetable (F&V) intake of participants. Participants in the Supplemental Nutrition Assistance Program were eligible to receive a dollar-per-dollar match up to $10/wk in farmers' market incentives. The researchers used a pretest-posttest design to measure F&V intake and food security status of 54 adult participants before and after receiving farmers' market incentives. The 6-item Behavior Risk Factor Surveillance System questionnaire and US Household Food Security Survey Module were used to measure F&V intake and food security, respectively. Wilcoxon signed-rank test was used to compare scores of F&V intake. After receiving incentives, fewer individuals reported experiencing food insecurity-related behaviors. A significantly increased intake (P < .05) was found among selected vegetables. Participation in a farmers' market incentive program was positively related to greater food security and intake of select vegetables among participants in the Supplemental Nutrition Assistance Program. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Guedes, Maryse; Santos, António J; Ribeiro, Olívia; Freitas, Miguel; Rubin, Kenneth H; Veríssimo, Manuela
2018-06-01
Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 adolescents (115 boys, 107 girls) who completed the Kerns Security Scale and the Extended Class Play, to assess perceived attachment security and social behavior, respectively. Controlling for age and sex, aggressive victims and non-aggressive victims differed in anxious withdrawal but shared a similar profile in peer exclusion and prosocial behavior. Only aggressive victims reported lower attachment security to mother and father when compared to non-victims. These findings underline that victimized adolescents constitute a heterogeneous group in terms of their social and family functioning. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Marfeo, Elizabeth E.; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M.; Chan, Leighton; Rasch, Elizabeth K.; Brandt, Diane E.; Jette, Alan M.
2014-01-01
Objectives To use item response theory (IRT) data simulations to construct and perform initial psychometric testing of a newly developed instrument, the Social Security Administration Behavioral Health Function (SSA-BH) instrument, that aims to assess behavioral health functioning relevant to the context of work. Design Cross-sectional survey followed by item response theory (IRT) calibration data simulations Setting Community Participants A sample of individuals applying for SSA disability benefits, claimants (N=1015), and a normative comparative sample of US adults (N=1000) Interventions None. Main Outcome Measure Social Security Administration Behavioral Health Function (SSA-BH) measurement instrument Results Item response theory analyses supported the unidimensionality of four SSA-BH scales: Mood and Emotions (35 items), Self-Efficacy (23 items), Social Interactions (6 items), and Behavioral Control (15 items). All SSA-BH scales demonstrated strong psychometric properties including reliability, accuracy, and breadth of coverage. High correlations of the simulated 5- or 10- item CATs with the full item bank indicated robust ability of the CAT approach to comprehensively characterize behavioral health function along four distinct dimensions. Conclusions Initial testing and evaluation of the SSA-BH instrument demonstrated good accuracy, reliability, and content coverage along all four scales. Behavioral function profiles of SSA claimants were generated and compared to age and sex matched norms along four scales: Mood and Emotions, Behavioral Control, Social Interactions, and Self-Efficacy. Utilizing the CAT based approach offers the ability to collect standardized, comprehensive functional information about claimants in an efficient way, which may prove useful in the context of the SSA’s work disability programs. PMID:23542404
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
McMillan, Brian; Hickey, Eamonn; Patel, Mahendra G; Mitchell, Caroline
2016-03-01
To quality assess a sample of health behavior change apps from the NHS Apps Library using a rating tool based on the 2014 National Institute for Health and Care Excellence behavior change guidance (NICE BCG). A qualitative analysis of the NICE BCG identified themes and questions for a quality assessment of health behavior change apps. These were refined by further discussion and piloting, and applied by two independent raters to a sample of NHS Library apps (N=49). Disagreements were resolved following discussions with a third rater. Themes identified were; purpose, planning, usability, tailoring, behavior change technique (BCT), maintenance, evaluation, data security and documentation. Overall, purpose of the apps was clear, but evidence for collaboration with users or professionals was lacking. Usability information was poor and tailoring disappointing. Most used recognized BCTs but paid less attention to behavior maintenance than initiation. Information on app evaluation and documentation was sparse. This study furthers the work of the NHS Apps Library, adapting the NICE (2014) behavior change guidance for quality assessment of behavior change apps. This study helps lay the foundations for development of a quality assurance tool for mobile health apps aimed at health behavior change. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Behavioral and Physiological Responses of Horses to Simulated Aircraft Noise
1991-01-01
AL-TR-1991-0123 A R M BEHAVIORAL AND PHYSIOLOGICAL S RESPONSES OF HORSES TO SIMULATED T AIRCRAFT NOISE R 0 N G Michelle M. LeBlanc Christoph Lombard...COVERED • 10 January 1991 IFinal Report Dec 89 to Jan 91 4. TITLE AND SUBTITLE 5. FUNDING NUMBERS Behavioral and Physiological Responses of Horses to...NUMBER OF PAGES Aircraft, Noise, Domestic Animals, Horses , 70 Disturbance, Physiological Effects 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
Fast, Parallel and Secure Cryptography Algorithm Using Lorenz's Attractor
NASA Astrophysics Data System (ADS)
Marco, Anderson Gonçalves; Martinez, Alexandre Souto; Bruno, Odemir Martinez
A novel cryptography method based on the Lorenz's attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Lee, Adrian J; Jacobson, Sheldon H
2012-02-01
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.
Overlay improvement methods with diffraction based overlay and integrated metrology
NASA Astrophysics Data System (ADS)
Nam, Young-Sun; Kim, Sunny; Shin, Ju Hee; Choi, Young Sin; Yun, Sang Ho; Kim, Young Hoon; Shin, Si Woo; Kong, Jeong Heung; Kang, Young Seog; Ha, Hun Hwan
2015-03-01
To accord with new requirement of securing more overlay margin, not only the optical overlay measurement is faced with the technical limitations to represent cell pattern's behavior, but also the larger measurement samples are inevitable for minimizing statistical errors and better estimation of circumstance in a lot. From these reasons, diffraction based overlay (DBO) and integrated metrology (IM) were mainly proposed as new approaches for overlay enhancement in this paper.
Boldt, Lea J.; Kochanska, Grazyna; Yoon, Jeung Eun; Nordling, Jamie Koenig
2014-01-01
We examined children’s attachment security with their mothers and fathers in a community sample (N = 100). At 25 months, mothers, fathers, and trained observers completed Attachment Q-Set (AQS). At 100 months, children completed Kerns Security Scale (KSS) for each parent. Children’s adaptation (behavior problems and competence in broader ecologies of school and peer group, child- and parent-reported) was assessed at 100 months. By and large, the child’s security with the mother and father was modestly to robustly concordant across both relationships, depending on the assessment method. Observers’ AQS security scores predicted children’s self-reported security 6 years later. For children with low AQS security scores with mothers, variations in security with fathers had significant implications for adaptation: Those whose security with fathers was also low reported the most behavior problems and were seen as least competent in broader ecologies, but those whose security with fathers was high reported few problems and were seen as competent. Security with fathers, observer-rated and child-reported, predicted children’s higher competence in broader ecologies. A cumulative index of the history of security from toddler age to middle childhood, integrating measures across both relationships and diverse methodologies, was significantly associated with positive adaptation at 100 months. PMID:24605850
ERIC Educational Resources Information Center
Kaya, Sinem; Avci, Rasit
2016-01-01
Problem Statement: Future Anxiety (FA) and Trait Anxiety (TA) have negative effects on individuals' productivity, which can lead them to feelings of insecurity and eventually depression. Knowing more about future anxiety helps people feel more secure and produce more effectively for themselves, and eventually for society. This research examined…
Rationality, Culture and Deterrence
2013-09-01
Postgraduate School Center on Contemporary Conflict is the research wing of the Department of National Security Affairs ( NSA ) and specializes in the...and neuroscience . None of these approaches, either alone or in combination, offers a perfect framework for predicting the outcomes of deterrence...constructivism, approaches based on domestic and bureaucratic politics, and behavioral approaches drawn from findings in psychology and neuroscience
Davis, Deborah; Soref, Assaf; Villalobos, J Guillermo; Mikulincer, Mario
2016-08-01
Interviewers often face respondents reluctant to disclose sensitive, embarrassing or potentially damaging information. We explored effects of priming 5 states of mind on willingness to disclose: including 2 expected to facilitate disclosure (self-affirmation, attachment security), and 3 expected to inhibit disclosure (self-disaffirmation, attachment insecurity, mortality salience). Israeli Jewish participants completed a survey including a manipulation of 1 of these states of mind, followed by questions concerning hostile thoughts and behaviors toward the Israeli Arab outgroup, past minor criminal behaviors, and socially undesirable traits and behaviors. Self-affirmation led to more disclosures of all undesirable behaviors than neutral priming, whereas self-disaffirmation led to less disclosures. Mortality salience led to fewer disclosures of socially undesirable and criminal behaviors compared to neutral priming, but more disclosures of hostile thoughts and behaviors toward Israeli Arabs. Security priming facilitated disclosure of hostile attitudes toward Israeli Arabs. However, neither security nor insecurity priming had any other significant effects. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
The Prevalence of Food Security and Insecurity Among Illinois University Students.
Morris, Loran Mary; Smith, Sylvia; Davis, Jeremy; Null, Dawn Bloyd
2016-06-01
This study aims to define the food security status of Illinois university students and whether sociodemographic characteristics are related to that status. A cross-sectional research design was used to analyze the food security status of undergraduate Illinois university students, employing a survey containing the Household Food Security Survey Module that was distributed via e-mail to student participants. Four public Illinois universities were highlighted, including Eastern Illinois University, Northern Illinois University, Southern Illinois University, and Western Illinois University. A total of 1,882 undergraduate students participated in the research study in April, 2013. Variables include food security status and sociodemographic characteristics such as age, sex, race, and academic standing. Statistical analysis included frequencies and chi-square tests. The percentage of student respondents in the total sample who were considered food insecure was 35.0%. There were significant relationships between food security status and sociodemographic variables including race, grade point average, loan use, and living location. This study suggests that 35% of respondents were food insecure based on quantitative assessment. Understanding the significant relationship between food security status and race, grade point average, loan use, and living location may be useful in developing services for those in need. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Leifer, Myra; Kilbane, Teresa; Skolnick, Linda
2002-01-01
This study assessed the relationships between maternal adult attachment style, children's perceptions of maternal support following disclosure of sexual abuse, and maternal perceptions of children's behavioral and emotional responses to sexual abuse among African-American child sexual abuse victims aged 4 to 12 (n=96) and a comparison group of non-abused subjects (n=100). Mothers with insecure attachment styles reported significantly higher rates of internalizing behaviors in their sexually abused children than did securely attached mothers. Among mothers of non-abused children, those with insecure adult attachment styles reported significantly higher rates of externalizing behaviors shown by their children in comparison with mothers with a secure adult attachment style. Mothers with insecure adult attachment styles also reported higher rates of overall behavior problems in their non-abused children that approached statistical significance. Sexually abused children's perceptions of maternal support were not related to maternal attachment style nor to child functioning. Contrary to our prediction, mothers of sexually abused children did not show lower rates of secure attachments when compared to mothers of non-sexually abused children. Our findings indicate that fostering parent- child attachment is important in order to decrease the risk for behavior problems and symptomatology in sexually abused children.
Individual Differences in Infants' Joint Attention Behaviors with Mother and a New Social Partner
ERIC Educational Resources Information Center
Meins, Elizabeth; Fernyhough, Charles; Arnott, Bronia; Vittorini, Lucia; Turner, Michelle; Leekam, Susan R.; Parkinson, Kathryn
2011-01-01
Relations between infant-mother attachment security at 15 months and infants' (N = 206) joint attention behaviors (a) with an experimenter at 8 and 15 months, and (b) with their mothers at 15 months were investigated. No concurrent or longitudinal relations were observed between attachment security and infants' tendency to respond to an…
A Secure Behavior Modification Sensor System for Physical Activity Improvement
ERIC Educational Resources Information Center
Price, Alan
2011-01-01
Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…
76 FR 80421 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-23
... SECURITIES AND EXCHANGE COMMISSION Submission for OMB Review; Comment Request Upon Written Request, Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... federal securities laws and promote ethical behavior of attorneys appearing and practicing before the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Sanctions. 200.114 Section 200.114 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Purpose. 200.110 Section 200.110 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Purpose. 200.110 Section 200.110 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Purpose. 200.110 Section 200.110 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Sanctions. 200.114 Section 200.114 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Sanctions. 200.114 Section 200.114 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Sanctions. 200.114 Section 200.114 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Sanctions. 200.114 Section 200.114 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Purpose. 200.110 Section 200.110 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Purpose. 200.110 Section 200.110 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte Communications Between Persons...
Safety Psychology Applicating on Coal Mine Safety Management Based on Information System
NASA Astrophysics Data System (ADS)
Hou, Baoyue; Chen, Fei
In recent years, with the increase of intensity of coal mining, a great number of major accidents happen frequently, the reason mostly due to human factors, but human's unsafely behavior are affected by insecurity mental control. In order to reduce accidents, and to improve safety management, with the help of application security psychology, we analyse the cause of insecurity psychological factors from human perception, from personality development, from motivation incentive, from reward and punishment mechanism, and from security aspects of mental training , and put forward countermeasures to promote coal mine safety production,and to provide information for coal mining to improve the level of safety management.
WPSS: watching people security services
NASA Astrophysics Data System (ADS)
Bouma, Henri; Baan, Jan; Borsboom, Sander; van Zon, Kasper; Luo, Xinghan; Loke, Ben; Stoeller, Bram; van Kuilenburg, Hans; Dijk, Judith
2013-10-01
To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software platform that contributes to the retrieval and observation of humans and to the analysis of their behavior. The platform consists of mono- and stereo-camera tracking, re-identification, behavioral feature computation, track analysis, behavior interpretation and visualization. This system is demonstrated in a busy shopping mall with multiple cameras and different lighting conditions.
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel
2017-11-01
After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.111 - Prohibitions; application; definitions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Prohibitions; application; definitions. 200.111 Section 200.111 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
Abernethy, Amy P; Wheeler, Jane L; Courtney, Paul K; Keefe, Francis J
2011-03-01
The advancement of translational behavioral medicine will require that we discover new methods of managing large volumes of data from disparate sources such as disease surveillance systems, public health systems, and health information systems containing patient-centered data informed by behavioral and social sciences. The term "liquidity," when applied to data, refers to its availability and free flow throughout human/computer interactions. In seeking to achieve liquidity, the focus is not on creating a single, comprehensive database or set of coordinated datasets, nor is it solely on developing the electronic health record as the "one-stop shopping" source of health-related data. Rather, attention is on ensuring the availability of secure data through the various methods of collecting and storing data currently existent or under development-so that these components of the health information infrastructure together support a liquid data system. The value of accessible, interoperable, high-volume, reliable, secure, and contextually appropriate data is becoming apparent in many areas of the healthcare system, and health information liquidity is currently viewed as an important component of a patient-centered healthcare system. The translation from research interventions to behavioral and psychosocial indicators challenges the designers of healthcare systems to include this new set of data in the correct context. With the intention of advancing translational behavioral medicine at the local level, "on the ground" in the clinical office and research institution, this commentary discusses data liquidity from the patient's and clinician's perspective, requirements for a liquid healthcare data system, and the ways in which data liquidity can support translational behavioral medicine.
ERIC Educational Resources Information Center
Bohlin, Gunilla; Hagekull, Berit; Andersson, Kerstin
2005-01-01
A sample of 81 children was followed longitudinally to assess the contributions of behavioral inhibition, early attachment security, and experience of nonparental care to individual differences in social competence. Additive, mediational, and moderator models were tried. Attachment security was assessed in the Strange Situation at 15 months of…
ERIC Educational Resources Information Center
Daniels, Daniel B., III
2014-01-01
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Design tools for complex dynamic security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson
2007-01-01
The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systemsmore » are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.« less
ERIC Educational Resources Information Center
St. Lifer, Evan
1994-01-01
Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…
17 CFR 200.113 - Opportunity to respond; interception.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Opportunity to respond; interception. 200.113 Section 200.113 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.113 - Opportunity to respond; interception.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Opportunity to respond; interception. 200.113 Section 200.113 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.113 - Opportunity to respond; interception.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Opportunity to respond; interception. 200.113 Section 200.113 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.113 - Opportunity to respond; interception.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Opportunity to respond; interception. 200.113 Section 200.113 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.113 - Opportunity to respond; interception.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Opportunity to respond; interception. 200.113 Section 200.113 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
Brown, Geoffrey L.; Mangelsdorf, Sarah C.; Neff, Cynthia
2014-01-01
To reach a greater understanding of the early father-child attachment relationship, this study examined concurrent and longitudinal associations among father involvement, paternal sensitivity, and father-child attachment security at 13 months and 3 years of age. Analyses revealed few associations among these variables at 13 months of age, but involvement and sensitivity independently predicted father-child attachment security at age 3. Moreover, sensitivity moderated the association between involvement and attachment security at 3 years. Specifically, involvement was unrelated to attachment security when fathers were highly sensitive, but positively related to attachment security when fathers were relatively less sensitive. Father involvement was also moderately stable across the two timepoints, but paternal sensitivity was not. Furthermore, there was significant stability in father-child attachment security from 13 months to 3 years. Secure attachment at 13 months also predicted greater levels of paternal sensitivity at 3 years, with sensitivity at age 3 mediating the association between 13 month and 3 year attachment security. In sum, a secure father-child attachment relationship a) was related to both quantity and quality of fathering behavior, b) remained relatively stable across early childhood, and c) predicted increased paternal sensitivity over time. These findings further our understanding of the correlates of early father-child attachment, and underscore the need to consider multiple domains of fathers’ parenting and reciprocal relations between fathering behavior and father-child attachment security. PMID:22468691
2012-01-01
Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com Copyright © 2011...Lawrence Erlbaum Associates. Anderson, J. R., & Lebiere, C. (2003). The New- ell test for a theory of mind. The Behavioral and Brain Sciences, 26(5
ERIC Educational Resources Information Center
Borba, Michele
A curriculum for enhancing student self-esteem in grades kindergarten through 12 is presented in this guide. An introduction discusses the background and research-based data as to why esteem building is essential for today's students. Chapter 1 explains the building blocks of self-esteem: security, self-hood, affiliation, mission, and competence.…
ERIC Educational Resources Information Center
Brown, David A.
2017-01-01
Information security is a concern for managers implementing protection measures. Implementing information security measures requires communicating both the reason and remediation for the protection measure. Examining how an anti-spyware security communication affects an individual's intention to implement a protection measure could help improve…
ERIC Educational Resources Information Center
Edwards, Keith
2015-01-01
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
Emergence of trend trading and its effects in minority game
NASA Astrophysics Data System (ADS)
Liu, Xing-Hua; Liang, Xiao-Bei; Wang, Nai-Jing
2006-09-01
In this paper, we extended Minority Game (MG) by equipping agents with both value and trend strategies. In the new model, agents (we call them strong-adaptation agents) can autonomically select to act as trend trader or value trader when they game and learn in system. So the new model not only can reproduce stylized factors but also has the potential to investigate into the process of some problems of securities market. We investigated the dynamics of trend trading and its impacts on securities market based on the new model. Our research found that trend trading is inevitable when strong-adaptation agents make decisions by inductive reasoning. Trend trading (of strong-adaptation agents) is not irrational behavior but shows agent's strong-adaptation intelligence, because strong-adaptation agents can take advantage of the pure value agents when they game together in hybrid system. We also found that strong-adaptation agents do better in real environment. The results of our research are different with those of behavior finance researches.
Brown, Geoffrey L; Gustafsson, Hanna C; Mills-Koonce, W Roger; Cox, Martha J
2017-08-01
Little research has examined the legacy of early maternal care for later attachment representations among low-income and ethnic minority school-aged children. Using data from a sample of 276 rural, low-income, African-American families, this study examined associations between maternal care in infancy and children's representations of attachment figures in middle childhood. Maternal care was coded from 10-min home-based observations at 6, 15, and 24 months of age. Representations of attachment figures were assessed using the Manchester Child Attachment Story Task at 6 years of age. Sensitive maternal care in infancy was not significantly related to attachment security or episodic disorganized behaviors in children's representations. However, children exposed to more harsh-intrusive parenting during infancy displayed less secure representations of attachment figures in middle childhood and more episodic disorganized behaviors, even after controlling for numerous child and family contextual covariates. Findings inform conceptualizations of attachment formation among rural, low-income, African-American parent-child dyads.
Nuttman-Shwartz, Orit
2017-07-01
There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of differential interventions with children who show post-traumatic symptoms versus those who show aggressive behavior. Accordingly, the security situation should not overshadow social issues that need to be addressed, such as family violence and aggression among school children. Copyright © 2017 Elsevier Ltd. All rights reserved.
Sevick, Mary Ann; Woolf, Kathleen; Mattoo, Aditya; Katz, Stuart D; Li, Huilin; St-Jules, David E; Jagannathan, Ram; Hu, Lu; Pompeii, Mary Lou; Ganguzza, Lisa; Li, Zhi; Sierra, Alex; Williams, Stephen K; Goldfarb, David S
2018-01-01
Patients with complex chronic diseases usually must make multiple lifestyle changes to limit and manage their conditions. Numerous studies have shown that education alone is insufficient for engaging people in lifestyle behavior change, and that theory-based behavioral approaches also are necessary. However, even the most motivated individual may have difficulty with making lifestyle changes because of the information complexity associated with multiple behavior changes. The goal of the current Healthy Hearts and Kidneys study was to evaluate, different mobile health (mHealth)-delivered intervention approaches for engaging individuals with type 2 diabetes (T2D) and concurrent chronic kidney disease (CKD) in behavior changes. Participants were randomized to 1 of 4 groups, receiving: (1) a behavioral counseling, (2) technology-based self-monitoring to reduce information complexity, (3) combined behavioral counseling and technology-based self-monitoring, or (4) baseline advice. We will determine the impact of randomization assignment on weight loss success and 24-hour urinary excretion of sodium and phosphorus. With this report we describe the study design, methods, and approaches used to assure information security for this ongoing clinical trial. Clinical Trials.gov Identifier: NCT02276742. Copyright © 2017. Published by Elsevier Inc.
Ecosystem and Food Security in a Changing Climate
NASA Astrophysics Data System (ADS)
Field, C. B.
2011-12-01
Observed and projected impacts of climate change for ecosystem and food security tend to appear as changes in the risk of both desirable and undesirable outcomes. As a consequence, it is useful to frame the challenge of adaptation to a changing climate as a problem in risk management. For some kinds of impacts, the risks are relatively well characterized. For others, they are poorly known. Especially for the cases where the risks are poorly known, effective adaptation will need to consider approaches that build dynamic portfolios of options, based on learning from experience. Effective adaptation approaches also need to consider the risks of threshold-type responses, where opportunities for gradual adaptation based on learning may be limited. Finally, effective adaptation should build on the understanding that negative impacts on ecosystems and food security often result from extreme events, where a link to climate change may be unclear now and far into the future. Ecosystem and food security impacts that potentially require adaptation to a changing climate vary from region to region and interact strongly with actions not related to climate. In many ecosystems, climate change shifts the risk profile to increase risks of wildfire and biological invasions. Higher order risks from factors like pests and pathogens remain difficult to quantify. For food security, observational evidence highlights threshold-like behavior to high temperature in yields of a number of crops. But the risks to food security may be much broader, encompassing risks to availability of irrigation, degradation of topsoil, and challenges of storage and distribution. A risk management approach facilitates consideration of all these challenges with a unified framework.
Electronic health records: eliciting behavioral health providers' beliefs.
Shank, Nancy; Willborn, Elizabeth; Pytlikzillig, Lisa; Noel, Harmonijoie
2012-04-01
Interviews with 32 community behavioral health providers elicited perceived benefits and barriers of using electronic health records. Themes identified were (a) quality of care, (b) privacy and security, and (c) delivery of services. Benefits to quality of care were mentioned by 100% of the providers, and barriers by 59% of providers. Barriers involving privacy and security concerns were mentioned by 100% of providers, and benefits by 22%. Barriers to delivery of services were mentioned by 97% of providers, and benefits by 66%. Most providers (81%) expressed overall positive support for electronic behavioral health records.
Endogenous fertility, altruistic behavior across generations, and social security systems.
Prinz, A
1990-01-01
This study examines the possible link between the existence of a pay-as-you-go social security program and individual procreative behavior. When a public old-age income support system takes the place of within-family support, the theoretical literature preducts that fertility rates will decline since children are no longer perceived as important to the old age security of the parents. The author takes up this theoretical problem and examines it through three different but related issues: optimal capital accumulation, optimal population growth and the role of social institutions affecting efficient intergenerational allocations. Econometric analysis employing a steady state growth model is used. Altruism between generations is studied for effect on the standard model. The model shows that for social optimum the per capita pension is related to the growth rate of the population, therefore, for society as a whole, children are investment goods. However, given the existence of a social security system, it is in each household's best interest to have no children at all. Only a government transfer, a child allowance to parents, changes the model and fertility rates. When modified to account for "caring" the model demonstrates that altruistic behavior between generations is not symmetrical. The study concludes that a pay-as-you-go funded social security system should be supplemented by a system of child allowances or replaced by a fully funded social security system.
Sexual safety and sexual security among young Black women who have sex with women and men.
Alexander, Kamila Anise; Fannin, Ehriel F
2014-01-01
To examine sexuality narratives of Black women who have sex with women and men and explore factors that influence their sexual safety and sexual security. Secondary qualitative content analysis. We recruited young self-identified Black women from beauty salons and community-based organizations. Our sample included a subset of five sexually active, Black women age 19 to 25 who reported engaging in sexual relationships with women and men. Participants were selected from a larger parent study that included sexuality narratives from 25 women. We analyzed interview transcripts in which participants described sexual relationships. We used constant comparative techniques and conventional content analysis methodology. We uncovered three themes illustrating influences on sexual safety and sexual security: institutional expectations, emotional connectedness, and sexual behaviors. From this analysis, we derive valuable insights into decision-making processes within sexual relationships from the perspectives of young Black women who have sex with women and men. Clinicians and investigators can use these findings to inform programs designed to improve the sexual health of this often invisible group of women. Nurses are uniquely positioned to support young women as they navigate societal institutions and emotional experiences that inform future sexual decisions and behaviors. © 2014 AWHONN, the Association of Women's Health, Obstetric and Neonatal Nurses.
Entropy-based financial asset pricing.
Ormos, Mihály; Zibriczky, Dávid
2014-01-01
We investigate entropy as a financial risk measure. Entropy explains the equity premium of securities and portfolios in a simpler way and, at the same time, with higher explanatory power than the beta parameter of the capital asset pricing model. For asset pricing we define the continuous entropy as an alternative measure of risk. Our results show that entropy decreases in the function of the number of securities involved in a portfolio in a similar way to the standard deviation, and that efficient portfolios are situated on a hyperbola in the expected return-entropy system. For empirical investigation we use daily returns of 150 randomly selected securities for a period of 27 years. Our regression results show that entropy has a higher explanatory power for the expected return than the capital asset pricing model beta. Furthermore we show the time varying behavior of the beta along with entropy.
Entropy-Based Financial Asset Pricing
Ormos, Mihály; Zibriczky, Dávid
2014-01-01
We investigate entropy as a financial risk measure. Entropy explains the equity premium of securities and portfolios in a simpler way and, at the same time, with higher explanatory power than the beta parameter of the capital asset pricing model. For asset pricing we define the continuous entropy as an alternative measure of risk. Our results show that entropy decreases in the function of the number of securities involved in a portfolio in a similar way to the standard deviation, and that efficient portfolios are situated on a hyperbola in the expected return – entropy system. For empirical investigation we use daily returns of 150 randomly selected securities for a period of 27 years. Our regression results show that entropy has a higher explanatory power for the expected return than the capital asset pricing model beta. Furthermore we show the time varying behavior of the beta along with entropy. PMID:25545668
Trust Model to Enhance Security and Interoperability of Cloud Environment
NASA Astrophysics Data System (ADS)
Li, Wenjuan; Ping, Lingdi
Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.
Integrating Safety with Science,Technology and Innovation at Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rich, Bethany M
2012-04-02
The mission of Los Alamos National Laboratory (LANL) is to develop and apply science, technology and engineering solutions to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve emerging national security challenges. The most important responsibility is to direct and conduct efforts to meet the mission with an emphasis on safety, security, and quality. In this article, LANL Environmental, Safety, and Health (ESH) trainers discuss how their application and use of a kinetic learning module (learn by doing) with a unique fall arrest system is helping to address one the most common industrialmore » safety challenges: slips and falls. A unique integration of Human Performance Improvement (HPI), Behavior Based Safety (BBS) and elements of the Voluntary Protection Program (VPP) combined with an interactive simulator experience is being used to address slip and fall events at Los Alamos.« less
Street crossing behavior in younger and older pedestrians: an eye- and head-tracking study.
Zito, G A; Cazzoli, D; Scheffler, L; Jäger, M; Müri, R M; Mosimann, U P; Nyffeler, T; Mast, F W; Nef, T
2015-12-29
Crossing a street can be a very difficult task for older pedestrians. With increased age and potential cognitive decline, older people take the decision to cross a street primarily based on vehicles' distance, and not on their speed. Furthermore, older pedestrians tend to overestimate their own walking speed, and could not adapt it according to the traffic conditions. Pedestrians' behavior is often tested using virtual reality. Virtual reality presents the advantage of being safe, cost-effective, and allows using standardized test conditions. This paper describes an observational study with older and younger adults. Street crossing behavior was investigated in 18 healthy, younger and 18 older subjects by using a virtual reality setting. The aim of the study was to measure behavioral data (such as eye and head movements) and to assess how the two age groups differ in terms of number of safe street crossings, virtual crashes, and missed street crossing opportunities. Street crossing behavior, eye and head movements, in older and younger subjects, were compared with non-parametric tests. The results showed that younger pedestrians behaved in a more secure manner while crossing a street, as compared to older people. The eye and head movements analysis revealed that older people looked more at the ground and less at the other side of the street to cross. The less secure behavior in street crossing found in older pedestrians could be explained by their reduced cognitive and visual abilities, which, in turn, resulted in difficulties in the decision-making process, especially under time pressure. Decisions to cross a street are based on the distance of the oncoming cars, rather than their speed, for both groups. Older pedestrians look more at their feet, probably because of their need of more time to plan precise stepping movement and, in turn, pay less attention to the traffic. This might help to set up guidelines for improving senior pedestrians' safety, in terms of speed limits, road design, and mixed physical-cognitive trainings.
33 CFR 106.220 - Security training for all other OCS facility personnel.
Code of Federal Regulations, 2011 CFR
2011-07-01
... procedures and contingency plans; (c) Recognition and detection of dangerous substances and devices; (d) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; and (e) Recognition of techniques used to circumvent security measures. (f) Familiarity with all relevant aspects of...
33 CFR 106.220 - Security training for all other OCS facility personnel.
Code of Federal Regulations, 2010 CFR
2010-07-01
... procedures and contingency plans; (c) Recognition and detection of dangerous substances and devices; (d) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; and (e) Recognition of techniques used to circumvent security measures. (f) Familiarity with all relevant aspects of...
Managing Campus Security: Issues for Police Officers at Public Institutions.
ERIC Educational Resources Information Center
Dwyer, William O.; And Others
1994-01-01
To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)
17 CFR 200.112 - Duties of recipient; notice to participants.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Duties of recipient; notice to participants. 200.112 Section 200.112 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.112 - Duties of recipient; notice to participants.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Duties of recipient; notice to participants. 200.112 Section 200.112 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.112 - Duties of recipient; notice to participants.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Duties of recipient; notice to participants. 200.112 Section 200.112 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
17 CFR 200.112 - Duties of recipient; notice to participants.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Duties of recipient; notice to participants. 200.112 Section 200.112 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Code of Behavior Governing Ex Parte...
Marfeo, Elizabeth E.; Ni, Pengsheng; Haley, Stephen M.; Jette, Alan M.; Bogusz, Kara; Meterko, Mark; McDonough, Christine M.; Chan, Leighton; Brandt, Diane E.; Rasch, Elizabeth K.
2014-01-01
Objectives To develop a broad set of claimant-reported items to assess behavioral health functioning relevant to the Social Security disability determination processes, and to evaluate the underlying structure of behavioral health functioning for use in development of a new functional assessment instrument. Design Cross-sectional. Setting Community. Participants Item pools of behavioral health functioning were developed, refined, and field-tested in a sample of persons applying for Social Security disability benefits (N=1015) who reported difficulties working due to mental or both mental and physical conditions. Interventions None. Main Outcome Measure Social Security Administration Behavioral Health (SSA-BH) measurement instrument Results Confirmatory factor analysis (CFA) specified that a 4-factor model (self-efficacy, mood and emotions, behavioral control, and social interactions) had the optimal fit with the data and was also consistent with our hypothesized conceptual framework for characterizing behavioral health functioning. When the items within each of the four scales were tested in CFA, the fit statistics indicated adequate support for characterizing behavioral health as a unidimensional construct along these four distinct scales of function. Conclusion This work represents a significant advance both conceptually and psychometrically in assessment methodologies for work related behavioral health. The measurement of behavioral health functioning relevant to the context of work requires the assessment of multiple dimensions of behavioral health functioning. Specifically, we identified a 4-factor model solution that represented key domains of work related behavioral health functioning. These results guided the development and scale formation of a new SSA-BH instrument. PMID:23548542
Marfeo, Elizabeth E; Ni, Pengsheng; Haley, Stephen M; Jette, Alan M; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K
2013-09-01
To develop a broad set of claimant-reported items to assess behavioral health functioning relevant to the Social Security disability determination processes, and to evaluate the underlying structure of behavioral health functioning for use in development of a new functional assessment instrument. Cross-sectional. Community. Item pools of behavioral health functioning were developed, refined, and field tested in a sample of persons applying for Social Security disability benefits (N=1015) who reported difficulties working because of mental or both mental and physical conditions. None. Social Security Administration Behavioral Health (SSA-BH) measurement instrument. Confirmatory factor analysis (CFA) specified that a 4-factor model (self-efficacy, mood and emotions, behavioral control, social interactions) had the optimal fit with the data and was also consistent with our hypothesized conceptual framework for characterizing behavioral health functioning. When the items within each of the 4 scales were tested in CFA, the fit statistics indicated adequate support for characterizing behavioral health as a unidimensional construct along these 4 distinct scales of function. This work represents a significant advance both conceptually and psychometrically in assessment methodologies for work-related behavioral health. The measurement of behavioral health functioning relevant to the context of work requires the assessment of multiple dimensions of behavioral health functioning. Specifically, we identified a 4-factor model solution that represented key domains of work-related behavioral health functioning. These results guided the development and scale formation of a new SSA-BH instrument. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
Lucassen, Nicole; Tharner, Anne; Van Ijzendoorn, Marinus H; Bakermans-Kranenburg, Marian J; Volling, Brenda L; Verhulst, Frank C; Lambregtse-Van den Berg, Mijke P; Tiemeier, Henning
2011-12-01
For almost three decades, the association between paternal sensitivity and infant-father attachment security has been studied. The first wave of studies on the correlates of infant-father attachment showed a weak association between paternal sensitivity and infant-father attachment security (r = .13, p < .001, k = 8, N = 546). In the current paper, a meta-analysis of the association between paternal sensitivity and infant-father attachment based on all studies currently available is presented, and the change over time of the association between paternal sensitivity and infant-father attachment is investigated. Studies using an observational measure of paternal interactive behavior with the infant, and the Strange Situation Procedure to observe the attachment relationship were included. Paternal sensitivity is differentiated from paternal sensitivity combined with stimulation in the interaction with the infant. Higher levels of paternal sensitivity were associated with more infant-father attachment security (r = .12, p < .001, k = 16, N = 1,355). Fathers' sensitive play combined with stimulation was not more strongly associated with attachment security than sensitive interactions without stimulation of play. Despite possible changes in paternal role patterns, we did not find stronger associations between paternal sensitivity and infant attachment in more recent years.
33 CFR 104.210 - Company Security Officer (CSO).
Code of Federal Regulations, 2011 CFR
2011-07-01
... threats and patterns; (ix) Recognition and detection of dangerous substances and devices; (x) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (xi...
33 CFR 104.210 - Company Security Officer (CSO).
Code of Federal Regulations, 2010 CFR
2010-07-01
... threats and patterns; (ix) Recognition and detection of dangerous substances and devices; (x) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (xi...
Attachment security and obesity in US preschool-aged children.
Anderson, Sarah E; Whitaker, Robert C
2011-03-01
To estimate the association between attachment security in children aged 24 months and their risk for obesity at 4½ years of age. Insecure attachment is associated with unhealthy physiologic and behavioral responses to stress, which could lead to development of obesity. Cohort study. National sample of US children born in 2001. Children and mothers participating in the 2003 and 2005-2006 waves of the Early Childhood Longitudinal Study, Birth Cohort, conducted by the National Center for Education Statistics. Our analytic sample included 6650 children (76.0% of children assessed in both waves). Attachment security at 24 months was assessed by trained interviewers during observation in the child's home. Insecure attachment was defined as lowest quartile of attachment security, based on the security score from the Toddler Attachment Sort-45 Item. Obesity at 4½ years of age (sex-specific body mass index ≥95th percentile for age). The prevalence of obesity was 23.1% in children with insecure attachment and 16.6% in those with secure attachment. For children with insecure attachment, the odds of obesity were 1.30 (95% confidence interval, 1.05-1.62) times higher than for children with secure attachment after controlling for the quality of mother-child interaction during play, parenting practices related to obesity, maternal body mass index, and sociodemographic characteristics. Insecure attachment in early childhood may be a risk factor for obesity. Interventions to increase children's attachment security should examine the effects on children's weight.
... for Care Costs Paying for Care Insurance Social Security Disability Medicare Medicare Part D Benefits Medicaid Tax ... person with Alzheimer's is probably looking for comfort, security and familiarity when repeating information. Sleep Issues and ...
Father involvement, paternal sensitivity, and father-child attachment security in the first 3 years.
Brown, Geoffrey L; Mangelsdorf, Sarah C; Neff, Cynthia
2012-06-01
To reach a greater understanding of the early father-child attachment relationship, this study examined concurrent and longitudinal associations among father involvement, paternal sensitivity, and father-child attachment security at 13 months and 3 years of age. Analyses revealed few associations among these variables at 13 months of age, but involvement and sensitivity independently predicted father-child attachment security at age 3. Moreover, sensitivity moderated the association between involvement and attachment security at 3 years. Specifically, involvement was unrelated to attachment security when fathers were highly sensitive, but positively related to attachment security when fathers were relatively less sensitive. Father involvement was also moderately stable across the two time points, but paternal sensitivity was not. Furthermore, there was significant stability in father-child attachment security from 13 months to 3 years. Secure attachment at 13 months also predicted greater levels of paternal sensitivity at 3 years, with sensitivity at age 3 mediating the association between 13 month and 3 year attachment security. In sum, a secure father-child attachment relationship (a) was related to both quantity and quality of fathering behavior, (b) remained relatively stable across early childhood, and (c) predicted increased paternal sensitivity over time. These findings further our understanding of the correlates of early father-child attachment, and underscore the need to consider multiple domains of fathers' parenting and reciprocal relations between fathering behavior and father-child attachment security. PsycINFO Database Record (c) 2012 APA, all rights reserved.
ERIC Educational Resources Information Center
Waters, Theodore E. A.; Bosmans, Guy; Vandevivere, Eva; Dujardin, Adinda; Waters, Harriet S.
2015-01-01
Recent work examining the content and organization of attachment representations suggests that 1 way in which we represent the attachment relationship is in the form of a cognitive script. This work has largely focused on early childhood or adolescence/adulthood, leaving a large gap in our understanding of script-like attachment representations in…
Risk-Based Aviation Security: Diffusion and Acceptance
2012-03-01
Association ATR Automated Target Recognition BDO Behavior Detection Officer BIB Budget-In-Brief CBP Customs and Border Protection CDRH Center...Radiological Health ( CDRH ) (Cerra, 2006), the National Institute for Standards and Technology (NIST) (TSA, n.d. g), and the Johns Hopkins University Applied...safety related to AIT may have come from the Food and Drug Administration’s (FDA) Center for Devices and Radiological Health ( CDRH ), the National
A Randomized Clinical Trial of Cognitive-Behavioral Treatment for PTSD in Women
2003-10-01
Post Traumatic Stress Disorder ( PTSD ) in 384 female veterans and active duty personnel at 11 sites. This is a VA Cooperative Study. Walter...14. SUBJECT TERMS 15. NUMBER OF PAGES Post - Traumatic Stress Disorder 6 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19...Clinical Trial of Cognitive-Behavioral Treatment for Post Traumatic Stress Disorder in Women for this study, from the protocol Additionally, a new
33 CFR 105.210 - Facility personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
...: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely...
33 CFR 105.210 - Facility personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
...: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely...
Measuring and analyzing the causes of problematic Internet use.
Chiang, I-Ping; Su, Yung-Hsiang
2012-11-01
Since Internet surfing became a daily activity, people have changed their behavior. This research analyzes the causes of problematic Internet use through an online survey, where 1,094 samples were collected. Based on the results of structural equation modeling analysis, the following conclusions are reached: First, novelty, security, and efficiency increase users' online trust. Second, information and efficiency enhance users' sharing and anonymity online. Third, greater trust in Internet environments leads to an increase in a user's cognitive bias toward online behavioral responsibility and Internet addiction. Fourth, a user's attitude toward online sharing further increases the cognitive bias toward online copyright. Fifth, a user's attitude toward anonymity increases cognitive bias toward online copyright, online behavioral responsibility, and deepens Internet addiction.
The Potential Effects of Obesity on Social Security Claiming Behavior and Retirement Benefits.
Knoll, Melissa A Z; Shoffner, Dave; O'Leary, Samantha
2018-04-16
Obesity prevalence among Americans has increased for nearly three decades. We explore the relationship between the rise in obesity and Social Security retirement benefit claiming, a decision impacting nearly all aging Americans. Specifically, we investigate whether obesity can affect individuals' decision to claim benefits early, a choice that has important implications for financial security in retirement, particularly for those with lower socioeconomic status (SES). We use a microsimulation model called MINT6 (Modeling Income in the Near Term, version 6) to demonstrate the potential effects of obesity on subjective life expectancy and claiming behavior. We impute obesity status using data from the National Health and Nutrition Examination Survey (NHANES), which describes the distribution of obesity prevalence within the United States by gender, poverty status, and race/ethnicity. We find that the rise in obesity and the consequent incidence of obesity-related diseases may lead some individuals to make claiming decisions that lead to lower monthly and lifetime Social Security retirement benefits. Further, we find that the potential economic impact of this decision is larger for those with lower SES. We present a behavioral perspective by addressing the potential effects that obesity can have on individuals' retirement decisions and their resulting Social Security retirement benefits.
Jimmy Carter's National Security Policy: A World Order Critique.
ERIC Educational Resources Information Center
Johansen, Robert C.
This essay evaluates the Carter administration's behavior on national security questions and appraises the extent to which it meets Carter's initial professed national security goals. These goals include the intention to reduce military expenditures, to halt the nuclear arms buildup of the United States and U.S.S.R., to prevent the spread of…
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
Ramsauer, Brigitte; Lotzin, Annett; Mühlhan, Christine; Romer, Georg; Nolte, Tobias; Fonagy, Peter; Powell, Bert
2014-01-30
Psychopathology in women after childbirth represents a significant risk factor for parenting and infant mental health. Regarding child development, these infants are at increased risk for developing unfavorable attachment strategies to their mothers and for subsequent behavioral, emotional and cognitive impairments throughout childhood. To date, the specific efficacy of an early attachment-based parenting group intervention under standard clinical outpatient conditions, and the moderators and mediators that promote attachment security in infants of mentally ill mothers, have been poorly evaluated. This randomized controlled clinical trial tests whether promoting attachment security in infancy with the Circle of Security (COS) Intervention will result in a higher rate of securely attached children compared to treatment as usual (TAU). Furthermore, we will determine whether the distributions of securely attached children are moderated or mediated by variations in maternal sensitivity, mentalizing, attachment representations, and psychopathology obtained at baseline and at follow-up. We plan to recruit 80 mother-infant dyads when infants are aged 4-9 months with 40 dyads being randomized to each treatment arm. Infants and mothers will be reassessed when the children are 16-18 months of age. Methodological aspects of the study are systematic recruitment and randomization, explicit inclusion and exclusion criteria, research assessors and coders blinded to treatment allocation, advanced statistical analysis, manualized treatment protocols and assessments of treatment adherence and integrity. The aim of this clinical trial is to determine whether there are specific effects of an attachment-based intervention that promotes attachment security in infants. Additionally, we anticipate being able to utilize data on maternal and child outcome measures to obtain preliminary indications about potential moderators of the intervention and inform hypotheses about which intervention may be most suitable when offered in a clinical psychiatric outpatient context. Current Controlled Trials ISRCTN88988596.
2014-01-01
Background Psychopathology in women after childbirth represents a significant risk factor for parenting and infant mental health. Regarding child development, these infants are at increased risk for developing unfavorable attachment strategies to their mothers and for subsequent behavioral, emotional and cognitive impairments throughout childhood. To date, the specific efficacy of an early attachment-based parenting group intervention under standard clinical outpatient conditions, and the moderators and mediators that promote attachment security in infants of mentally ill mothers, have been poorly evaluated. Methods/Design This randomized controlled clinical trial tests whether promoting attachment security in infancy with the Circle of Security (COS) Intervention will result in a higher rate of securely attached children compared to treatment as usual (TAU). Furthermore, we will determine whether the distributions of securely attached children are moderated or mediated by variations in maternal sensitivity, mentalizing, attachment representations, and psychopathology obtained at baseline and at follow-up. We plan to recruit 80 mother-infant dyads when infants are aged 4-9 months with 40 dyads being randomized to each treatment arm. Infants and mothers will be reassessed when the children are 16-18 months of age. Methodological aspects of the study are systematic recruitment and randomization, explicit inclusion and exclusion criteria, research assessors and coders blinded to treatment allocation, advanced statistical analysis, manualized treatment protocols and assessments of treatment adherence and integrity. Discussion The aim of this clinical trial is to determine whether there are specific effects of an attachment-based intervention that promotes attachment security in infants. Additionally, we anticipate being able to utilize data on maternal and child outcome measures to obtain preliminary indications about potential moderators of the intervention and inform hypotheses about which intervention may be most suitable when offered in a clinical psychiatric outpatient context. Trial registration Current Controlled Trials ISRCTN88988596 PMID:24476106
RESTORING SAFETY: AN ATTACHMENT-BASED APPROACH TO CLINICAL WORK WITH A TRAUMATIZED TODDLER.
Ribaudo, Julie
2016-01-01
This clinical case study explores the integration of infancy research, brain development, attachment theory, and models of infant-parent/child-parent psychotherapy to address the needs of abused and neglected young children placed in foster or adoptive homes. Traumatized children employ defensive strategies to survive when there is no "good enough" caregiver (D.W. Winnicott, 1953, p. 94), and helping professionals can provide therapeutic experiences to develop or restore a child's sense of safety. With the case example of Anthony and his foster/adoptive parents, I illustrate how to manage and contain a traumatized child's terror, rage, and grief through therapeutic sessions with the parent and child together, and supportive parental guidance. I promote attention to the child's ability to self-integrate and to regulate his own affect, and encourages secure-base parental responses that facilitate a child's shift toward secure attachment behavior. © 2015 Michigan Association for Infant Mental Health.
Research on fully distributed optical fiber sensing security system localization algorithm
NASA Astrophysics Data System (ADS)
Wu, Xu; Hou, Jiacheng; Liu, Kun; Liu, Tiegen
2013-12-01
A new fully distributed optical fiber sensing and location technology based on the Mach-Zehnder interferometers is studied. In this security system, a new climbing point locating algorithm based on short-time average zero-crossing rate is presented. By calculating the zero-crossing rates of the multiple grouped data separately, it not only utilizes the advantages of the frequency analysis method to determine the most effective data group more accurately, but also meets the requirement of the real-time monitoring system. Supplemented with short-term energy calculation group signal, the most effective data group can be quickly picked out. Finally, the accurate location of the climbing point can be effectively achieved through the cross-correlation localization algorithm. The experimental results show that the proposed algorithm can realize the accurate location of the climbing point and meanwhile the outside interference noise of the non-climbing behavior can be effectively filtered out.
Fatima, Iram; Fahim, Muhammad; Lee, Young-Koo; Lee, Sungyoung
2013-01-01
In recent years, activity recognition in smart homes is an active research area due to its applicability in many applications, such as assistive living and healthcare. Besides activity recognition, the information collected from smart homes has great potential for other application domains like lifestyle analysis, security and surveillance, and interaction monitoring. Therefore, discovery of users common behaviors and prediction of future actions from past behaviors become an important step towards allowing an environment to provide personalized service. In this paper, we develop a unified framework for activity recognition-based behavior analysis and action prediction. For this purpose, first we propose kernel fusion method for accurate activity recognition and then identify the significant sequential behaviors of inhabitants from recognized activities of their daily routines. Moreover, behaviors patterns are further utilized to predict the future actions from past activities. To evaluate the proposed framework, we performed experiments on two real datasets. The results show a remarkable improvement of 13.82% in the accuracy on average of recognized activities along with the extraction of significant behavioral patterns and precise activity predictions with 6.76% increase in F-measure. All this collectively help in understanding the users” actions to gain knowledge about their habits and preferences. PMID:23435057
Resource allocation and supervisory control architecture for intelligent behavior generation
NASA Astrophysics Data System (ADS)
Shah, Hitesh K.; Bahl, Vikas; Moore, Kevin L.; Flann, Nicholas S.; Martin, Jason
2003-09-01
In earlier research the Center for Self-Organizing and Intelligent Systems (CSOIS) at Utah State University (USU) was funded by the US Army Tank-Automotive and Armaments Command's (TACOM) Intelligent Mobility Program to develop and demonstrate enhanced mobility concepts for unmanned ground vehicles (UGVs). As part of our research, we presented the use of a grammar-based approach to enabling intelligent behaviors in autonomous robotic vehicles. With the growth of the number of available resources on the robot, the variety of the generated behaviors and the need for parallel execution of multiple behaviors to achieve reaction also grew. As continuation of our past efforts, in this paper, we discuss the parallel execution of behaviors and the management of utilized resources. In our approach, available resources are wrapped with a layer (termed services) that synchronizes and serializes access to the underlying resources. The controlling agents (called behavior generating agents) generate behaviors to be executed via these services. The agents are prioritized and then, based on their priority and the availability of requested services, the Control Supervisor decides on a winner for the grant of access to services. Though the architecture is applicable to a variety of autonomous vehicles, we discuss its application on T4, a mid-sized autonomous vehicle developed for security applications.
Polkovnikova-Wamoto, Anastasia; Mathai, Muthoni; Stoep, Ann Vander; Kumar, Manasi
2016-01-01
Secure attachment in childhood and adolescence protects children from engagement in high risk behaviors and development of mental health problems over the life span. Poverty has been shown to create impoverishment in certain aspects of caregiving and correspondingly to compromise development of secure attachment in children. Nineteen children 8 to 14 years old from two schools in a middle income area and an urban informal settlement area of Nairobi were interviewed using an adapted Child Attachment Interview (CAI) protocol. CAI was developed to provide a glimpse into the 'meta-theories' children have about themselves, parents, parenting and their attachment ties with parents and extended family members. Narratives obtained with the CAI were analyzed using thematic analysis. Both Bowlby's idea of 'secure base' as well as Bronfrenbrenner's 'ecological niche' are used as reference points to situate child attachment and parenting practices in the larger Kenyan context. We found that with slight linguistic alterations CAI can be used to assess attachment security of Kenyan children in this particular age range. We also found that the narration ability in both groups of children was generally good such that formal coding was possible, despite cultural differences. Our analysis suggested differences in narrative quality across the children from middle class and lower socio-economic class schools on specific themes such as: sensitivity of parenting (main aspects of sensitivity were associated with disciplinary methods and child's access to education), birth order , parental emotional availability , and severity of inter-parental conflicts and child's level of exposure. The paper puts in context a few cultural practices such as greater household responsibility accorded to the eldest child and stern to harsh disciplinary methods adopted by parents in the Kenyan setting.
ERIC Educational Resources Information Center
Harder, Annemiek T.; Knorth, Erik J.; Kalverboer, Margrite E.
2012-01-01
Background: Although secure residential care has the potential of reducing young people's behavioral problems, it is often difficult to achieve positive outcomes. Research suggests that there are several common success factors of treatment, of which the client's motivation for treatment and the quality of the therapeutic relationship between…
ERIC Educational Resources Information Center
Allen, Joseph P.; Porter, Maryfrances; McFarland, Christy; McElhaney, Kathleen Boykin; Marsh, Penny
2007-01-01
The relation of attachment security to multiple domains of psychosocial functioning was examined in a community sample of 167 early adolescents. Security of attachment organization, assessed using the Adult Attachment Interview, was linked to success in establishing autonomy while maintaining a sense of relatedness both with fathers and with…
ERIC Educational Resources Information Center
Thompson, Eleanor Elizabeth
2014-01-01
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…
Gray, Sarah A O
2015-01-01
This pilot program evaluation was undertaken to examine the effectiveness of an attachment-based, group professional-development experience, Circle of Security-Parenting, on family childcare (FCC) providers' psychological resources and self-efficacy in managing children's challenging behaviors and supporting children's socioemotional development. Licensed FCC providers with children actively in their care (n = 34) self-selected into the program, offered in English and Spanish through a regional support network for FCC providers; a comparison group of providers was recruited from the state database of licensed providers (n = 17). A significant Time × Group interaction was observed for self-efficacy in managing challenging behaviors, F(1, 46) = 30.59, p = .000, partial η(2) = .40, with participating providers' mean self-efficacy scores increasing, p = .000, d = .78, while comparison providers' decreased, p = .003, d = 1.40. Mean depressive symptoms decreased over time for both groups whereas job stress-related resources were stable over time in both groups. Patterns of association were found between providers' self-report of difficulties considering children's mental states and depressive symptoms, job stress resources, and self-efficacy. Limitations and implications for future research are reviewed, including the impact of conducting this work within an organized support network for FCC providers. © 2015 Michigan Association for Infant Mental Health.
Individual differences in cyber security behaviors: an examination of who is sharing passwords.
Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697
Bernier, Annie; Beauchamp, Miriam H; Carlson, Stephanie M; Lalonde, Gabrielle
2015-09-01
In light of emerging evidence suggesting that the affective quality of parent-child relationships may relate to individual differences in young children's executive functioning (EF) skills, the aim of this study was to investigate the prospective associations between attachment security in toddlerhood and children's EF skills in kindergarten. Mother-child dyads (N = 105) participated in 2 toddlerhood visits in their homes, when children were 15 months and 2 years of age. Mother-child attachment security was assessed with the Attachment Q-Sort during both these visits. When children were in kindergarten (ages 5-6), they were administered a battery of EF tasks, and their teachers completed the Behavior Rating Inventory of Executive Function to assess children's EF problems. The results indicated that kindergarteners who were more securely attached to their mothers in toddlerhood showed better performance on all EF tasks, and were considered by their teachers to present fewer EF problems in everyday school situations. These results held above family socioeconomic status (SES) and child age, sex, and general cognitive functioning. The fact that early attachment security uniquely predicted both teacher reports and children's objective EF task performance suggests that parent-child attachment may be a promising factor to consider in the continuing search for the social antecedents of young children's EF. (c) 2015 APA, all rights reserved).
Brase, Gary L; Vasserman, Eugene Y; Hsu, William
2017-01-01
Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and these tasks were followed by a behavioral likelihood rating. As in previous research, consistent use of natural frequencies promoted correct Bayesian reasoning. There was little indication, however, that any of the alternative mental models generated consistently better understanding or reasoning over the actual cybersecurity context. There was some evidence that different models had some effects on patterns of responses, including the behavioral likelihood ratings, but these effects were small, as compared to the effect of the numerical format manipulation. This points to a need to improve the content of actual internet security warnings, rather than working to change the models users have of warnings.
Brase, Gary L.; Vasserman, Eugene Y.; Hsu, William
2017-01-01
Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and these tasks were followed by a behavioral likelihood rating. As in previous research, consistent use of natural frequencies promoted correct Bayesian reasoning. There was little indication, however, that any of the alternative mental models generated consistently better understanding or reasoning over the actual cybersecurity context. There was some evidence that different models had some effects on patterns of responses, including the behavioral likelihood ratings, but these effects were small, as compared to the effect of the numerical format manipulation. This points to a need to improve the content of actual internet security warnings, rather than working to change the models users have of warnings. PMID:29163304
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Chen, Weiwei; Yan, Xinyu; Wang, Yunqian
2018-06-01
In order to obtain higher encryption efficiency, a bit-level quantum color image encryption scheme by exploiting quantum cross-exchange operation and a 5D hyper-chaotic system is designed. Additionally, to enhance the scrambling effect, the quantum channel swapping operation is employed to swap the gray values of corresponding pixels. The proposed color image encryption algorithm has larger key space and higher security since the 5D hyper-chaotic system has more complex dynamic behavior, better randomness and unpredictability than those based on low-dimensional hyper-chaotic systems. Simulations and theoretical analyses demonstrate that the presented bit-level quantum color image encryption scheme outperforms its classical counterparts in efficiency and security.
Attachment Security and Obesity in US Preschool-Aged Children
Anderson, Sarah E.; Whitaker, Robert C.
2011-01-01
Objective Insecure attachment is associated with unhealthy physiologic and behavioral responses to stress, which could lead to the development of obesity. We estimated the association between children’s attachment security at 24 months of age and risk for obesity at 4.5 years of age. Design Cohort study. Setting National sample of US children born in 2001. Participants Children and mothers participating in the 2003 and 2005-2006 waves of the Early Childhood Longitudinal Study, Birth Cohort, conducted by the National Center for Education Statistics. Our analytic sample included 6650 children (76% of children assessed at both waves). Main Exposure Attachment security at 24 months was assessed by trained interviewers following observation in the child’s home. Insecure attachment was defined as lowest quartile of attachment security, based on the security score from the Toddler Attachment Sort. Outcome Measure Obesity at 4.5 years of age (sex-specific BMI ≥95th percentile for age). Results The prevalence of obesity was 23.1% in children with insecure attachment and 16.6% in those with secure attachment. For children with insecure attachment, the odds (95% confidence interval) of obesity was 1.30 (1.05, 1.62) times higher than for children with secure attachment, after controlling for the quality of mother-child interaction during play, parenting practices related to obesity, maternal body mass index, and sociodemographic characteristics. Conclusions Insecure attachment in early childhood may be a previously unrecognized risk factor for obesity. Interventions to increase children’s attachment security should also examine impacts on children’s weight. PMID:21383273
ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership
Wu, Hongchen; Wang, Xinjun
2016-01-01
The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users’ sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users’ decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens’ sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants’ partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness. PMID:26950064
ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.
Wu, Hongchen; Wang, Xinjun
2016-01-01
The rapid growth of social network data has given rise to high security awareness among users, especially when they exchange and share their personal information. However, because users have different feelings about sharing their information, they are often puzzled about who their partners for exchanging information can be and what information they can share. Is it possible to assist users in forming a partnership network in which they can exchange and share information with little worry? We propose a modified information sharing behavior prediction (ISBP) model that can help in understanding the underlying rules by which users share their information with partners in light of three common aspects: what types of items users are likely to share, what characteristics of users make them likely to share information, and what features of users' sharing behavior are easy to predict. This model is applied with machine learning techniques in WEKA to predict users' decisions pertaining to information sharing behavior and form them into trustable partnership networks by learning their features. In the experiment section, by using two real-life datasets consisting of citizens' sharing behavior, we identify the effect of highly sensitive requests on sharing behavior adjacent to individual variables: the younger participants' partners are more difficult to predict than those of the older participants, whereas the partners of people who are not computer majors are easier to predict than those of people who are computer majors. Based on these findings, we believe that it is necessary and feasible to offer users personalized suggestions on information sharing decisions, and this is pioneering work that could benefit college researchers focusing on user-centric strategies and website owners who want to collect more user information without raising their privacy awareness or losing their trustworthiness.
Widome, Rachel; Neumark-Sztainer, Dianne; Hannan, Peter J; Haines, Jess; Story, Mary
2009-05-01
We explored differences in adolescents' eating habits, perceptions, and dietary intakes by food security status. As part of Project EAT (Eating Among Teens), we surveyed 4746 multiethnic middle and high school students in 31 primarily urban schools in the Minneapolis-St. Paul, Minnesota, area during the 1998-1999 academic year. Participants completed in-class surveys. We used multiple regression analysis to characterize associations between behaviors, perceptions, nutritional intake, and food security status. Compared with food-secure youths, food-insecure youths were more likely to perceive that eating healthfully was inconvenient and that healthy food did not taste good. Additionally, food-insecure youths reported eating more fast food but fewer family meals and breakfasts per week than did youths who were food secure. Food-insecure and food-secure youths perceived similar benefits from eating healthfully (P = .75). Compared with those who were food secure, food-insecure youths had higher fat intakes (P < .01). Food-insecure youths were more likely to have a body mass index above the 95th percentile. The eating patterns of food-insecure adolescents differ in important ways from the eating patterns of those who are food secure. Policies and interventions focusing on improving the foods that these youths eat deserve further examination.
Cyr, Maeve; Pasalich, Dave S; McMahon, Robert J; Spieker, Susan J
2014-10-01
This study examined whether infant attachment security moderates the association between parenting in preschool and later aggressive behavior among a sample of children at high risk for developing conduct problems. Participants were 82 adolescent mother-child dyads recruited from the community. Infant attachment status at age 1 year was measured using the Strange Situation. When children were aged 4.5 years, mothers reported on their self-efficacy in regards to parenting, and mothers' positive parenting and criticism were coded from direct observations of parent-child interactions. In grade 1, mothers reported on their children's aggressive behavior. Infant secure attachment significantly moderated the association between observed maternal criticism and child aggression. That is, among insecurely attached children, higher levels of maternal criticism were associated with more severe aggression. This longitudinal finding suggests that a secure attachment may buffer the deleterious effects of harsh parenting on child aggression.
Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network
Caiti, Andrea; Calabrò, Vincenzo; Dini, Gianluca; Duca, Angelica Lo; Munafò, Andrea
2012-01-01
Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011. PMID:22438748
Secure cooperation of autonomous mobile sensors using an underwater acoustic network.
Caiti, Andrea; Calabrò, Vincenzo; Dini, Gianluca; Lo Duca, Angelica; Munafò, Andrea
2012-01-01
Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles-AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.
Herd, Toria; Li, Mengjiao; Maciejewski, Dominique; Lee, Jacob; Deater-Deckard, Kirby; King-Casas, Brooks; Kim-Spoon, Jungmeen
2018-01-01
Past research has demonstrated negative associations between exposure to stressors and quality of interpersonal relationships among children and adolescents. Nevertheless, underlying mechanisms of this association remain unclear. Chronic stress has been shown to disrupt prefrontal functioning in the brain, including inhibitory control abilities, and evidence is accumulating that inhibitory control may play an important role in secure interpersonal relationship quality, including peer problems and social competence. In this prospective longitudinal study, we examine whether changes in inhibitory control, measured at both behavioral and neural levels, mediate the association between stress and changes in secure relationship quality with parents and peers. The sample included 167 adolescents (53% males) who were first recruited at age 13 or 14 years and assessed annually three times. Adolescents' inhibitory control was measured by their behavioral performance and brain activities, and adolescents self-reported perceived stress levels and relationship quality with mothers, fathers, and peers. Results suggest that behavioral inhibitory control mediates the association between perceived stress and adolescent's secure relationship quality with their mothers and fathers, but not their peers. In contrast, given that stress was not significantly correlated with neural inhibitory control, we did not further test the mediation path. Our results highlight the role of inhibitory control as a process through which stressful life experiences are related to impaired secure relationship quality between adolescents and their mothers and fathers.
Inhibitory Control Mediates the Association between Perceived Stress and Secure Relationship Quality
Herd, Toria; Li, Mengjiao; Maciejewski, Dominique; Lee, Jacob; Deater-Deckard, Kirby; King-Casas, Brooks; Kim-Spoon, Jungmeen
2018-01-01
Past research has demonstrated negative associations between exposure to stressors and quality of interpersonal relationships among children and adolescents. Nevertheless, underlying mechanisms of this association remain unclear. Chronic stress has been shown to disrupt prefrontal functioning in the brain, including inhibitory control abilities, and evidence is accumulating that inhibitory control may play an important role in secure interpersonal relationship quality, including peer problems and social competence. In this prospective longitudinal study, we examine whether changes in inhibitory control, measured at both behavioral and neural levels, mediate the association between stress and changes in secure relationship quality with parents and peers. The sample included 167 adolescents (53% males) who were first recruited at age 13 or 14 years and assessed annually three times. Adolescents’ inhibitory control was measured by their behavioral performance and brain activities, and adolescents self-reported perceived stress levels and relationship quality with mothers, fathers, and peers. Results suggest that behavioral inhibitory control mediates the association between perceived stress and adolescent’s secure relationship quality with their mothers and fathers, but not their peers. In contrast, given that stress was not significantly correlated with neural inhibitory control, we did not further test the mediation path. Our results highlight the role of inhibitory control as a process through which stressful life experiences are related to impaired secure relationship quality between adolescents and their mothers and fathers. PMID:29535664
17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...
17 CFR 240.3a68-2 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... swaps, security-based swaps, and mixed swaps. 240.3a68-2 Section 240.3a68-2 Commodity and Securities..., Security-Based Swap, and Security-Based Swap Agreement; Mixed Swaps; Security-Based Swap Agreement Recordkeeping § 240.3a68-2 Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In...
Cummings, E. Mark; Merrilees, Christine E.; Schermerhorn, Alice C.; Goeke-Morey, Marcie C.; Shirlow, Peter; Cairns, Ed
2013-01-01
Relations between political violence and child adjustment are matters of international concern. Past research demonstrates the significance of community, family and child psychological processes in child adjustment, supporting study of inter-relations between multiple social ecological factors and child adjustment in contexts of political violence. Testing a social ecological model, 300 mothers and their children (M= 12.28 years, SD = 1.77) from Catholic and Protestant working class neighborhoods in Belfast, Northern Ireland completed measures of community discord, family relations, and children’s regulatory processes (i.e., emotional security) and outcomes. Historical political violence in neighborhoods based on objective records (i.e., politically motivated deaths) were related to family members’ reports of current sectarian and non-sectarian antisocial behavior. Interparental conflict and parental monitoring and children’s emotional security about both the community and family contributed to explanatory pathways for relations between sectarian antisocial behavior in communities and children’s adjustment problems. The discussion evaluates support for social ecological models for relations between political violence and child adjustment and its implications for understanding relations in other parts of the world. PMID:20423550
Cummings, E Mark; Schatz, Julie N
2012-03-01
The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.
ERIC Educational Resources Information Center
Mutchler, Leigh Ann
2012-01-01
The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…
Johnson, Tyler; Ford, Eric W; Huerta, Timothy R
2017-01-01
Background As electronic health records (EHRs) become ubiquitous in the health care industry, privacy breaches are increasing and being made public. These breaches may make consumers wary of the technology, undermining its potential to improve care coordination and research. Objective Given the developing concerns around privacy of personal health information stored in digital format, it is important for providers to understand how views on privacy and security may be associated with patient disclosure of health information. This study aimed to understand how privacy concerns may be shifting patient behavior. Methods Using a pooled cross-section of data from the 2011 and 2014 cycles of the Health Information and National Trends Survey (HINTS), we tested whether privacy and security concerns, as well as quality perceptions, are associated with the likelihood of withholding personal health information from a provider. A fully interacted multivariate model was used to compare associations between the 2 years, and interaction terms were used to evaluate trends in the factors that are associated with withholding behavior. Results No difference was found regarding the effect of privacy and security concerns on withholding behavior between 2011 and 2014. Similarly, whereas perceived high quality of care was found to reduce the likelihood of withholding information from a provider in both 2011 (odds ratio [OR] 0.73, 95% confidence interval [CI] 0.56-0.94) and 2014 (OR 0.61, 95% CI 0.48-0.76), no difference was observed between years. Conclusions These findings suggest that consumers’ beliefs about EHR privacy and security, the relationship between technology use and quality, and intentions to share information with their health care provider have not changed. These findings are counter to the ongoing discussions about the implications of security failures in other domains. Our results suggest that providers could ameliorate privacy and security by focusing on the care quality benefits EHRs provide. PMID:28052843
Hinds, Andrea L.; Woody, Erik Z.; Van Ameringen, Michael; Schmidt, Louis A.; Szechtman, Henry
2012-01-01
Background In obsessive-compulsive disorder (OCD), individuals feel compelled to repeatedly perform security-related behaviors, even though these behaviours seem excessive and unwarranted to them. The present research investigated two alternative ways of explaining such behavior: (1) a dysfunction of activation—a starting problem—in which the level of excitation in response to stimuli suggesting potential danger is abnormally strong; versus (2) a dysfunction of termination—a stopping problem—in which the satiety-like process for shutting down security-related thoughts and actions is abnormally weak. Method In two experiments, 70 patients with OCD (57 with washing compulsions, 13 with checking compulsions) and 72 controls were exposed to contamination cues—immersing a hand in wet diapers —and later allowed to wash their hands, first limited to 30 s and then for as long as desired. The intensity of activation of security motivation was measured objectively by change in respiratory sinus arrythmia. Subjective ratings (e.g., contamination) and behavioral measures (e.g., duration of hand washing) were also collected. Results Compared to controls, OCD patients with washing compulsions did not differ significantly in their levels of initial activation to the threat of contamination; however, they were significantly less able to reduce this activation by engaging in the corrective behavior of hand-washing. Further, the deactivating effect of hand-washing in OCD patients with checking compulsions was similar to that for controls, indicating that the dysfunction of termination in OCD is specific to the patient's symptom profile. Conclusions These results are the first to show that OCD is characterized by a reduced ability of security-related behavior to terminate motivation evoked by potential danger, rather than a heightened initial sensitivity to potential threat. They lend support to the security-motivation theory of OCD (Szechtman & Woody, 2004) and have important implications both for research into the biological mechanisms underlying OCD and for the development of new treatment approaches. PMID:22291994
Authentic leadership, group cohesion and group identification in security and emergency teams.
García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio
2015-01-01
Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.
Jang, Jae-Wook; Yun, Jaesung; Mohaisen, Aziz; Woo, Jiyoung; Kim, Huy Kang
2016-01-01
Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples.
A Proposed Cosmology of Identity in the Sociotechnical Ecosystem of Homeland Security
2017-12-01
extremist violence based on “what we know about the psychological and social factors motivating young people to join extremist groups.”6 The consistent...Veblen (1857–1929), an American sociologist and economist.56 If we look at the historical co-evolution of human societies and technology, we see that...in self-perceived identity and physical behaviors when the psychological attachment to avatars becomes an authentic experience. The concept of
Behavior-based network management: a unique model-based approach to implementing cyber superiority
NASA Astrophysics Data System (ADS)
Seng, Jocelyn M.
2016-05-01
Behavior-Based Network Management (BBNM) is a technological and strategic approach to mastering the identification and assessment of network behavior, whether human-driven or machine-generated. Recognizing that all five U.S. Air Force (USAF) mission areas rely on the cyber domain to support, enhance and execute their tasks, BBNM is designed to elevate awareness and improve the ability to better understand the degree of reliance placed upon a digital capability and the operational risk.2 Thus, the objective of BBNM is to provide a holistic view of the digital battle space to better assess the effects of security, monitoring, provisioning, utilization management, allocation to support mission sustainment and change control. Leveraging advances in conceptual modeling made possible by a novel advancement in software design and implementation known as Vector Relational Data Modeling (VRDM™), the BBNM approach entails creating a network simulation in which meaning can be inferred and used to manage network behavior according to policy, such as quickly detecting and countering malicious behavior. Initial research configurations have yielded executable BBNM models as combinations of conceptualized behavior within a network management simulation that includes only concepts of threats and definitions of "good" behavior. A proof of concept assessment called "Lab Rat," was designed to demonstrate the simplicity of network modeling and the ability to perform adaptation. The model was tested on real world threat data and demonstrated adaptive and inferential learning behavior. Preliminary results indicate this is a viable approach towards achieving cyber superiority in today's volatile, uncertain, complex and ambiguous (VUCA) environment.
Dura-Bernal, Salvador; Garreau, Guillaume; Georgiou, Julius; Andreou, Andreas G; Denham, Susan L; Wennekers, Thomas
2013-10-01
The ability to recognize the behavior of individuals is of great interest in the general field of safety (e.g. building security, crowd control, transport analysis, independent living for the elderly). Here we report a new real-time acoustic system for human action and behavior recognition that integrates passive audio and active micro-Doppler sonar signatures over multiple time scales. The system architecture is based on a six-layer convolutional neural network, trained and evaluated using a dataset of 10 subjects performing seven different behaviors. Probabilistic combination of system output through time for each modality separately yields 94% (passive audio) and 91% (micro-Doppler sonar) correct behavior classification; probabilistic multimodal integration increases classification performance to 98%. This study supports the efficacy of micro-Doppler sonar systems in characterizing human actions, which can then be efficiently classified using ConvNets. It also demonstrates that the integration of multiple sources of acoustic information can significantly improve the system's performance.
Poehlmann, Julie; Burnson, Cynthia; Weymouth, Lindsay A.
2015-01-01
Through assessment of 173 preterm infants and their mothers at hospital discharge and at 9, 16, 24, 36, and 72 months, the study examined early parenting, attachment security, effortful control, and children’s representations of family relationships in relation to subsequent externalizing behavior problems. Less intrusive early parenting predicted more secure attachment, better effortful control skills, and fewer early behavior problems, although it did not directly relate to the structural or content characteristics of children’s represented family relationships. Children with higher effortful control scores at 24 months had more coherent family representations at 36 months. Moreover, children who exhibited less avoidance in their family representations at 36 months had fewer mother-reported externalizing behavior problems at 72 months. The study suggests that early parenting quality and avoidance in children’s represented relationships are important for the development of externalizing behavior problems in children born preterm. PMID:24580068
Poehlmann, Julie; Burnson, Cynthia; Weymouth, Lindsay A
2014-01-01
Through assessment of 173 preterm infants and their mothers at hospital discharge and at 9, 16, 24, 36, and 72 months, the study examined early parenting, attachment security, effortful control, and children's representations of family relationships in relation to subsequent externalizing behavior problems. Less intrusive early parenting predicted more secure attachment, better effortful control skills, and fewer early behavior problems, although it did not directly relate to the structural or content characteristics of children's represented family relationships. Children with higher effortful control scores at 24 months had more coherent family representations at 36 months. Moreover, children who exhibited less avoidance in their family representations at 36 months had fewer mother-reported externalizing behavior problems at 72 months. The study suggests that early parenting quality and avoidance in children's represented relationships are important for the development of externalizing behavior problems in children born preterm.
T2AR: trust-aware ad-hoc routing protocol for MANET.
Dhananjayan, Gayathri; Subbiah, Janakiraman
2016-01-01
Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.
A Proactive Approach to Building Security.
ERIC Educational Resources Information Center
Winters, Sharon
1994-01-01
Describes building security procedures developed at the Hampton Public Library (Virginia) to deal with problem patrons. Highlights include need for the library monitor program; staffing patterns; monitor selection criteria; training procedures; library behavior guidelines; library policy statements; theft detection systems; and sample job…
The Association between Food Security and Store-Specific and Overall Food Shopping Behaviors.
Ma, Xiaonan; Liese, Angela D; Hibbert, James; Bell, Bethany A; Wilcox, Sara; Sharpe, Patricia A
2017-12-01
Food security is a severe problem in the United States. Few studies have examined its relationship with food shopping behaviors. This study aimed to examine the association between food security and store-specific and overall food shopping among residents of low-income neighborhoods. We conducted a cross-sectional study. Five hundred twenty-seven households were recruited from two counties in South Carolina from November 2013 to May 2014, and 474 households were included in the final analysis. Food security was assessed using the 18-item US-Household Food Security Module questionnaire, and classified into three categories: high or marginal food security (FS), low food security (LFS), and very low food security (VLFS). Store-specific shopping behaviors including frequency, store type, and transportation were queried via in-person interview for the three most-frequented grocery stores. Distance from participants' homes to their reported stores was calculated using Geographic Information Systems. Multivariate linear regression for analyses of distance and frequency and multinomial/ordinary logistic regression for analyses of store type and transportation were used. Compared to FS participants, a significantly higher proportion of VLFS participants reported a convenience/dollar store as their most-frequented store (odds ratio [OR] 2.31, 95% CI 1.08 to 4.95) or a lack of transportation (OR 2.04, 95% CI 1.25 to 3.33). They also shopped less frequently (b=-.31, P=0.03) at their third most-frequented store and traveled fewer total miles for shopping (b=-4.71, P=0.04). In analyses considering all stores jointly, LFS participants had lower odds of shopping at both supermarkets and convenience/dollar stores (OR 0.44, 95% CI 0.21 to 0.91) compared to food-secure residents. The current findings suggest that households with VLFS tend to shop more frequently in stores that have less-healthful options, such as convenience/dollar stores. These findings lend support to ongoing community and policy interventions aimed at improving food access among food-insecure populations. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
32 CFR 147.6 - Guidance D-Sexual behavior.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., exploitation, or duress, or reflects lack of judgment or discretion. 1 Sexual orientation or preference may not... 32 National Defense 1 2010-07-01 2010-07-01 false Guidance D-Sexual behavior. 147.6 Section 147.6... Guidance D—Sexual behavior. (a) The concern. Sexual behavior is a security concern if it involves a...
Examining Multiple Stages of Protective Behavior of Information System End-Users
ERIC Educational Resources Information Center
Burns, Mary B.
2012-01-01
The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not…
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
Critchfield, Kenneth L.; Benjamin, Lorna Smith
2010-01-01
Repeated interpersonal patterns are central to case conceptualization and treatment planning in interpersonal and attachment-based approaches to therapy. In this study, raters (133 college students, 165 inpatients) provided data on the SASB-based Intrex questionnaire about self-treatment, relationship with a significant other, and remembered interactions with parents in childhood. Within-subject profiles were inspected for precise behavioral matches conforming to three “copy process” patterns: Identification (behaving like an important other), Recapitulation (behaving as if the other person is still present and in charge), and Introjection (treating the self the way another did). Copy process evidence was observed in most individual ratings. Consistent with expectation, non-clinical raters tended to copy a securely-attached pattern of affiliation, low hostility, and moderate degrees of enmeshment and differentiation. Only patients copied maladaptive behavior at greater than base rate expectation. Implications are discussed and recommendations provided for use of Intrex in individual assessment of copy process. PMID:20954050
Dvorak, Robert D.; Pearson, Matthew R.; Neighbors, Clayton; Martens, Matthew P.; Stevenson, Brittany L.; Kuvaas, Nicholas J.
2015-01-01
OBJECTIVE Drinking remains a problem across college campuses. Changing this behavior requires interventions that can be easily and widely dispersed. Several theories place intentions as a proximal predictor of behavior change. The current study examines the effects of a web-based Deviance Regulation Theory (DRT) intervention on (1) intentions to use alcohol protective behavior strategies (PBS) and (2) associations between these intentions and actual behavior. METHODS Participants (n = 76) completed a six-week, web-based, study examining drinking behaviors. Participants were randomly assigned to receive a positive frame about individuals who use PBS or a negative frame about individuals who do not. They also reported normative perceptions of PBS use among college students. They subsequently logged onto a secure server each week to report on alcohol involvement, use of three types of PBS (Manner of Drinking, Stopping/Limiting, and Serious Harm Reduction), and intentions to use these PBS the following week. RESULTS Consistent with DRT, negative frames resulted in higher PBS use intentions if individuals held high normative beliefs about PBS use. Positive frames resulted in higher Manner of Drinking PBS use intentions if individuals held low normative beliefs about PBS use, but only if individuals endorsed a high belief in the frame. In addition, there was a DRT consistent increase in intention-action associations, but only for Stopping/Limiting PBS. DISCUSSION A brief web-based DRT intervention was effective at increasing PBS intentions and increasing PBS intention-action associations. DRT may provide a mechanism to additively or synergistically improve other web-based interventions for college drinking. PMID:26914646
Obsessive-compulsive disorder as a disturbance of security motivation: constraints on comorbidity.
Szechtman, H; Woody, E Z
2006-10-01
Patients with OCD often meet criteria for additional psychiatric disorders, with the incidence of comorbidity being as high as 75% in some studies. Here we examine the theoretical plausibility that in OCD much of the domain of co-morbid presentations encompasses related perturbations of the security motivation system. According to a recent proposal, the security motivation system represents a biologically primitive special motivation that is activated by potential (as opposed to imminent) danger to self or intimate others and engages a set of specialized species-typical behaviors (such as checking and washing) to handle potential danger. Because the task of security motivation is open ended, in the sense that no consummatory stimuli can exist in the real world to indicate the absence of potential danger, the shutdown of security motivation is produced by a self-generated feeling of knowing, a satiety signal termed yedasentience. In this schema, OCD results from a failure to generate or respond to the yedasentience signal: without this negative feedback the patient persists abnormally long in a strong motivational state having to do with primal, basic threats to existence, a condition that leads to prolonged engagement in security-related behaviors, such as the checking and washing, characteristic of OCD compulsions and obsessions. Considering the proposed neuronatomy of security motivation system and OCD, we discuss the likelihood that the phenomenon of "spread of allied reflexes" can produce other security-related psychiatric conditions, as well as the possibility that disturbances along different pathways of the security motivation system can lead to apparently different disorders.
Intelligent cloud computing security using genetic algorithm as a computational tools
NASA Astrophysics Data System (ADS)
Razuky AL-Shaikhly, Mazin H.
2018-05-01
An essential change had occurred in the field of Information Technology which represented with cloud computing, cloud giving virtual assets by means of web yet awesome difficulties in the field of information security and security assurance. Currently main problem with cloud computing is how to improve privacy and security for cloud “cloud is critical security”. This paper attempts to solve cloud security by using intelligent system with genetic algorithm as wall to provide cloud data secure, all services provided by cloud must detect who receive and register it to create list of users (trusted or un-trusted) depend on behavior. The execution of present proposal has shown great outcome.
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2011 CFR
2011-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2010 CFR
2010-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2013 CFR
2013-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2012 CFR
2012-04-01
... provision. An index that is a narrow-based security index that becomes a broad-based security index for no...-five days. An index that is a narrow-based security index that becomes a broad-based security index for...
Identity Dilemmas: The Consequence of Identity in Protracted Conflict
2011-03-24
prescribe method, or promote thought, the contributions of Thucydides, Plato , Aristotle, Hobbes, Locke, Kant and others offer penetrating insight into...Lebow, A Cultural Theory, 180. 28 Ibid., 180. For an exceptional examination of ontological security-seeking behavior and how rational security
Code of Federal Regulations, 2012 CFR
2012-07-01
... Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY... effort to assess the probability of future behavior which could have an effect adverse to the national... the past but necessarily anticipating the future. Rarely is proof of trustworthiness and reliability...
75 FR 64643 - Reporting of Security-Based Swap Transaction Data
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...
75 FR 75207 - Regulation SBSR-Reporting and Dissemination of Security-Based Swap Information
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-02
...In accordance with Section 763 (``Section 763'') and Section 766 (``Section 766'') of Title VII (``Title VII'') of the Dodd-Frank Wall Street Reform and Consumer Protection Act (the ``Dodd-Frank Act''), the Securities and Exchange Commission (``SEC'' or ``Commission'') is proposing Regulation SBSR--Reporting and Dissemination of Security-Based Swap Information (``Regulation SBSR'') under the Securities Exchange Act of 1934 (``Exchange Act'').\\1\\ Proposed Regulation SBSR would provide for the reporting of security- based swap information to registered security-based swap data repositories or the Commission and the public dissemination of security-based swap transaction, volume, and pricing information. Registered security-based swap data repositories would be required to establish and maintain certain policies and procedures regarding how transaction data are reported and disseminated, and participants of registered security-based swap data repositories that are security- based swap dealers or major security-based swap participants would be required to establish and maintain policies and procedures that are reasonably designed to ensure that they comply with applicable reporting obligations. Finally, proposed Regulation SBSR also would require a registered SDR to register with the Commission as a securities information processor on existing Form SIP. ---------------------------------------------------------------------------
Roskam, Isabelle
2018-03-22
The aim of the current research was to disentangle four theoretically sound models of externalizing behavior etiology (i.e., attachment, language, inhibition, and parenting) by testing their relation with behavioral trajectories from early childhood to adolescence. The aim was achieved through a 10-year prospective longitudinal study conducted over five waves with 111 referred children aged 3 to 5 years at the onset of the study. Clinical referral was primarily based on externalizing behavior. A multimethod (questionnaires, testing, and observations) approach was used to estimate the four predictors in early childhood. In line with previous studies, the results show a significant decrease of externalizing behavior from early childhood to adolescence. The decline was negatively related to mothers' coercive parenting and positively related to attachment security in early childhood, but not related to inhibition and language. The study has implications for research into externalizing behavior etiology recommending to gather hypotheses from various theoretically sound models to put them into competition with one another. The study also has implications for clinical practice by providing clear indications for prevention and early intervention.
Fuzzy Kernel k-Medoids algorithm for anomaly detection problems
NASA Astrophysics Data System (ADS)
Rustam, Z.; Talita, A. S.
2017-07-01
Intrusion Detection System (IDS) is an essential part of security systems to strengthen the security of information systems. IDS can be used to detect the abuse by intruders who try to get into the network system in order to access and utilize the available data sources in the system. There are two approaches of IDS, Misuse Detection and Anomaly Detection (behavior-based intrusion detection). Fuzzy clustering-based methods have been widely used to solve Anomaly Detection problems. Other than using fuzzy membership concept to determine the object to a cluster, other approaches as in combining fuzzy and possibilistic membership or feature-weighted based methods are also used. We propose Fuzzy Kernel k-Medoids that combining fuzzy and possibilistic membership as a powerful method to solve anomaly detection problem since on numerical experiment it is able to classify IDS benchmark data into five different classes simultaneously. We classify IDS benchmark data KDDCup'99 data set into five different classes simultaneously with the best performance was achieved by using 30 % of training data with clustering accuracy reached 90.28 percent.
Three Essays Examining Household Energy Demand and Behavior
NASA Astrophysics Data System (ADS)
Murray, Anthony G.
This dissertation consists of three essays examining household energy decisions and behavior. The first essay examines the adoption of energy efficient Energy Star home appliances by U.S. households. Program effectiveness requires that consumers be aware of the labeling scheme and also change their purchase decisions based on label information. The first essay examines the factors associated with consumer awareness of the Energy Star label of recently purchased major appliances and the factors associated with the choice of Energy Star labeled appliances. The findings suggest that eliminating identified gaps in Energy Star appliance adoption would result in house electricity cost savings of $164 million per year and associated carbon emission reductions of about 1.1 million metric tons per year. The second essay evaluates household energy security and the effectiveness of the Low-Income Home Energy Assistance Program (LIHEAP), the single largest energy assistance program available to poor households within the United States. Energy security is conceptually akin to the well-known concept of food security. Rasch models and household responses to energy security questions in the 2005 Residential Energy Consumption Survey are used to generate an energy insecurity index that is consistent with those found in the food insecurity literature. Participating in LIHEAP is found to significantly reduce household energy insecurity score in the index. Further, simulations show that the elimination of the energy assistance safety net currently available to households increases the number of energy insecure house- holds by over 16 percent. The third essay develops a five equation demand system to estimate household own-price, cross-price and income elasticities between electricity, natural gas, food at home, food away from home, and non-durable commodity groups. Household cross-price elasticities between energy and food commodities are of particular importance. Energy price shocks reduce food expenditures for low-income households, as indicated by negative cross-price elasticity estimates for food and energy commodities. Additionally, low-income households reduce energy expenditures more than other households, further indicating "heat or eat" behavior. Results from all three essays provide policy makers with helpful information to shape future federal energy programs.
Test and Evaluation of Architecture-Aware Compiler Environment
2011-11-01
biology, medicine, social sciences , and security applications. Challenges include extremely large graphs (the Facebook friend network has over...Operations with Temporal Binning ....................................................................... 32 4.12 Memory behavior and Energy per...five challenge problems empirically, exploring their scaling properties, computation and datatype needs, memory behavior , and temporal behavior
A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security
2017-12-21
cure-all. Most of the best practices around cybersecurity are entirely free and based more on education and behavioral hygiene than on technological...uncomfortable for most countries around the world, whose lead- ers have often profited handsomely in money or longevity from the opacity and byzantine...Disparte, “ Free , Fair and (Mostly) Unfettered,” International Policy Digest, November 16, 2016. 6 Phil Wahba, “Amazon Will Make Up 50% of All U.S. E
Spieker, Susan J.; Oxford, Monica L.; Fleming, Charles B.; Lohr, Mary Jane
2018-01-01
Parents who are child welfare services-involved (CWSI) often have a history of childhood adversity and depressive symptoms. Both affect parenting quality, which in turn influences child adaptive functioning. We tested a model of the relations between parental depression and child regulatory outcomes first proposed by Lyons-Ruth and colleagues (2002). We hypothesized that both parental depression and parenting quality mediate the effects of parental early adversity on offspring regulatory outcomes. Participants were 123 CWSI parents and their toddlers who were assessed three times over a period of six months. At T1, parents reported on their childhood adversity and current depressive symptoms. At T2, parents’ sensitivity to their child’s distress and non-distress cues were rated from a videotaped teaching task. At T3, observers rated children’s emotional regulation, orientation/engagement, and secure base behavior. The results of a path model partly supported hypotheses. Parent childhood adversity was associated with current depressive symptoms, which in turn was related to parent sensitivity to child distress but not non-distress. Sensitivity to distress also predicted secure base behavior. Depression directly predicted orientation/engagement, also predicted by sensitivity to non-distress. Sensitivity to distress predicted emotion regulation and orientation/engagement. Results are discussed in terms of intervention approaches for CWSI families. PMID:29266280
Spieker, Susan J; Oxford, Monica L; Fleming, Charles B; Lohr, Mary Jane
2018-01-01
Parents who are involved with child welfare services (CWSI) often have a history of childhood adversity and depressive symptoms. Both affect parenting quality, which in turn influences child adaptive functioning. We tested a model of the relations between parental depression and child regulatory outcomes first proposed by K. Lyons-Ruth, R. Wolfe, A. Lyubchik, and R. Steingard (2002). We hypothesized that both parental depression and parenting quality mediate the effects of parental early adversity on offspring regulatory outcomes. Participants were 123 CWSI parents and their toddlers assessed three times over a period of 6 months. At Time 1, parents reported on their childhood adversity and current depressive symptoms. At Time 2, parents' sensitivity to their child's distress and nondistress cues was rated from a videotaped teaching task. At Time 3, observers rated children's emotional regulation, orientation/engagement, and secure base behavior. The results of a path model partly supported the hypotheses. Parent childhood adversity was associated with current depressive symptoms, which in turn related to parent sensitivity to child distress, but not nondistress. Sensitivity to distress also predicted secure base behavior. Depression directly predicted orientation/engagement, also predicted by sensitivity to nondistress. Sensitivity to distress predicted emotion regulation and orientation/engagement. Results are discussed in terms of intervention approaches for CWSI families. © 2017 Michigan Association for Infant Mental Health.
Marfeo, Elizabeth E.; Haley, Stephen M.; Jette, Alan M.; Eisen, Susan V.; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M.; Chan, Leighton; Brandt, Diane E.; Rasch, Elizabeth K.
2014-01-01
Physical and mental impairments represent the two largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person’s underlying capabilities as well as activity demands relevant to the context of work. The objective of this paper is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, two content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability, and Health (ICF) as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies five major domains (1) Behavior Control, (2) Basic Interactions, (3) Temperament and Personality, (4) Adaptability, and (5) Workplace Behaviors. The content model describing physical functioning includes three domains (1) Changing and Maintaining Body Position, (2) Whole Body Mobility, and (3) Carrying, Moving and Handling Objects. These content models informed subsequent measurement properties including item development, measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. PMID:23548543
Physical and property victimization behind bars: a multilevel examination.
Lahm, Karen F
2009-06-01
The majority of the extant literature on inmate victimization considers only one level of analysis, thus ignoring the interaction effects between inmate- and prison-level variables. To extend this literature, multilevel modeling techniques were used to analyze self-report data from more than 1,000 inmates and 30 prisons in Kentucky, Tennessee, and Ohio. Results revealed that demographic variables were strong predictors of physical victimization (i.e., race and assaultive behavior). Also, security level had a contextual direct effect on physical victimization. Property victimization was best explained with an integrated model including inmate (i.e., race, assaultive behavior, prior education, prior employment, and time served), contextual (i.e., security level and proportion non-White), and micro-macro interaction variables (i.e., Race x Security Level). Policy implications and suggestions for future research are discussed.
Intelligent Control in Automation Based on Wireless Traffic Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurt Derr; Milos Manic
2007-09-01
Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in controlmore » type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.« less
Intelligent Control in Automation Based on Wireless Traffic Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurt Derr; Milos Manic
Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in controlmore » type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.« less
Probabilistic Characterization of Adversary Behavior in Cyber Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyers, C A; Powers, S S; Faissol, D M
2009-10-08
The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.
Geovisualization for Smart Video Surveillance
NASA Astrophysics Data System (ADS)
Oves García, R.; Valentín, L.; Serrano, S. A.; Palacios-Alonso, M. A.; Sucar, L. Enrique
2017-09-01
Nowadays with the emergence of smart cities and the creation of new sensors capable to connect to the network, it is not only possible to monitor the entire infrastructure of a city, including roads, bridges, rail/subways, airports, communications, water, power, but also to optimize its resources, plan its preventive maintenance and monitor security aspects while maximizing services for its citizens. In particular, the security aspect is one of the most important issues due to the need to ensure the safety of people. However, if we want to have a good security system, it is necessary to take into account the way that we are going to present the information. In order to show the amount of information generated by sensing devices in real time in an understandable way, several visualization techniques are proposed for both local (involves sensing devices in a separated way) and global visualization (involves sensing devices as a whole). Taking into consideration that the information is produced and transmitted from a geographic location, the integration of a Geographic Information System to manage and visualize the behavior of data becomes very relevant. With the purpose of facilitating the decision-making process in a security system, we have integrated the visualization techniques and the Geographic Information System to produce a smart security system, based on a cloud computing architecture, to show relevant information about a set of monitored areas with video cameras.
Code of Federal Regulations, 2010 CFR
2010-04-01
... narrow-based security index for indexes composed of debt securities. 240.3a55-4 Section 240.3a55-4... Miscellaneous Exemptions § 240.3a55-4 Exclusion from definition of narrow-based security index for indexes composed of debt securities. (a) An index is not a narrow-based security index if: (1)(i) Each of the...
Applying attachment theory to effective practice with hard-to-reach youth: the AMBIT approach.
Bevington, Dickon; Fuggle, Peter; Fonagy, Peter
2015-01-01
Adolescent Mentalization-Based Integrative Treatment (AMBIT) is a developing approach to working with "hard-to-reach" youth burdened with multiple co-occurring morbidities. This article reviews the core features of AMBIT, exploring applications of attachment theory to understand what makes young people "hard to reach," and provide routes toward increased security in their attachment to a worker. Using the theory of the pedagogical stance and epistemic ("pertaining to knowledge") trust, we show how it is the therapeutic worker's accurate mentalizing of the adolescent that creates conditions for new learning, including the establishment of alternative (more secure) internal working models of helping relationships. This justifies an individual keyworker model focused on maintaining a mentalizing stance toward the adolescent, but simultaneously emphasizing the critical need for such keyworkers to remain well connected to their wider team, avoiding activation of their own attachment behaviors. We consider the role of AMBIT in developing a shared team culture (shared experiences, shared language, shared meanings), toward creating systemic contexts supportive of such relationships. We describe how team training may enhance the team's ability to serve as a secure base for keyworkers, and describe an innovative approach to treatment manualization, using a wiki format as one way of supporting this process.
Coupled Multi-physics analysis of Caprock Integrity and Fault Reactivation during CO2 Sequestration*
NASA Astrophysics Data System (ADS)
Newell, P.; Martinez, M. J.; Bishop, J.
2012-12-01
Structural/stratigraphic trapping beneath a low-permeable caprock layer is the primary trapping mechanism for long-term subsurface sequestration of CO2. Pre-existing fracture networks, injection induced fractures, and faults are of concern for possible CO2 leakage both during and after injection. In this work we model the effects of both caprock jointing and a fault on the caprock sealing integrity during various injection scenarios. The modeling effort uses a three-dimensional finite-element based coupled multiphase flow and geomechanics simulator. The joints within the caprock are idealized as equally spaced and parallel. Both the mechanical and flow behavior of the joint network are treated within an effective continuum formulation. The mechanical behavior of the joint network is linear elastic in shear and nonlinear elastic in the normal direction. The flow behavior of the joint network is treated using the classical cubic-law relating flow rate and aperture. The flow behavior is then upscaled to obtain an effective permeability. The fault is modeled as a finite-thickness layer with multiple joint sets. The joint sets within the fault region are modeled following the same mechanical and flow formulation as the joints within the caprock. Various injection schedules as well as fault and caprock jointing configurations within a proto-typical sequestration site have been investigated. The resulting leakage rates through the caprock and fault are compared to those assuming intact material. The predicted leakage rates are a strong nonlinear function of the injection rate. *This material is based upon work supported as part of the Center for Frontiers of Subsurface Energy Security, an Energy Frontier Research Center funded by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences under Award Number DE-SC0001114. Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energys National Nuclear Security Administration under Contract DE-AC04-94AL85000.
Attachment in middle childhood: predictors, correlates, and implications for adaptation.
Boldt, Lea J; Kochanska, Grazyna; Grekin, Rebecca; Brock, Rebecca L
2016-01-01
Middle childhood is a relative lacuna in behavioral attachment research. We examined antecedents, correlates, and implications of parent-child attachment at age 10 in a longitudinal study of community families from a Midwestern US state (N = 102, mothers, fathers, and children). Dimensions of security, avoidance, ambivalence, and disorganization of children's attachment to each parent were observed in lengthy naturalistic interactions and assessed using Iowa Attachment Behavioral Coding (IABC). IABC scores were meaningfully associated with history of parental responsiveness (7-80 months) and with earlier and concurrent attachment security, assessed with other established instruments (parent- and observer-rated Attachment Q-Set at 25 months, children's reports at age 8 and 10). Structural equation modeling analyses revealed that the overall history of responsive care was meaningfully associated with Security, Avoidance, and Disorganization at age 10, in both mother-child and father-child relationships, and that most recent care uniquely predicted Security. IABC scores were also meaningfully related to a broad range of measures of child adaptation at ages 10-12. Cumulative history of children's security from infancy to middle childhood, integrating measures across relationships and methodologies, also predicted child adaptation at ages 10-12.
Attachment in Middle Childhood: Predictors, Correlates, and Implications for Adaptation
Boldt, Lea J.; Kochanska, Grazyna; Grekin, Rebecca; Brock, Rebecca L.
2016-01-01
Middle childhood is a relative lacuna in behavioral attachment research. We examined antecedents, correlates, and implications of parent-child attachment at age 10 in a longitudinal study of community families from a Midwestern US state (N=102, mothers, fathers, and children). Dimensions of security, avoidance, ambivalence, and disorganization of children’s attachment to each parent were observed in lengthy naturalistic interactions and assessed using Iowa Attachment Behavioral Coding (IABC). IABC scores were meaningfully associated with history of parental responsiveness (7–80 months) and with earlier and concurrent attachment security, assessed with other established instruments (parent- and observer-rated Attachment Q-Set at 25 months, children’s reports at age 8 and 10). Structural equation modeling analyses revealed that the overall history of responsive care was meaningfully associated with Security, Avoidance, and Disorganization at age 10, in both mother-child and father-child relationships, and that most recent care uniquely predicted Security. IABC scores were also meaningfully related to a broad range of measures of child adaptation at ages 10–12. Cumulative history of children’s security from infancy to middle childhood, integrating measures across relationships and methodologies, also predicted child adaptation at ages 10–12. PMID:26673686
NASA Astrophysics Data System (ADS)
Zhang, Hong
2017-06-01
In recent years, with the continuous development and application of network technology, network security has gradually entered people's field of vision. The host computer network external network of violations is an important reason for the threat of network security. At present, most of the work units have a certain degree of attention to network security, has taken a lot of means and methods to prevent network security problems such as the physical isolation of the internal network, install the firewall at the exit. However, these measures and methods to improve network security are often not comply with the safety rules of human behavior damage. For example, the host to wireless Internet access and dual-network card to access the Internet, inadvertently formed a two-way network of external networks and computer connections [1]. As a result, it is possible to cause some important documents and confidentiality leak even in the the circumstances of user unaware completely. Secrecy Computer Violation Out-of-band monitoring technology can largely prevent the violation by monitoring the behavior of the offending connection. In this paper, we mainly research and discuss the technology of secret computer monitoring.
Effects of Shift Work on Air Force Security Police Personnel.
1986-01-01
Naitoh, Paul. " Chronobiologic Approach for Optimizing Human Performance ." In Rhythmic Aspects of Behavior. eds. Frederick M. Brown and R. Curtis...Effects of Shift Work on Air Force THESIS/DISSERTATION Security Police Personnel 6. PERFORMING O1G. REPORT NUMBER 7. AUTHOR(.) 8. CONTRACT OR GRANT...shift work has a significant effect on those who perform it, this study examines the perceived effects of shift work on a population of security
Structural Causes and Cyber Effects: A Response to Our Critics
2015-01-01
the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15
Walker, Daniel M; Johnson, Tyler; Ford, Eric W; Huerta, Timothy R
2017-01-04
As electronic health records (EHRs) become ubiquitous in the health care industry, privacy breaches are increasing and being made public. These breaches may make consumers wary of the technology, undermining its potential to improve care coordination and research. Given the developing concerns around privacy of personal health information stored in digital format, it is important for providers to understand how views on privacy and security may be associated with patient disclosure of health information. This study aimed to understand how privacy concerns may be shifting patient behavior. Using a pooled cross-section of data from the 2011 and 2014 cycles of the Health Information and National Trends Survey (HINTS), we tested whether privacy and security concerns, as well as quality perceptions, are associated with the likelihood of withholding personal health information from a provider. A fully interacted multivariate model was used to compare associations between the 2 years, and interaction terms were used to evaluate trends in the factors that are associated with withholding behavior. No difference was found regarding the effect of privacy and security concerns on withholding behavior between 2011 and 2014. Similarly, whereas perceived high quality of care was found to reduce the likelihood of withholding information from a provider in both 2011 (odds ratio [OR] 0.73, 95% confidence interval [CI] 0.56-0.94) and 2014 (OR 0.61, 95% CI 0.48-0.76), no difference was observed between years. These findings suggest that consumers' beliefs about EHR privacy and security, the relationship between technology use and quality, and intentions to share information with their health care provider have not changed. These findings are counter to the ongoing discussions about the implications of security failures in other domains. Our results suggest that providers could ameliorate privacy and security by focusing on the care quality benefits EHRs provide. ©Daniel M Walker, Tyler Johnson, Eric W Ford, Timothy R Huerta. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 04.01.2017.
ERIC Educational Resources Information Center
Kochanska, Grazyna; Kim, Sanghag
2013-01-01
Links between children's attachment security with mothers and fathers, assessed in Strange Situation with each parent at 15 months ("N" = 101), and their future behavior problems were examined. Mothers and fathers rated children's behavior problems, and children reported their own behavior problems at age 8 ("N" = 86). Teachers…
Towards human behavior recognition based on spatio temporal features and support vector machines
NASA Astrophysics Data System (ADS)
Ghabri, Sawsen; Ouarda, Wael; Alimi, Adel M.
2017-03-01
Security and surveillance are vital issues in today's world. The recent acts of terrorism have highlighted the urgent need for efficient surveillance. There is indeed a need for an automated system for video surveillance which can detect identity and activity of person. In this article, we propose a new paradigm to recognize an aggressive human behavior such as boxing action. Our proposed system for human activity detection includes the use of a fusion between Spatio Temporal Interest Point (STIP) and Histogram of Oriented Gradient (HoG) features. The novel feature called Spatio Temporal Histogram Oriented Gradient (STHOG). To evaluate the robustness of our proposed paradigm with a local application of HoG technique on STIP points, we made experiments on KTH human action dataset based on Multi Class Support Vector Machines classification. The proposed scheme outperforms basic descriptors like HoG and STIP to achieve 82.26% us an accuracy value of classification rate.
Porcerelli, John H; Huth-Bocks, Alissa; Huprich, Steven K; Richardson, Laura
2016-02-01
For at-risk (single parent, low income, low support) mothers, healthy adaptation and the ability to manage stress have clear implications for parenting and the social-emotional well-being of their young offspring. The purpose of this longitudinal study was to examine associations between defense mechanisms in pregnant women and their toddlers' attachment security, social-emotional, and behavioral adjustment. Participants were 84 pregnant women during their last trimester of pregnancy, recruited from community agencies primarily serving low-income families. Women were followed prospectively from pregnancy through 2 years after birth and completed several multimethod assessments during that period. Observations of mother-child interactions were also coded after the postnatal visits. Multiple regression analyses revealed that mothers' defense mechanisms were significantly associated with several toddler outcomes. Mature, healthy defenses were significantly associated with greater toddler attachment security and social-emotional competence and fewer behavior problems, and less mature defenses (disavowal in particular) were associated with lower levels of attachment security and social-emotional competence. Associations remained significant, or were only slightly attenuated, after controlling for demographic variables and partner abuse during pregnancy. The study findings suggest that defensive functioning in parents preparing for and parenting toddlers influences the parent-child attachment relationship and social-emotional adjustment in the earliest years of life. Possible mechanisms for these associations may include parental attunement and mentalization, as well as specific caregiving behavior toward the child. Defensive functioning during times of increased stress (such as the prenatal to postnatal period) may be especially important for understanding parental influences on the child.
NASA Astrophysics Data System (ADS)
Li, Chuang; Min, Fuhong; Jin, Qiusen; Ma, Hanyuan
2017-12-01
An active charge-controlled memristive Chua's circuit is implemented, and its basic properties are analyzed. Firstly, with the system trajectory starting from an equilibrium point, the dynamic behavior of multiple coexisting attractors depending on the memristor initial value and the system parameter is studied, which shows the coexisting behaviors of point, period, chaos, and quasic-period. Secondly, with the system motion starting from a non-equilibrium point, the dynamics of extreme multistability in a wide initial value domain are easily conformed by new analytical methods. Furthermore, the simulation results indicate that some strange chaotic attractors like multi-wing type and multi-scroll type are observed when the observed signals are extended from voltage and current to power and energy, respectively. Specially, when different initial conditions are taken, the coexisting strange chaotic attractors between the power and energy signals are exhibited. Finally, the chaotic sequences of the new system are used for encrypting color image to protect image information security. The encryption performance is analyzed by statistic histogram, correlation, key spaces and key sensitivity. Simulation results show that the new memristive chaotic system has high security in color image encryption.
Stability and Change of Adolescents' Aggressive Behavior in Residential Youth Care
ERIC Educational Resources Information Center
Eltink, E. M. A.; Ten Hoeve, J.; De Jongh, T.; Van der Helm, G. H. P.; Wissink, I. B.; Stams, G. J. J. M.
2018-01-01
Background: Aggression in residential youth care institutions is a frequent problem. Objective: The present short-term longitudinal study examined individual and institutional predictors of aggression in a group of 198 adolescents placed in open, semi-secure and secure residential institutions from the perspective of the importation and…
Against All Odds: Latinas Activate Agency to Secure Access to College
ERIC Educational Resources Information Center
Sapp, Vicki T.; Kiyama, Judy Marquez; Dache-Gerbino, Amalia
2016-01-01
This qualitative study seeks to understand Latinas' college-going behaviors by examining their agency and role in securing opportunity for college. The authors examine the activation of agency among 16 urban Latinas when navigating the structures influencing college opportunity through a cultural ecological model. Examples of agency are…
5 Key Ways Your Electronic Data May Be at Risk
ERIC Educational Resources Information Center
Titus, Aaron
2008-01-01
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Bradford, Angela B; Burningham, Kayla L; Sandberg, Jonathan G; Johnson, Lee N
2017-04-01
Research shows that the parent-child relationship affects attachment security, which correlates with anxiety and depression in adulthood. Additional research shows that romantic attachment behaviors may supersede individual attachment security and buffer against negative processes. Using data from 680 married couples in the general population, we examined whether attachment mediates the link between the parent-child relationship and depressive and anxiety symptoms in adulthood. In addition, we tested whether perceived spouse attachment behaviors moderate the effects of attachment insecurity. There was an indirect effect of poor parent-child relationships on symptoms via insecure attachment. Perception of spouse's attachment behaviors was related to depression for both spouses, and they moderated the effect of attachment insecurity on depressive symptoms for husbands. Clinical implications are discussed. © 2016 American Association for Marriage and Family Therapy.
The Umbra Simulation and Integration Framework Applied to Emergency Response Training
NASA Technical Reports Server (NTRS)
Hamilton, Paul Lawrence; Britain, Robert
2010-01-01
The Mine Emergency Response Interactive Training Simulation (MERITS) is intended to prepare personnel to manage an emergency in an underground coal mine. The creation of an effective training environment required realistic emergent behavior in response to simulation events and trainee interventions, exploratory modification of miner behavior rules, realistic physics, and incorporation of legacy code. It also required the ability to add rich media to the simulation without conflicting with normal desktop security settings. Our Umbra Simulation and Integration Framework facilitated agent-based modeling of miners and rescuers and made it possible to work with subject matter experts to quickly adjust behavior through script editing, rather than through lengthy programming and recompilation. Integration of Umbra code with the WebKit browser engine allowed the use of JavaScript-enabled local web pages for media support. This project greatly extended the capabilities of Umbra in support of training simulations and has implications for simulations that combine human behavior, physics, and rich media.
Analyzing Cyber-Physical Threats on Robotic Platforms.
Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J
2018-05-21
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.
Analyzing Cyber-Physical Threats on Robotic Platforms †
2018-01-01
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403
Dvorak, Robert D; Pearson, Matthew R; Neighbors, Clayton; Martens, Matthew P; Stevenson, Brittany L; Kuvaas, Nicholas J
2016-06-01
Drinking remains a problem across college campuses. Changing this behavior requires interventions that can be easily and widely dispersed. Several theories place intentions as a proximal predictor of behavior change. The current study examines the effects of a Web-based Deviance Regulation Theory (DRT) intervention on (1) intentions to use alcohol protective behavior strategies (PBS) and (2) associations between these intentions and actual behavior. Participants (n = 76) completed a 6-week, Web-based study examining drinking behaviors. Participants were randomly assigned to receive a positive frame about individuals who use PBS or a negative frame about individuals who do not. They also reported normative perceptions of PBS use among college students. They subsequently logged onto a secure server each week to report on alcohol involvement, use of 3 types of PBS (Manner of Drinking, Stopping/Limiting, and Serious Harm Reduction), and intentions to use these PBS the following week. Consistent with DRT, negative frames resulted in higher PBS use intentions if individuals held high normative beliefs about PBS use. Positive frames resulted in higher Manner of Drinking PBS use intentions if individuals held low normative beliefs about PBS use, but only if individuals endorsed a high belief in the frame. In addition, there was a DRT consistent increase in intention-action associations, but only for Stopping/Limiting PBS. A brief Web-based DRT intervention was effective at increasing PBS intentions and increasing PBS intention-action associations. DRT may provide a mechanism to additively or synergistically improve other Web-based interventions for college drinking. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.
Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel
2016-06-29
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.
1985-08-01
1 -ethyl- 3 -( 3 - dimethylaminopropyl )car- bodiimide hydrochloride (Sigma) and glycine (2-3H) (New England Nuclear as a 15.0...of N-hydroxysuc- *cinimide and 0.5 g of 1 -ethyl- 3 -( 3 - dimethylaminopropyl )carbodiimide hydrochloride for 12 hours to produce PE-CO-N-hydroxysuccinimide...and/or Dist 1 Special I- S,N 0102- LF. 014.6601 SECURITY CLASSIFICATION Of THIS PAGIrm( en Date Entered) / . ~ * .! - 3 - Introduction. In
Loafmann, B
2001-01-01
An analysis of how consequences impact your company from inside or outside will enable you to prevent the situations that can build up until they explode into violence. Specific skill enhancement on the use of feedback and consequences will broaden the base of involvement and foster early intervention opportunities before things get out of control. Understanding how consequences influence behavior also can improve self-management efforts. When these strategies are coupled with security hardware and appropriate policies, we can once again help our managers and employees work without fear of violence.
Attachment, self-worth, and peer-group functioning in middle childhood.
Booth-Laforce, Cathryn; Oh, Wonjung; Kim, Angel Hayoung; Rubin, Kenneth H; Rose-Krasnor, Linda; Burgess, Kim
2006-12-01
We evaluated links between peer-group functioning and indicators of attachment security in relation to both mother and father in middle childhood, among 73 10-year-olds (37 girls). Children's perceptions of security with both parents, coping styles with mother, and self-worth were assessed. Classmates, teachers, and mothers evaluated the participants' peer-related behavioral characteristics. Children's perceptions of security to both parents were related to others' appraisals of their social competence; perceptions of security to father were related to lower aggression. We did not find child gender effects, but children had higher security scores in relation to mother than to father. Self-worth perceptions mediated the relation between attachment and social competence.
Chafetz, Michael D
2010-08-01
This article is about Social Security Administration (SSA) policy with regard to the Psychological Consultative Examination (PCE) for Social Security Disability, particularly with respect to validation of the responses and findings. First, the nature of the consultation and the importance of understanding the boundaries and ethics of the psychologist's role are described. Issues particular to working with low-functioning claimants usually form a large part of these examinations. The psychologist must understand various forms of non-credible behavior during the PCE, and how malingering might be considered among other non-credible presentations. Issues pertaining to symptom validity testing in low-functioning claimants are further explored. SSA policy with respect to symptom validity testing is carefully examined, with an attempt to answer specific concerns and show how psychological science can be of assistance, particularly with evidence-based practice. Additionally, the nature and importance of techniques to avoid the mislabeling of claimants as malingerers are examined. SSA requires the use of accepted diagnostic techniques with which to establish impairment, and this article describes the implementation of that requirement, particularly with respect to validating the findings.
ERIC Educational Resources Information Center
Erickson, Martha Farrell; And Others
1985-01-01
Tests hypothesis that young children who were anxiously attached would be more likely than securely attached children to have behavior problems in preschool. Examines particular patterns of anxious attachment in relation to specific problem behaviors. Studies child, parental, interactional, and environmental factors that account for behavior…
Attachment theory and theory of planned behavior: an integrative model predicting underage drinking.
Lac, Andrew; Crano, William D; Berger, Dale E; Alvaro, Eusebio M
2013-08-01
Research indicates that peer and maternal bonds play important but sometimes contrasting roles in the outcomes of children. Less is known about attachment bonds to these 2 reference groups in young adults. Using a sample of 351 participants (18 to 20 years of age), the research integrated two theoretical traditions: attachment theory and theory of planned behavior (TPB). The predictive contribution of both theories was examined in the context of underage adult alcohol use. Using full structural equation modeling, results substantiated the hypotheses that secure peer attachment positively predicted norms and behavioral control toward alcohol, but secure maternal attachment inversely predicted attitudes and behavioral control toward alcohol. Alcohol attitudes, norms, and behavioral control each uniquely explained alcohol intentions, which anticipated an increase in alcohol behavior 1 month later. The hypothesized processes were statistically corroborated by tests of indirect and total effects. These findings support recommendations for programs designed to curtail risky levels of underage drinking using the tenets of attachment theory and TPB. (PsycINFO Database Record (c) 2013 APA, all rights reserved).
The missing link: Mothers’ neural response to infant cry related to infant attachment behaviors
Laurent, Heidemarie K.; Ablow, Jennifer C.
2012-01-01
This study addresses a gap in the attachment literature by investigating maternal neural response to cry related to infant attachment classifications and behaviors. Twenty-two primiparous mothers and their 18-month old infants completed the Strange Situation Procedure (SS) to elicit attachment behaviors. During a separate functional MRI session, mothers were exposed to their own infant’s cry sound, as well as an unfamiliar infant’s cry and control sound. Maternal neural response to own infant cry related to both overall attachment security and specific infant behaviors. Mothers of less secure infants maintained greater activation to their cry in left parahippocampal and amygdala regions and the right posterior insula. consistent with a negative schematic response bias. Mothers of infants exhibiting more avoidant or contact maintaining behaviors during the SS showed diminished response across left prefrontal, parietal, and cerebellar areas involved in attentional processing and cognitive control. Mothers of infants exhibiting more disorganized behavior showed reduced response in bilateral temporal and subcallosal areas relevant to social cognition and emotion regulation. No differences by attachment classification were found. Implications for attachment transmission models are discussed. PMID:22982277
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-03
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-64766; File No. S7-25-11] RIN 3235-AL10 Business Conduct Standards for Security-Based Swap Dealers and Major Security-Based Swap Participants Correction In proposed rule document number 2011-16758, appearing on pages 42396-42455 in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...
Measurements of Sound Speed and Grüneisen Parameter in Polystyrene Shocked to 8.5 Mbar
NASA Astrophysics Data System (ADS)
Boehly, T. R.; Rygg, J. R.; Zaghoo, M.; Hu, S. X.; Collins, G. W.; Fratanduono, D. E.; Celliers, P. M.; McCoy, C. A.
2017-10-01
The high-pressure behavior of polymers is important to fundamental high-energy-density studies and inertial confinement fusion experiments. The sound speed affects shock timing and determines the amplitude of modulations in unstable shocks. The Grüneisen parameter provides a means to model off-Hugoniot behavior, especially release physics. We use laser-driven shocks and a nonsteady wave analysis to infer sound speed in shocked material from the arrival times of drive-pressure perturbations at the shock front. Data are presented for CH shocked to 8.5 Mbar and compared to models. The Grüneisen parameter is observed to drop significantly near the insulator-conductor transition-a behavior not predicted by tabular models but is observed in quantum molecular dynamic simulations. This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944.
Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Todd Vollmer; Milos Manic
The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, thismore » paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.« less
Davies, Patrick T; Martin, Meredith J; Sturge-Apple, Melissa L; Ripple, Michael T; Cicchetti, Dante
2016-10-01
Two studies tested hypotheses about the distinctive psychological consequences of children's patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in 2 annual measurement occasions. Across both studies, multiple informants assessed children's psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children's coping with interparental conflict assessed their tendencies to exhibit 4 patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.
mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants frameworkmore » is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.« less
Population waves and fertility fluctuations: social security implications.
Boyle, P P; Freedman, R
1985-01-01
Based on Canadian data, this study discusses some of the methods which incorporate fertility variations into population forecasts. In particular, the relative shifts in the age structure which can have profound social and economic consequences on the context of a pay as you go national security system are analyzed. In terms of long range economic and social planning, oscillating growth projections are much more difficult to handle and plan for than the constant growth rates predicted by stable population theories. The impact of different types of fertility fluctuations are analyzed in terms of evolution of the dependency ration over time; the dependency ratio corresponds to the ratio of the retired lives of a population to those of the working age population. From the viewpoint of a social security system, the evolution of the dependency ratio over time is of particular importance. Other areas explored are: 1) cohort fertility variations; 2) periodic fertility fluctuations; and 3) limit cycle behaviors. In the context of a national social security plan, one possible response to the population projections would be to maintain the year by year level of the RA ratio (ratio of the population aged 65 and over to the population aged between 20 and 65) at its equilibrium value of 27.6% by adjusting the retirement age appropriately.
Davies, Patrick T.; Martin, Meredith J.; Sturge-Apple, Melissa L.; Ripple, Michael T.; Cicchetti, Dante
2016-01-01
Two studies tested hypotheses about the distinctive psychological consequences of children’s patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in two annual measurement occasions. Across both studies, multiple informants assessed children’s psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children’s coping with interparental conflict assessed their tendencies to exhibit four patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. PMID:27598256
Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K
2013-09-01
Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
Success strivings and their relationship to affective work behaviors: gender differences.
Chusmir, L H; Parker, B
1992-02-01
Gender differences in the importance of six life success dimensions and their relationships to job satisfaction, job involvement, and propensity to stay on the job were examined among 756 working women and men in southeast Florida. Results showed that the female participants rated family relationships, personal fulfillment, and security as more important success measures than their male counterparts did, and they rated status/wealth as less important. Professional fulfillment and security were not significantly different. The relationships between measures of success and work behaviors also varied significantly by gender, even after controlling for demographic and job position variables.
Social and Behavioral Science: Monitoring Social Foraging Behavior in a Biological Model System
2016-10-12
SECURITY CLASSIFICATION OF: The aim of this project was to establish instrumentation to record honey bee foraging behavior through a Radio- Frequency...Identification (RFID) monitoring and to train students in the use of this technology and in the science underlying honey bee behavior. This enables...basic scientific advances in how honey bees adapt behaviorally to different stressors. Most notably, it will examine how early life stress and
Homeland security application of the Army Soft Target Exploitation and Fusion (STEF) system
NASA Astrophysics Data System (ADS)
Antony, Richard T.; Karakowski, Joseph A.
2010-04-01
A fusion system that accommodates both text-based extracted information along with more conventional sensor-derived input has been developed and demonstrated in a terrorist attack scenario as part of the Empire Challenge (EC) 09 Exercise. Although the fusion system was developed to support Army military analysts, the system, based on a set of foundational fusion principles, has direct applicability to department of homeland security (DHS) & defense, law enforcement, and other applications. Several novel fusion technologies and applications were demonstrated in EC09. One such technology is location normalization that accommodates both fuzzy semantic expressions such as behind Library A, across the street from the market place, as well as traditional spatial representations. Additionally, the fusion system provides a range of fusion products not supported by traditional fusion algorithms. Many of these additional capabilities have direct applicability to DHS. A formal test of the fusion system was performed during the EC09 exercise. The system demonstrated that it was able to (1) automatically form tracks, (2) help analysts visualize behavior of individuals over time, (3) link key individuals based on both explicit message-based information as well as discovered (fusion-derived) implicit relationships, and (4) suggest possible individuals of interest based on their association with High Value Individuals (HVI) and user-defined key locations.
Kim, Suk-Hee
2010-11-01
The purpose of this quantitative study is to understand the global security perspective on the effects of executive cognitive function (ECF) on Complex Behavioral Screening Intervention and HIV/AIDS. The HIV/AIDS pandemic is as much a social, political, economic, and cultural problem as a biomedical one. HIV/AIDS is associated centrally with the collapse not just of communities and families but potentially of states, with some of the largest public health interventions ever and enormous questions about governance, a huge population of orphans, and deep questions about intergenerational relations and cultural transmission. This study also is to develop a screening instrument that improves quality of life for individuals with executive cognitive impairments and behavior problems in our communities and the global society.
Visual Analysis of Cloud Computing Performance Using Behavioral Lines.
Muelder, Chris; Zhu, Biao; Chen, Wei; Zhang, Hongxin; Ma, Kwan-Liu
2016-02-29
Cloud computing is an essential technology to Big Data analytics and services. A cloud computing system is often comprised of a large number of parallel computing and storage devices. Monitoring the usage and performance of such a system is important for efficient operations, maintenance, and security. Tracing every application on a large cloud system is untenable due to scale and privacy issues. But profile data can be collected relatively efficiently by regularly sampling the state of the system, including properties such as CPU load, memory usage, network usage, and others, creating a set of multivariate time series for each system. Adequate tools for studying such large-scale, multidimensional data are lacking. In this paper, we present a visual based analysis approach to understanding and analyzing the performance and behavior of cloud computing systems. Our design is based on similarity measures and a layout method to portray the behavior of each compute node over time. When visualizing a large number of behavioral lines together, distinct patterns often appear suggesting particular types of performance bottleneck. The resulting system provides multiple linked views, which allow the user to interactively explore the data by examining the data or a selected subset at different levels of detail. Our case studies, which use datasets collected from two different cloud systems, show that this visual based approach is effective in identifying trends and anomalies of the systems.
ERIC Educational Resources Information Center
Du Rocher Schudlich, Tina D.; Cummings, E. Mark
2007-01-01
Dimensions of martial conflict, children's emotional security regarding interparental conflict, and parenting style were examined as mediators between parental dysphoria and child adjustment. A community sample of 262 children, ages 8-16, participated with their parents. Behavioral observations were made of parents' interactions during marital…
General Framework for Evaluating Password Complexity and Strength
2015-11-15
stronger password requirements: User attitudes and behaviors,” in Pro- ceedings of the Sixth Symposium on Usable Privacy and Security, ser. SOUPS ’10. New...Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. SOUPS ’12. New York, NY, USA: ACM, 2012, pp. 1–20. [22] P. Kelley, S. Komanduri
ERIC Educational Resources Information Center
Stalker, Joshua Dylan
2012-01-01
The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…
Berlin, Lisa J; Martoccio, Tiffany L; Appleyard Carmody, Karen; Goodman, W Benjamin; O'Donnell, Karen; Williams, Janis; Murphy, Robert A; Dodge, Kenneth A
2017-12-01
US government-funded early home visiting services are expanding significantly. The most widely implemented home visiting models target at-risk new mothers and their infants. Such home visiting programs typically aim to support infant-parent relationships; yet, such programs' effects on infant attachment quality per se are as yet untested. Given these programs' aims, and the crucial role of early attachments in human development, it is important to understand attachment processes in home visited families. The current, preliminary study examined 94 high-risk mother-infant dyads participating in a randomized evaluation of the Healthy Families Durham (HFD) home visiting program. We tested (a) infant attachment security and disorganization as predictors of toddler behavior problems and (b) program effects on attachment security and disorganization. We found that (a) infant attachment disorganization (but not security) predicted toddler behavior problems and (b) participation in HFD did not significantly affect infant attachment security or disorganization. Findings are discussed in terms of the potential for attachment-specific interventions to enhance the typical array of home visiting services.
Addressing security issues related to virtual institute distributed activities
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2008-03-01
One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-07
... COMMODITY FUTURES TRADING COMMISSION 17 CFR Part 1 RIN 3038-AD46 SECURITIES AND EXCHANGE...-Based Swap Agreement Recordkeeping AGENCY: Commodity Futures Trading Commission; Securities and Exchange... Futures Trading Commission and the Securities and Exchange Commission published a document in the Federal...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
An Online Banking System Based on Quantum Cryptography Communication
NASA Astrophysics Data System (ADS)
Zhou, Ri-gui; Li, Wei; Huan, Tian-tian; Shen, Chen-yi; Li, Hai-sheng
2014-07-01
In this paper, an online banking system has been built. Based on quantum cryptography communication, this system is proved unconditional secure. Two sets of GHZ states are applied, which can ensure the safety of purchase and payment, respectively. In another word, three trading participants in each triplet state group form an interdependent and interactive relationship. In the meantime, trading authorization and blind signature is introduced by means of controllable quantum teleportation. Thus, an effective monitor is practiced on the premise that the privacy of trading partners is guaranteed. If there is a dispute or deceptive behavior, the system will find out the deceiver immediately according to the relationship mentioned above.
Novel Image Encryption based on Quantum Walks
Yang, Yu-Guang; Pan, Qing-Xiang; Sun, Si-Jia; Xu, Peng
2015-01-01
Quantum computation has achieved a tremendous success during the last decades. In this paper, we investigate the potential application of a famous quantum computation model, i.e., quantum walks (QW) in image encryption. It is found that QW can serve as an excellent key generator thanks to its inherent nonlinear chaotic dynamic behavior. Furthermore, we construct a novel QW-based image encryption algorithm. Simulations and performance comparisons show that the proposal is secure enough for image encryption and outperforms prior works. It also opens the door towards introducing quantum computation into image encryption and promotes the convergence between quantum computation and image processing. PMID:25586889
Crises and Turbulence: Sources, Assessments, Management
1981-02-01
Uses of the Military ......... .. 262 14. Correlational Power of Fundamental Factors for Soviet Behavior ..... ............... ... 263 15. US...Coercive Uses of the Military ........... ... 265 16. Correlational Power of Fundamental Factors for US Behavior ...... ................. ... 267 17...analytic power has been available to predict and prescribe the behavior of states in response to security threats has followed from the scope condition
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gaponov, Yu.A.; Igarashi, N.; Hiraki, M.
2004-05-12
An integrated controlling system and a unified database for high throughput protein crystallography experiments have been developed. Main features of protein crystallography experiments (purification, crystallization, crystal harvesting, data collection, data processing) were integrated into the software under development. All information necessary to perform protein crystallography experiments is stored (except raw X-ray data that are stored in a central data server) in a MySQL relational database. The database contains four mutually linked hierarchical trees describing protein crystals, data collection of protein crystal and experimental data processing. A database editor was designed and developed. The editor supports basic database functions to view,more » create, modify and delete user records in the database. Two search engines were realized: direct search of necessary information in the database and object oriented search. The system is based on TCP/IP secure UNIX sockets with four predefined sending and receiving behaviors, which support communications between all connected servers and clients with remote control functions (creating and modifying data for experimental conditions, data acquisition, viewing experimental data, and performing data processing). Two secure login schemes were designed and developed: a direct method (using the developed Linux clients with secure connection) and an indirect method (using the secure SSL connection using secure X11 support from any operating system with X-terminal and SSH support). A part of the system has been implemented on a new MAD beam line, NW12, at the Photon Factory Advanced Ring for general user experiments.« less
An E-Hospital Security Architecture
NASA Astrophysics Data System (ADS)
Tian, Fang; Adams, Carlisle
In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.
A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship
Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman
2017-01-01
This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451
Surveying Indian gay men for coping skills and HIV testing patterns using the internet.
Jethwani, K S; Mishra, S V; Jethwani, P S; Sawant, N S
2014-01-01
Surveying vulnerable and incarcerated populations is often challenging. Newer methods to reach and collect sensitive information in a safe, secure, and valid manner can go a long way in addressing this unmet need. Homosexual men in India live with inadequate social support, marginalization, and lack legal recognition. These make them less reachable by public health agencies, and make them more likely to continue with high-risk behaviors, and contract human immunodeficiency virus (HIV). To understand coping skills and HIV testing patterns of homosexual men versus heterosexual men. An internet based study using a secure web platform and an anonymised questionnaire. The brief COPE Inventory was used to assess coping styles. A total of 124 respondents were studied. Homosexual men used negative coping skills such as behavioral disengagement and tested for HIV significantly more often than heterosexual men. Heterosexual respondents used positive coping skills more often. The most commonly used coping skill by heterosexual men was instrumental coping and by homosexual men was acceptance. Overall, homosexual men used negative coping mechanisms, like behavioral disengagement more often. The Indian family structure and social support is probably responsible for heterosexual men's over-reliance on instrumental coping, while resulting in disengagement in homosexuals. The lack of legal and social recognition of homosexuality has negatively impacted lives of gay men in India. This is strongly linked to harmful psychological and public health implications for HIV prevention and mental health for homosexual men.
Review of July 2013 Nuclear Security Insider Threat Exercise November 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pederson, Ann C.; Snow, Catherine L.; Townsend, Jeremy
2013-11-01
This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decisionmore » makers and management in determining the most effective policies and procedures for their country or facility.« less
Social Security and the Retirement and Savings Behavior of Low Income Households1
van der Klaauw, Wilbert; Wolpin, Kenneth I.
2011-01-01
In this paper, we develop and estimate a model of retirement and savings incorporating limited borrowing, stochastic wage offers, health status and survival, social security benefits, Medicare and employer provided health insurance coverage, and intentional bequests. The model is estimated on sample of relatively poor households from the first three waves of the Health and Retirement Study (HRS), for whom we would expect social security income to be of particular importance. The estimated model is used to simulate the responses to changes in social security rules, including changes in benefit levels, in the payroll tax, in the social security earnings tax and in early and normal retirement ages. Welfare and budget consequences are estimated. PMID:21566719
2016-09-01
vehicle idling, energy strategy, energy behavior, energy reductions, behavior change 15. NUMBER OF PAGES 79 16. PRICE CODE 17. SECURITY...INFLUENCE HUMAN BEHAVIOR AND NEGATIVELY AFFECT ENERGY CONSUMPTION IN USMC GROUND UNITS DURING OPERATIONS by John A. Peters September 2016...NEGATIVELY AFFECT ENERGY CONSUMPTION IN USMC GROUND UNITS DURING OPERATIONS 5. FUNDING NUMBERS 6. AUTHOR(S) John A. Peters 7. PERFORMING
Thibodeau, Marie-Ève; Lavoie, Francine; Hébert, Martine; Blais, Martin
2017-01-01
Previous research has shown an association between child maltreatment (sexual abuse, physical abuse, neglect or witnessing interparental violence) and adolescent sexual risk behaviors. The mechanisms explaining this association are not well understood but attachment theory could provide further insight into them. This study examined the relationships between child maltreatment and sexual risk behaviors and investigated anxious and avoidant attachment as mediators. The sample comprised 1,900 sexually active adolescents (13 to 17 years old; 60.8% girls) attending Quebec high schools. The results of path analyses indicated that neglect was associated with a higher number of sexual partners, casual sexual behavior, and being younger at first intercourse. Anxious attachment mediated the relation between neglect and number of sexual partners, whereas avoidant attachment explained the relation between neglect and number of sexual partners, casual sexual behavior, and age at first intercourse (for boys only). Sexual abuse was directly associated with all three sexual risk behaviors. Neither anxious attachment nor avoidant attachment mediated these associations. Youth with a history of neglect and sexual abuse represent a vulnerable population that is likely to engage in sexual risk behaviors. Interventions designed to induce a positive change in attachment security may reduce sexual risk behaviors among victims of neglect. PMID:28467103
The Latent Structure of Secure Base Script Knowledge
ERIC Educational Resources Information Center
Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.
2015-01-01
There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…
Lionetti, Francesca
2014-01-01
Life before adoption is characterized by the lack of sensitive and stable caregiving, putting infants at risk for non-secure attachment patterns. What leads to adoptees' attachment security in their adoptive families has not been conclusively determined. We investigated the roles of children's temperament and adoptive parents' attachment on adoptees' attachment security. The variables were studied in a sample of 30 early-placed adoptees (age at adoption placement M = 5.37 months, SD = 4.43) and their adoptive mothers and fathers. Attachment patterns were investigated by means of the Strange Situation Procedure and the Adult Attachment Interview, and temperament via the Infant Behavior Questionnaire. Results showed that mothers' secure attachment, but not fathers' attachment or adoptees' temperament, increased the chance of secure attachment in adoptees. Temperament moderated the mother-child attachment match.
NASA Astrophysics Data System (ADS)
Schutte, Klamer; Burghouts, Gertjan; van der Stap, Nanda; Westerwoudt, Victor; Bouma, Henri; Kruithof, Maarten; Baan, Jan; ten Hove, Johan-Martijn
2016-10-01
The bottleneck in situation awareness is no longer in the sensing domain but rather in the data interpretation domain, since the number of sensors is rapidly increasing and it is not affordable to increase human data-analysis capacity at the same rate. Automatic image analysis can assist a human analyst by alerting when an event of interest occurs. However, common state-of-the-art image recognition systems learn representations in high-dimensional feature spaces, which makes them less suitable to generate a user-comprehensive message. Such data-driven approaches rely on large amounts of training data, which is often not available for quite rare but high-impact incidents in the security domain. The key contribution of this paper is that we present a novel real-time system for image understanding based on generic instantaneous low-level processing components (symbols) and flexible user-definable and user-understandable combinations of these components (sentences) at a higher level for the recognition of specific relevant events in the security domain. We show that the detection of an event of interest can be enhanced by utilizing recognition of multiple short-term preparatory actions.
Neural Network Based Intrusion Detection System for Critical Infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Todd Vollmer; Ondrej Linda; Milos Manic
2009-07-01
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less
Computer-based testing: initial report of extensive use in a medical school curriculum.
Peterson, Michael W; Gordon, Joel; Elliott, Scott; Kreiter, Clarence
2004-01-01
Computer-based digital technology offers many opportunities in medical education. One type of digital technology, computer-based testing (CBT), has potentially wide application in undergraduate, graduate, and continuing medical education. This articles describes the development of CBT in an undergraduate medical curriculum. An early step in evaluating CBT is to be sure that the exam format is measuring the examinees' knowledge and not their comfort level or confidence with the technology. It is, therefore, important that the CBT reproduce or accommodate traditional test-taking behavior. CBT also provides for a number of enhancements not easily achieved with traditional paper-and-pencil exams. These include easier control and editing of exam items, better incorporation of testing into the learning environment using specific feedback, and enhancing the questions by incorporating multimedia. CBT does present some unique challenges in testing security, and this article discusses the approach to the security issues. In addition, before initiating CBT into a medical curriculum, the institution must understand the technical and infrastructure requirements for CBT. By providing a 5-year experience with CBT in the medical curriculum, this article hopes to facilitate discussions among medical educators in its appropriate application and evaluation.
Lisinskienė, Aušra
2018-01-01
Adolescent relationships with parents are of the highest importance. The relationships likely reflect the nature of internal working models in youth sport that may well function as a psychological template during the construction of youth prosocial behavior. However, researchers’ focus to date has concerned specific aspects of parental practices in child-based sporting activities. There is a lack of research covering parent-athlete interpersonal relationships concerned with how the relationships affect adolescent prosocial behavior. The purpose of this mixed methods explanatory sequential study was to examine teenage athletes’ prosocial behavior and their relationships with parents. To achieve our purpose, we obtained quantitative data from 1348 athletes and non-athletes (ages 12–16), and qualitative data from 12 adolescent athletes and 12 youth sports parents. In the quantitative phase, we assessed adolescent prosocial behavior regarding the following six forms of prosocial behavior: public, anonymous, dire, compliant, altruistic and emotional. In the qualitative follow-up, three themes emerged from the adolescent athlete’s perspective: (1) sport as an escape; (2) parent-child relationships in youth sports; (3) adolescents’ desired behavior. Three themes emerged from the parental perspective: (1) sport as protection and as a school of life; (2) painful decisions to release a child; (3) understanding adolescent behavior. We found protection from delinquent behavior and increased prosocial behavior with securely attached young athletes who are actively involved in sports. PMID:29910308
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 [Release No. 34-68071; File No. S7-08-12] RIN 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major Security-Based Swap Participants and Capital Requirements for Broker-Dealers Correction In proposed rule...
Attachment security, personality, and adjustment of elementary school children.
Goldner, Limor; Scharf, Miri
2013-01-01
Children's development is assumed to be closely related to their attachment security and their personality. The authors' aim was to examine the joint contribution of attachment security and personality traits to children's adjustment by examining diverse children's outcomes (emotional symptoms, social functioning, and behavioral problems) and using various perspectives (children, parents, and teachers). The sample comprised 247 8-12-year-old children from low socioeconomic status neighborhoods. Personality and attachment contribute to the different domains of adjustment. In cases of moderation, attachment security moderates the implications of personality traits on children's adjustment. The findings highlight the contribution of positive personality tendencies in playing down the difficulties of insecurely attached children.
Strategies for Teaching Internet Ethics.
ERIC Educational Resources Information Center
Rader, Martha H.
2002-01-01
Ten strategies for teaching Internet ethics are as follows: establish acceptable use policy; communicate ethical codes; model behaviors and values; encourage discussion of ethical issues; reinforce ethical conduct; monitor student behavior; secure systems and software; discourage surfing without supervision; monitor e-mail and websites; and…
Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness
Vollmer, Todd; Manic, Milos; Linda, Ondrej
2013-06-01
The proliferation of digital devices in a networked industrial ecosystem, along with an exponential growth in complexity and scope, has resulted in elevated security concerns and management complexity issues. This paper describes a novel architecture utilizing concepts of Autonomic computing and a SOAP based IF-MAP external communication layer to create a network security sensor. This approach simplifies integration of legacy software and supports a secure, scalable, self-managed framework. The contribution of this paper is two-fold: 1) A flexible two level communication layer based on Autonomic computing and Service Oriented Architecture is detailed and 2) Three complementary modules that dynamically reconfiguremore » in response to a changing environment are presented. One module utilizes clustering and fuzzy logic to monitor traffic for abnormal behavior. Another module passively monitors network traffic and deploys deceptive virtual network hosts. These components of the sensor system were implemented in C++ and PERL and utilize a common internal D-Bus communication mechanism. A proof of concept prototype was deployed on a mixed-use test network showing the possible real world applicability. In testing, 45 of the 46 network attached devices were recognized and 10 of the 12 emulated devices were created with specific Operating System and port configurations. Additionally the anomaly detection algorithm achieved a 99.9% recognition rate. All output from the modules were correctly distributed using the common communication structure.« less
Optimization of power systems with voltage security constraints
NASA Astrophysics Data System (ADS)
Rosehart, William Daniel
As open access market principles are applied to power systems, significant changes in their operation and control are occurring. In the new marketplace, power systems are operating under higher loading conditions as market influences demand greater attention to operating cost versus stability margins. Since stability continues to be a basic requirement in the operation of any power system, new tools are being considered to analyze the effect of stability on the operating cost of the system, so that system stability can be incorporated into the costs of operating the system. In this thesis, new optimal power flow (OPF) formulations are proposed based on multi-objective methodologies to optimize active and reactive power dispatch while maximizing voltage security in power systems. The effects of minimizing operating costs, minimizing reactive power generation and/or maximizing voltage stability margins are analyzed. Results obtained using the proposed Voltage Stability Constrained OPF formulations are compared and analyzed to suggest possible ways of costing voltage security in power systems. When considering voltage stability margins the importance of system modeling becomes critical, since it has been demonstrated, based on bifurcation analysis, that modeling can have a significant effect of the behavior of power systems, especially at high loading levels. Therefore, this thesis also examines the effects of detailed generator models and several exponential load models. Furthermore, because of its influence on voltage stability, a Static Var Compensator model is also incorporated into the optimization problems.
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
Abdalzaher, Mohamed S.; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel
2016-01-01
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs. PMID:27367700
Betrayal Trauma in Youth and Negative Communication During a Stressful Task.
Jacoby, Vanessa M; Krackow, Elisa; Scotti, Joseph R
2017-03-01
Attachment-based theories and related research illustrate that emotion regulation develops in the context of a secure relationship between a child and caregiver. When a secure bond is broken, such as in the context of betrayal trauma, children fail to develop necessary emotion regulation skills which can lead to an array of relational problems. The current study examined the relations between betrayal trauma history, type of communication during a stressful interpersonal laboratory task, and emotion regulation difficulties in a sample of trauma-exposed adolescents. Results showed that adolescents with a betrayal trauma history reported more emotion regulation difficulties and exhibited more aggressive and fewer positive communication behaviors when engaged in a stressful interpersonal task with their mothers than did adolescents exposed only to nonbetrayal trauma. Emotion regulation difficulties mediated the relation between betrayal trauma history and negative communication. The clinical and developmental implications from these findings are discussed.
Feasibility of Using Distributed Wireless Mesh Networks for Medical Emergency Response
Braunstein, Brian; Trimble, Troy; Mishra, Rajesh; Manoj, B. S.; Rao, Ramesh; Lenert, Leslie
2006-01-01
Achieving reliable, efficient data communications networks at a disaster site is a difficult task. Network paradigms, such as Wireless Mesh Network (WMN) architectures, form one exemplar for providing high-bandwidth, scalable data communication for medical emergency response activity. WMNs are created by self-organized wireless nodes that use multi-hop wireless relaying for data transfer. In this paper, we describe our experience using a mesh network architecture we developed for homeland security and medical emergency applications. We briefly discuss the architecture and present the traffic behavioral observations made by a client-server medical emergency application tested during a large-scale homeland security drill. We present our traffic measurements, describe lessons learned, and offer functional requirements (based on field testing) for practical 802.11 mesh medical emergency response networks. With certain caveats, the results suggest that 802.11 mesh networks are feasible and scalable systems for field communications in disaster settings. PMID:17238308
Uncertainty quantification and validation of combined hydrological and macroeconomic analyses.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez, Jacquelynne; Parks, Mancel Jordan; Jennings, Barbara Joan
2010-09-01
Changes in climate can lead to instabilities in physical and economic systems, particularly in regions with marginal resources. Global climate models indicate increasing global mean temperatures over the decades to come and uncertainty in the local to national impacts means perceived risks will drive planning decisions. Agent-based models provide one of the few ways to evaluate the potential changes in behavior in coupled social-physical systems and to quantify and compare risks. The current generation of climate impact analyses provides estimates of the economic cost of climate change for a limited set of climate scenarios that account for a small subsetmore » of the dynamics and uncertainties. To better understand the risk to national security, the next generation of risk assessment models must represent global stresses, population vulnerability to those stresses, and the uncertainty in population responses and outcomes that could have a significant impact on U.S. national security.« less
Becker, Ana Laura Martins M M; de Souza, Paulo Haddad; de Oliveira, Mônica Martins; Paraguay, Nestor Luiz Bruzzi B
2014-09-01
To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child. Copyright © 2014 Sociedade de Pediatria de São Paulo. Publicado por Elsevier Editora Ltda. All rights reserved.
[Relational Frame Theory--A Theoretical Framework for Contextual Behavioral Science].
Kensche, M; Schweiger, U
2015-07-01
Therapists have to deal with verbal systems and often work with verbal exchange. Therefore, a psychological theory is required, which teaches the therapist how to accomplish this task. The BRT is a theory of human language and cognition that explains how people use their verbal behavior as stimuli in their interrelations and how they act and react, based on the resulting relationships. This behavior is learned very early in the course of language acquisition and functions as a generalized operant. A prerequisite for this is the ability of people to undergo mental simulation. This enables them to construct diverse relational frameworks between individual stimuli. Without relational frameworks, people cannot function. The ability to establish a relational framework is a prerequisite for the formation of rule-governed behavior. Rule-governed behavior economizes complex decision processes, creates interpersonal security and enables dealing with events before they take place. On the other hand, the same properties that enable people to solve problems effectively can also contribute to rigid adherence to rules and experience avoidance. Relational frameworks, once established, outweigh other sources of behavioral regulation. Thus, it can become the basis of psychopathology. Poor contextual control makes it difficult for people to devote flexible, focused and voluntary attention to the present and align their actions with the immediate present. Contextual psychotherapy methods that are based on the BRT start precisely at this point: Targeted establishment of new contingencies in the therapeutic interaction through systematic strengthening of metacognitive mode and through the establishment of new rules that make possible a change in the rule-governed behavior enable undermining of dysfunctional rule-governed behavior and build up desirable behavior. This allows any therapeutic process to be more effective--regardless of the patient's expressed symptoms. © Georg Thieme Verlag KG Stuttgart · New York.
[Relational frame theory - a theoretical framework for contextual behavioral science].
Kensche, M; Schweiger, U
2015-05-01
Therapists have to deal with verbal systems and often work with verbal exchange. Therefore, a psychological theory is required, which teaches the therapist how to accomplish this task. The BRT is a theory of human language and cognition that explains how people use their verbal behavior as stimuli in their interrelations and how they act and react, based on the resulting relationships. This behavior is learned very early in the course of language acquisition and functions as a generalized operant. A prerequisite for this is the ability of people to undergo mental simulation. This enables them to construct diverse relational frameworks between individual stimuli. Without relational frameworks, people cannot function. The ability to establish a relational framework is a prerequisite for the formation of rule-governed behavior. Rule-governed behavior economizes complex decision processes, creates interpersonal security and enables dealing with events before they take place. On the other hand, the same properties that enable people to solve problems effectively can also contribute to rigid adherence to rules and experience avoidance. Relational frameworks, once established, outweigh other sources of behavioral regulation. Thus, it can become the basis of psychopathology. Poor contextual control makes it difficult for people to devote flexible, focused and voluntary attention to the present and align their actions with the immediate present. Contextual psychotherapy methods that are based on the BRT start precisely at this point: Targeted establishment of new contingencies in the therapeutic interaction through systematic strengthening of metacognitive mode and through the establishment of new rules that make possible a change in the rule-governed behavior enable undermining of dysfunctional rule-governed behavior and build up desirable behavior. This allows any therapeutic process to be more effective - regardless of the patient's expressed symptoms. © Georg Thieme Verlag KG Stuttgart · New York.
Behavioral Analysis of Physical Security Job Analyses. Volume 1.
1980-10-01
Job Analyses Personnel Reliability Program Junior Officers Physical Security Morale Motivation 20. ABSTRACT (Continue an reverese ode It neceearly and...internal motivation factors. Assignment of some auxiliary duties to enlisted personnel is possibly conducive to lowered efficiency in physical...subordinates; scheduling pressures; operational alerts and emergencies; relative lack of extrinsic rewards; constant necessity to prove credibility and
ERIC Educational Resources Information Center
Newland, Lisa A.; Coyl, Diana D.; Freeman, Harry
2008-01-01
Associations between preschoolers' attachment security, fathers' involvement (i.e. parenting behaviors and consistency) and fathering context (i.e. fathers' internal working models (IWMs) and use of social support) were examined in a subsample of 102 fathers, taken from a larger sample of 235 culturally diverse US families. The authors predicted…
Infant-Mother Attachment Security and Children's Anxiety and Aggression at First Grade
ERIC Educational Resources Information Center
Dallaire, Danielle H.; Weinraub, Marsha
2007-01-01
With a large and diverse sample of children from the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development, the role of infant-mother attachment security as a protective factor against the development of children's anxious and aggressive behaviors at first grade was examined. When child's sex,…
Links between Risk and Attachment Security: Models of Influence
ERIC Educational Resources Information Center
Raikes, H. Abigail; Thompson, Ross A.
2005-01-01
The relation between maternal behavior and child attachment security is weaker among low SES samples, but it is unclear how stressors/risks associated with low SES alter the dynamics of attachment relationships. Results of this study of 63 low income mothers and their 24-36-month-old children indicated that the influence of multiple economic risks…
Science of Security Lablet - Scalability and Usability
2014-12-16
mobile computing [19]. However, the high-level infrastructure design and our own implementation (both described throughout this paper) can easily...critical and infrastructural systems demands high levels of sophistication in the technical aspects of cybersecurity, software and hardware design...Forget, S. Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang. "Security Behavior Observatory: Infrastructure for Long-term
ERIC Educational Resources Information Center
Alegre, Albert; Benson, Mark J.; Pérez-Escoda, Núria
2014-01-01
This study examines the relation between maternal warmth and the internalizing and externalizing problems of early adolescents, and the potential mediation of this relation by emotional insecurity. The hypotheses for the study derive from Cummings and Davies' theory of emotional security. The current study extends the theory to security processes…
ERIC Educational Resources Information Center
Laible, Deborah
2006-01-01
The goal of this study was to examine whether the security of the relationship between mothers and children influenced the relation between maternal emotional expressiveness and aspects of children's social development. Fifty-one preschool children (M age = 52.80 months) and their mothers took part in the study. At their homes, mothers completed…
QuickCash: Secure Transfer Payment Systems
Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen
2017-01-01
Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties. PMID:28608846
QuickCash: Secure Transfer Payment Systems.
Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen
2017-06-13
Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users' needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.
Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young
2016-03-01
Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.
Behavioral biometrics for verification and recognition of malicious software agents
NASA Astrophysics Data System (ADS)
Yampolskiy, Roman V.; Govindaraju, Venu
2008-04-01
Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.
Attachment, Social Value Orientation, Sensation Seeking, and Bullying in Early Adolescence
Innamorati, Marco; Parolin, Laura; Tagini, Angela; Santona, Alessandra; Bosco, Andrea; De Carli, Pietro; Palmisano, Giovanni L.; Pergola, Filippo; Sarracino, Diego
2018-01-01
In this study, bullying is examined in light of the “prosocial security hypothesis”— i.e., the hypothesis that insecure attachment, with temperamental dispositions such as sensation seeking, may foster individualistic, competitive value orientations and problem behaviors. A group of 375 Italian students (53% female; Mean age = 12.58, SD = 1.08) completed anonymous questionnaires regarding attachment security, social values, sensation seeking, and bullying behaviors. Path analysis showed that attachment to mother was negatively associated with bullying of others, both directly and through the mediating role of conservative socially oriented values, while attachment to father was directly associated with victimization. Sensation seeking predicted bullying of others and victimization both directly and through the mediating role of conservative socially oriented values. Adolescents’ gender affected how attachment moderated the relationship between sensation seeking and problem behavior. PMID:29535668
Attachment, Social Value Orientation, Sensation Seeking, and Bullying in Early Adolescence.
Innamorati, Marco; Parolin, Laura; Tagini, Angela; Santona, Alessandra; Bosco, Andrea; De Carli, Pietro; Palmisano, Giovanni L; Pergola, Filippo; Sarracino, Diego
2018-01-01
In this study, bullying is examined in light of the "prosocial security hypothesis"- i.e., the hypothesis that insecure attachment, with temperamental dispositions such as sensation seeking, may foster individualistic, competitive value orientations and problem behaviors. A group of 375 Italian students (53% female; Mean age = 12.58, SD = 1.08) completed anonymous questionnaires regarding attachment security, social values, sensation seeking, and bullying behaviors. Path analysis showed that attachment to mother was negatively associated with bullying of others, both directly and through the mediating role of conservative socially oriented values, while attachment to father was directly associated with victimization. Sensation seeking predicted bullying of others and victimization both directly and through the mediating role of conservative socially oriented values. Adolescents' gender affected how attachment moderated the relationship between sensation seeking and problem behavior.
The missing link: mothers' neural response to infant cry related to infant attachment behaviors.
Laurent, Heidemarie K; Ablow, Jennifer C
2012-12-01
This study addresses a gap in the attachment literature by investigating maternal neural response to cry related to infant attachment classifications and behaviors. Twenty-two primiparous mothers and their 18-month old infants completed the Strange Situation (SS) procedure to elicit attachment behaviors. During a separate functional MRI session, mothers were exposed to their own infant's cry sound, as well as an unfamiliar infant's cry and control sound. Maternal neural response to own infant cry related to both overall attachment security and specific infant behaviors. Mothers of less secure infants maintained greater activation to their cry in left parahippocampal and amygdala regions and the right posterior insula consistent with a negative schematic response bias. Mothers of infants exhibiting more avoidant or contact maintaining behaviors during the SS showed diminished response across left prefrontal, parietal, and cerebellar areas involved in attentional processing and cognitive control. Mothers of infants exhibiting more disorganized behavior showed reduced response in bilateral temporal and subcallosal areas relevant to social cognition and emotion regulation. No differences by attachment classification were found. Implications for attachment transmission models are discussed. Copyright © 2012 Elsevier Inc. All rights reserved.
Fong, Michelle C; Measelle, Jeffrey; Conradt, Elisabeth; Ablow, Jennifer C
2017-02-01
The purpose of the current study was to predict concurrent levels of problem behaviors from young children's baseline cortisol and attachment classification, a proxy for the quality of caregiving experienced. In a sample of 58 children living at or below the federal poverty threshold, children's baseline cortisol levels, attachment classification, and problem behaviors were assessed at 17 months of age. We hypothesized that an interaction between baseline cortisol and attachment classification would predict problem behaviors above and beyond any main effects of baseline cortisol and attachment. However, based on limited prior research, we did not predict whether or not this interaction would be more consistent with diathesis-stress or differential susceptibility models. Consistent with diathesis-stress theory, the results indicated no significant differences in problem behavior levels among children with high baseline cortisol. In contrast, children with low baseline cortisol had the highest level of problem behaviors in the context of a disorganized attachment relationship. However, in the context of a secure attachment relationship, children with low baseline cortisol looked no different, with respect to problem behavior levels, then children with high cortisol levels. These findings have substantive implications for the socioemotional development of children reared in poverty. Copyright © 2017 Elsevier Inc. All rights reserved.
Provably secure identity-based identification and signature schemes from code assumptions
Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940
Provably secure identity-based identification and signature schemes from code assumptions.
Song, Bo; Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.
Caspers, Kristin M; Yucuis, Rebecca; Troutman, Beth; Spinks, Ruth
2006-01-01
Background Attachment theory allows specific predictions about the role of attachment representations in organizing behavior. Insecure attachment is hypothesized to predict maladaptive emotional regulation whereas secure attachment is hypothesized to predict adaptive emotional regulation. In this paper, we test specific hypotheses about the role of attachment representations in substance abuse/dependence and treatment participation. Based on theory, we expect divergence between levels of maladaptive functioning and adaptive methods of regulating negative emotions. Methods Participants for this study consist of a sample of adoptees participating in an ongoing longitudinal adoption study (n = 208). The Semi-Structured Assessment of the Genetics of Alcohol-II [41] was used to determine lifetime substance abuse/dependence and treatment participation. Attachment representations were derived by the Adult Attachment Interview [AAI; [16
Lewis-Morrarty, Erin; Degnan, Kathryn A.; Chronis-Tuscano, Andrea; Pine, Daniel S.; Henderson, Heather A.; Fox, Nathan A.
2014-01-01
Insecure attachment and behavioral inhibition (BI) increase risk for internalizing problems, but few longitudinal studies have examined their interaction in predicting adolescent anxiety. This study included 165 adolescents (ages 14-17 years) selected based on their reactivity to novelty at 4 months. Infant attachment was assessed with the Strange Situation. Multi-method BI assessments were conducted across childhood. Adolescents and their parents independently reported on anxiety. The interaction of attachment and BI significantly predicted adolescent anxiety symptoms, such that BI and anxiety were only associated among adolescents with histories of insecure attachment. Exploratory analyses revealed that this effect was driven by insecure-resistant attachment and that the association between BI and social anxiety was significant only for insecure males. Clinical implications are discussed. PMID:25522059
Infant differential behavioral responding to discrete emotions.
Walle, Eric A; Reschke, Peter J; Camras, Linda A; Campos, Joseph J
2017-10-01
Emotional communication regulates the behaviors of social partners. Research on individuals' responding to others' emotions typically compares responses to a single negative emotion compared with responses to a neutral or positive emotion. Furthermore, coding of such responses routinely measure surface level features of the behavior (e.g., approach vs. avoidance) rather than its underlying function (e.g., the goal of the approach or avoidant behavior). This investigation examined infants' responding to others' emotional displays across 5 discrete emotions: joy, sadness, fear, anger, and disgust. Specifically, 16-, 19-, and 24-month-old infants observed an adult communicate a discrete emotion toward a stimulus during a naturalistic interaction. Infants' responses were coded to capture the function of their behaviors (e.g., exploration, prosocial behavior, and security seeking). The results revealed a number of instances indicating that infants use different functional behaviors in response to discrete emotions. Differences in behaviors across emotions were clearest in the 24-month-old infants, though younger infants also demonstrated some differential use of behaviors in response to discrete emotions. This is the first comprehensive study to identify differences in how infants respond with goal-directed behaviors to discrete emotions. Additionally, the inclusion of a function-based coding scheme and interpersonal paradigms may be informative for future emotion research with children and adults. Possible developmental accounts for the observed behaviors and the benefits of coding techniques emphasizing the function of social behavior over their form are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-13
...; File No. 4-611] Joint Public Roundtable To Discuss Data for Swaps and Security- Based Swaps, Swap Data Repositories, Security-Based Swap Data Repositories, and Real-Time Public Reporting AGENCY: Commodity Futures... public roundtable discussion at which invited participants will discuss data for swaps and security-based...
Mello, Jennifer A.; Gans, Kim M.; Risica, Patricia M.; Kirtania, Usree; Strolla, Leslie O.; Fournier, Leanne
2010-01-01
Food insecurity has been associated with a lower nutrient intake as well as a lower intake of fruits and vegetables. However, little is known about the association of food insecurity and dietary behaviors, including food choices and preparation methods. This study examines the relationship between food insecurity and dietary behaviors of low income adults (N = 1874, 55% Hispanic) who completed the baseline telephone survey for a nutrition education study. From April 2003 to August 2004, data were collected on demographics and food security status and validated dietary measures: fruit and vegetable screener and Food Habits Questionnaire (FHQ) were used to assess fat-related behaviors (food choices or preparation methods that lead to an increase or decrease in fat intake). Chi square tests were conducted to compare each demographic variable by food security status. Univariate linear regression models examined dietary variables by food security status in univariate models initially, then in multivariable models adjusting for demographics. Half of participants reported food insecurity. FHQ scores were significantly greater in the food insecure group, reflecting a higher fat intake (P<0.05). Fruit (with juice) intake was significantly greater in the food insecure participants reflecting increased juice intake (P<0.05). Food insecure individuals reported a higher juice intake and a lower frequency of fat-lowering behaviors. Future interventions with food insecure individuals should include nutrition education as well as efforts to increase access and availability to healthier foods. Further qualitative and quantitative research is needed on the relationship between diet and food insecurity. PMID:21111099
2014-10-17
communication ), and those with â0â means no connectivity at all. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR...that two edges of the network with “1” have a crisp connectivity (and hence good communication ), and those with “0” means no connectivity at all. By...1” simply means that two edges of the network with “1” have a crisp connectivity (and hence good communication ), and those with “0” means no
R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems
NASA Technical Reports Server (NTRS)
Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.
2015-01-01
We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.
An Investigation of the Factors Related to Low Parent-Adolescent Attachment Security in Taiwan.
Chen, Chen-Jung; Sung, Huei-Chuan; Chen, Yi-Chang; Wang, Chih-Hung
2017-09-01
Adolescence may involve increases in many behavioral problems and psychosocial maladaptation. Adolescents must successfully cope with these challenges to achieve positive developmental milestones. To investigate whether low parental attachment security among adolescents in Taiwan is associated with their demographic characteristics, psychosocial maladaptation, and depression. A cross-sectional survey. A total of 335 adolescents completed the questionnaires. The Inventory of Parent and Peer Attachment, the Chinese version of the Youth Self-Report, and the Beck Depression Inventory-II were used to survey the participants. Correlation and multiple linear regressions, using low attachment security as the response variable, were used in the statistical analysis. The prevalence of Taiwanese adolescents with low parental attachment security was 38.5%. Low parental attachment security in adolescents was significantly associated with parental remarriage status and psychosocial maladaptation. By considering these risk factors, nursing educators and nurses could develop effective interventions to strengthen parent-adolescent attachment security.
Track-based event recognition in a realistic crowded environment
NASA Astrophysics Data System (ADS)
van Huis, Jasper R.; Bouma, Henri; Baan, Jan; Burghouts, Gertjan J.; Eendebak, Pieter T.; den Hollander, Richard J. M.; Dijk, Judith; van Rest, Jeroen H.
2014-10-01
Automatic detection of abnormal behavior in CCTV cameras is important to improve the security in crowded environments, such as shopping malls, airports and railway stations. This behavior can be characterized at different time scales, e.g., by small-scale subtle and obvious actions or by large-scale walking patterns and interactions between people. For example, pickpocketing can be recognized by the actual snatch (small scale), when he follows the victim, or when he interacts with an accomplice before and after the incident (longer time scale). This paper focusses on event recognition by detecting large-scale track-based patterns. Our event recognition method consists of several steps: pedestrian detection, object tracking, track-based feature computation and rule-based event classification. In the experiment, we focused on single track actions (walk, run, loiter, stop, turn) and track interactions (pass, meet, merge, split). The experiment includes a controlled setup, where 10 actors perform these actions. The method is also applied to all tracks that are generated in a crowded shopping mall in a selected time frame. The results show that most of the actions can be detected reliably (on average 90%) at a low false positive rate (1.1%), and that the interactions obtain lower detection rates (70% at 0.3% FP). This method may become one of the components that assists operators to find threatening behavior and enrich the selection of videos that are to be observed.
Influences of Preparedness Knowledge and Beliefs on Household Disaster Preparedness.
Thomas, Tracy N; Leander-Griffith, Michelle; Harp, Victoria; Cioffi, Joan P
2015-09-11
In response to concern about strengthening the nation's ability to protect its population and way of life (i.e., security) and ability to adapt and recover from emergencies (i.e., resilience), the President of the United States issued Presidential Policy Directive 8: National Preparedness (PPD-8) (1). Signed on March 30, 2011, PPD-8 is a directive for the U.S. Department of Homeland Security to coordinate a comprehensive campaign across government, private and nonprofit sectors, and individuals to build and sustain national preparedness. Despite efforts by the Federal Emergency Management Agency (FEMA) and other organizations to educate U.S. residents on becoming prepared, growth in specific preparedness behaviors, including actions taken in advance of a disaster to be better prepared to respond to and recover, has been limited (2). In 2012, only 52% of U.S. residents surveyed by FEMA reported having supplies for a disaster (2), a decline from 57% who reported having such supplies in 2009 (3). It is believed that knowledge influences behavior, and that attitudes and beliefs, which are correlated with knowledge, might also influence behavior (4). To determine the association between knowledge and beliefs and household preparedness, CDC analyzed baseline data from Ready CDC, a personal disaster preparedness intervention piloted among Atlanta- and Morgantown-based CDC staff members during 2013–2015. Compared with persons with basic preparedness knowledge, persons with advanced knowledge were more likely to have assembled an emergency kit (44% versus 17%), developed a written household disaster plan (9% versus 4%), and received county emergency alert notifications (63% versus 41%). Similarly, differences in household preparedness behaviors were correlated with beliefs about preparedness. Persons identified as having strong beliefs in the effectiveness of disaster preparedness engaged in preparedness behaviors at levels 7%–30% higher than those with weaker preparedness beliefs. Understanding the influences of knowledge and beliefs on household disaster preparedness might provide an opportunity to inform messages promoting household preparedness.
1982-05-01
SECURITY CLASSIFICATION OF THIS PAGE beo Pot 31rn0 ....... Da a ’............... .... REPORT DOCUMENTATION PAGE R"u CMTINc7Ms8UWORE OWPL27=0 TO . PORT NU...MONITORING AGENCY NAME & ADDRESS(If different from Controlling Ofice) IS. SECURITY CLASS. (of this repoft) Naval Air Systems Commnand Unclassified...ratio of about 5:1. Measurements have been made on the fin centerline FORM 17 mINo,.v,~ m.r D I 1473 EDITION OF 1No es is OBSOLETE Unclassified SECURITY
Creation of backdoors in quantum communications via laser damage
NASA Astrophysics Data System (ADS)
Makarov, Vadim; Bourgoin, Jean-Philippe; Chaiwongkhot, Poompong; Gagné, Mathieu; Jennewein, Thomas; Kaiser, Sarah; Kashyap, Raman; Legré, Matthieu; Minshull, Carter; Sajeed, Shihan
2016-09-01
Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
... 3235-AL12 Capital, Margin, and Segregation Requirements for Security-Based Swap Dealers and Major... public comment to establish capital, margin, and segregation requirements for security-based swap dealers... soliciting comment on proposed rules and rule amendments establishing capital, margin, and segregation...
Developing a Security Metrics Scorecard for Healthcare Organizations.
Elrefaey, Heba; Borycki, Elizabeth; Kushniruk, Andrea
2015-01-01
In healthcare, information security is a key aspect of protecting a patient's privacy and ensuring systems availability to support patient care. Security managers need to measure the performance of security systems and this can be achieved by using evidence-based metrics. In this paper, we describe the development of an evidence-based security metrics scorecard specific to healthcare organizations. Study participants were asked to comment on the usability and usefulness of a prototype of a security metrics scorecard that was developed based on current research in the area of general security metrics. Study findings revealed that scorecards need to be customized for the healthcare setting in order for the security information to be useful and usable in healthcare organizations. The study findings resulted in the development of a security metrics scorecard that matches the healthcare security experts' information requirements.
33 CFR 165.1102 - Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone; Naval Base Point... Guard District § 165.1102 Security Zone; Naval Base Point Loma; San Diego Bay, San Diego, CA. (a) Location. The following area is a security zone: The water adjacent to the Naval Base Point Loma, San Diego...
A Complex Systems Approach to More Resilient Multi-Layered Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Nathanael J. K.; Jones, Katherine A.; Bandlow, Alisa
In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for amore » performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (P I) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.« less
ERIC Educational Resources Information Center
Ghenai, Chaouki, Ed.
2012-01-01
Securing the future of the human race will require an improved understanding of the environment as well as of technological solutions, mindsets and behaviors in line with modes of development that the ecosphere of our planet can support. Some experts see the only solution in a global deflation of the currently unsustainable exploitation of…
ERIC Educational Resources Information Center
Roisman, Glenn I.; Fraley, R. Chris
2008-01-01
A number of relatively small-sample, genetically sensitive studies of infant attachment security have been published in the past several years that challenge the view that all psychological phenotypes are heritable and that environmental influences on child development--to the extent that they can be detected--serve to make siblings dissimilar.…
Credit BG. Northeast and northwest facades of Building 4496 (Security ...
Credit BG. Northeast and northwest facades of Building 4496 (Security Facility) as seen when looking south (178°) from entrance to secured area. The Control Tower (Building 4500) appears in background. The Security Facility is part of the secured Building 4505 complex - Edwards Air Force Base, North Base, Security Facility, Northeast of A Street, Boron, Kern County, CA
Embry, Dennis D.
2011-01-01
In March of 2009, the Institute of Medicine issued a new report on the Prevention of Mental, Emotional and Behavioral Disorders Among Young People.1 Fundamentally, the report calls for ending the rationing of prevention of mental, emotional and behavioral disorders (MEBs) among America’s children, youth and young adults. Continued rationing of access to scientifically proven prevention causes a serious threat to the country’s national security2 and to our economic competitiveness compared to 22 other rich countries.3 Such MEBs are also the leading preventable cost center for local, state and the federal governments.1, 4 These preventable MEBs cause health-care costs to continue to spiral up. The IOM Report calls for a public-health approach to MEBs—basically like how America and Canada dealt with the polio epidemic, measles, mumps, car passenger injuries to children, and accidental poisoning from medications and toxic chemicals. Why is this necessary? America’s rates of some of these mental, emotional and behavioral problems are worse than other developed countries,5, 6 and rates of some of these problems have objectively increased over the past 20-50 years in America.7 The attributes of a public-health approach for MEBs are defined in the article. The article discusses multiple examples of how public health approaches might reduce or prevent MEBs using low-cost evidence based kernels, which are fundamental units of behavior. Such kernels can be used repeatedly, which then act as “behavioral vaccines” to reduce morbidity or mortality and/or improve human wellbeing. This document calls for six key policy actions to improve mental, emotional and behavioral health in young people—with resulting wellbeing and economic competiveness of North America and reducing health-care costs. PMID:21333837
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-23
...In accordance with the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 (``Dodd-Frank Act''), the Securities and Exchange Commission (``Commission''), pursuant to the Securities Exchange Act of 1934 (``Exchange Act''), is proposing capital and margin requirements for security-based swap dealers (``SBSDs'') and major security-based swap participants (``MSBSPs''), segregation requirements for SBSDs, and notification requirements with respect to segregation for SBSDs and MSBSPs. The Commission also is proposing to increase the minimum net capital requirements for broker-dealers permitted to use the alternative internal model-based method for computing net capital (``ANC broker-dealers'').
17 CFR 41.14 - Transition period for indexes that cease being narrow-based security indexes.
Code of Federal Regulations, 2014 CFR
2014-04-01
... day tolerance provision. An index that is a narrow-based security index that becomes a broad-based... than forty-five days. An index that is a narrow-based security index that becomes a broad-based...
The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test.
Parra, Federico; Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan
2017-04-06
Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it for correlations with attachment security. The stability of the theory-consistent features across three different stimuli sets was explored using repeated measures analysis of variances (ANOVAs). In total, 46 theory-consistent correlations were found during the exploration (out of 65 total significant correlations). For example, attachment security as measured by the AAP was correlated with positive facial expressions (r=.36, P=.01). AMMI's security with the father was inversely correlated with the low frequency (LF) of HRV (r=-.87, P=.03). Attachment security to partners as measured by the AAQ was inversely correlated with anger facial expression (r=-.43, P=.001). The confirmatory analysis showed that the composite effects index was significantly correlated to security in the AAP (r=.26, P=.05) and the AAQ (r=.30, P=.04) but not in the AMMI. Repeated measures ANOVAs conducted individually on each of the theory-consistent features revealed that only 7 of the 46 (15%) features had significantly different values among responses to three different stimuli sets. We were able to validate two of the instrument's core assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Future validation of other of its dimensions, as well as the ongoing development of its scoring and classification algorithms is discussed. ©Federico Parra, Raphaële Miljkovitch, Gwenaelle Persiaux, Michelle Morales, Stefan Scherer. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.04.2017.
The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test
Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan
2017-01-01
Background Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. Objective The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Methods A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it for correlations with attachment security. The stability of the theory-consistent features across three different stimuli sets was explored using repeated measures analysis of variances (ANOVAs). Results In total, 46 theory-consistent correlations were found during the exploration (out of 65 total significant correlations). For example, attachment security as measured by the AAP was correlated with positive facial expressions (r=.36, P=.01). AMMI’s security with the father was inversely correlated with the low frequency (LF) of HRV (r=−.87, P=.03). Attachment security to partners as measured by the AAQ was inversely correlated with anger facial expression (r=−.43, P=.001). The confirmatory analysis showed that the composite effects index was significantly correlated to security in the AAP (r=.26, P=.05) and the AAQ (r=.30, P=.04) but not in the AMMI. Repeated measures ANOVAs conducted individually on each of the theory-consistent features revealed that only 7 of the 46 (15%) features had significantly different values among responses to three different stimuli sets. Conclusions We were able to validate two of the instrument’s core assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Future validation of other of its dimensions, as well as the ongoing development of its scoring and classification algorithms is discussed. PMID:28385683
Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay
Hu, Hequn; Liao, Xuewen
2017-01-01
The Internet of Things (IoT) represents a bright prospect that a variety of common appliances can connect to one another, as well as with the rest of the Internet, to vastly improve our lives. Unique communication and security challenges have been brought out by the limited hardware, low-complexity, and severe energy constraints of IoT devices. In addition, a severe spectrum scarcity problem has also been stimulated by the use of a large number of IoT devices. In this paper, cognitive IoT (CIoT) is considered where an IoT network works as the secondary system using underlay spectrum sharing. A wireless energy harvesting (EH) node is used as a relay to improve the coverage of an IoT device. However, the relay could be a potential eavesdropper to intercept the IoT device’s messages. This paper considers the problem of secure communication between the IoT device (e.g., sensor) and a destination (e.g., controller) via the wireless EH untrusted relay. Since the destination can be equipped with adequate energy supply, secure schemes based on destination-aided jamming are proposed based on power splitting (PS) and time splitting (TS) policies, called intuitive secure schemes based on PS (Int-PS), precoded secure scheme based on PS (Pre-PS), intuitive secure scheme based on TS (Int-TS) and precoded secure scheme based on TS (Pre-TS), respectively. The secure performances of the proposed schemes are evaluated through the metric of probability of successfully secure transmission (PSST), which represents the probability that the interference constraint of the primary user is satisfied and the secrecy rate is positive. PSST is analyzed for the proposed secure schemes, and the closed form expressions of PSST for Pre-PS and Pre-TS are derived and validated through simulation results. Numerical results show that the precoded secure schemes have better PSST than the intuitive secure schemes under similar power consumption. When the secure schemes based on PS and TS polices have similar PSST, the average transmit power consumption of the secure scheme based on TS is lower. The influences of power splitting and time slitting ratios are also discussed through simulations. PMID:28869540
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.
Self-Injurious Behavior in Correctional and Noncorrectional Psychiatric Patients.
ERIC Educational Resources Information Center
Hillbrand, Marc
1993-01-01
Examined prevalence and selected correlates of self-injurious behavior (SIB) among inmates (n=23) referred for treatment to maximum-security forensic hospital, non-SIB inmates (n=23), and noncorrections SIB patients (n=30). Found two distinct patterns of SIB: pattern consistent with conceptualization of SIB as expression of generalized behavioral…
Maternal Personal Resources and Children's Socioemotional and Behavioral Adjustment
ERIC Educational Resources Information Center
Al-Yagon, Michal
2008-01-01
The study examined the role of three maternal personal resources [sense of coherence (SOC), attachment style, and social/emotional feelings of loneliness] in explaining children's socioemotional adjustment (self-rated loneliness and SOC, and mother-rated child behavior) and children's (self-rated) secure attachment. The sample included 58…
A Leadership Behavior Study of African American Middle School Principals in South Carolina
ERIC Educational Resources Information Center
Dean, Mark D.
2009-01-01
An era of high stakes accountability has expanded the necessity for school districts to secure principals with leadership behaviors that encourage successful academic performance. School leaders are sought to deliver practices that guide and empower entire school communities through unprecedented times of educational change. Research studies…
Genetic and attachment influences on adolescents' regulation of autonomy and aggressiveness.
Zimmermann, Peter; Mohr, Cornelia; Spangler, Gottfried
2009-11-01
Adolescence is a time when intense emotions are elicited within the parent-adolescent relationship, often when autonomy subjectively is endangered. As emotion dysregulation is one of the risk processes for the development of psychopathology, adolescence may be perceived as a highly sensitive period for maladjustment. Inter-individual differences in emotionality and emotion regulation have been shown to be influenced or moderated by molecular genetic differences in the serotonin transporter gene (5-HTT) and by attachment patterns. We investigated whether both the 5-HTT and attachment are associated with emotionality and emotion regulation in an observed adolescent-mother interaction and the personality traits aggressiveness and anxiety in adolescence. Ninety-one adolescents at age 12 were observed in interaction with their mothers during a standardized emotion-eliciting social task to assess emotionality and emotion regulation in relation to autonomy. Adolescents' aggressiveness and anxiety were assessed by mother report. Concurrent attachment quality was determined by an attachment interview. DNA samples were collected in order to assess the 5-HTTLPR, a repeat polymorphism in the promoter region of the serotonin transporter gene. While the short allele of the serotonin transporter gene was associated with a higher overall rate of autonomy behaviors, attachment security was related to more agreeable and less hostile autonomy. A significant interaction revealed a moderating effect of attachment security. Carriers of the short version of the 5-HTTLPR showed more agreeable autonomy when they had a secure attachment behavior strategy but showed more hostile autonomy when they were insecurely attached. Carriers of the short version of the 5-HTTLPR and insecurely attached adolescents were rated as more aggressive. The study suggests a gene-attachment interaction in adolescents where the adolescent's attachment status moderates a genetically based higher negative reactivity in response to threats to autonomy in social interactions.
Kanzler, Kathryn E; Robinson, Patricia J; McGeary, Donald D; Mintz, Jim; Potter, Jennifer Sharpe; Muñante, Mariana; Lopez, Eliot J; Dougherty, Donald M; Hale, Willie J; Velligan, Dawn I
2018-03-01
Most of the 100 million Americans with persistent pain are treated in primary care clinics, but evidence-based psychosocial approaches targeting pain-related disability are not usually provided in these settings. This manuscript describes the rationale and methods for a protocol to pilot test the feasibility and effectiveness of Acceptance and Commitment Therapy (ACT), an evidence-based psychological treatment for persistent pain, delivered by a Behavioral Health Consultant in primary care. Eligible patients are identified through electronic health record registries and invited to participate via secure messaging, letters and a follow-up phone call. Participants are also recruited with advertising and clinician referral. Patients agreeing to participate are consented and complete initial assessments, with a target of 60 participants. Randomization is stratified based on pain severity with participants assigned to either ACT or Enhanced Treatment as Usual (E-TAU). ACT participants receive one standardized Behavioral Health Consultation visit followed by three ACT-based group visits and one group booster visit. All patients attend six assessment visits, during which the E-TAU patients are provided with educational pain management handouts based on standard cognitive behavioral treatment of pain. The study aims to determine feasibility and effectiveness of brief ACT for persistent pain delivered by an integrated behavioral health clinician in primary care from pre- to post-treatment, and to examine mechanisms of change in ACT participants. This study, in a "real-world" setting, will lay groundwork for a larger trial. If effective, it could improve treatment methods and quality of life for patients with persistent pain using a scalable approach. Copyright © 2018 Elsevier Inc. All rights reserved.
Pedestrian and traffic safety in parking lots at SNL/NM : audit background report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanchez, Paul Ernest
2009-03-01
This report supplements audit 2008-E-0009, conducted by the ES&H, Quality, Safeguards & Security Audits Department, 12870, during fall and winter of FY 2008. The study evaluates slips, trips and falls, the leading cause of reportable injuries at Sandia. In 2007, almost half of over 100 of such incidents occurred in parking lots. During the course of the audit, over 5000 observations were collected in 10 parking lots across SNL/NM. Based on benchmarks and trends of pedestrian behavior, the report proposes pedestrian-friendly features and attributes to improve pedestrian safety in parking lots. Less safe pedestrian behavior is associated with older parkingmore » lots lacking pedestrian-friendly features and attributes, like those for buildings 823, 887 and 811. Conversely, safer pedestrian behavior is associated with newer parking lots that have designated walkways, intra-lot walkways and sidewalks. Observations also revealed that motorists are in widespread noncompliance with parking lot speed limits and stop signs and markers.« less
Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.
2017-01-01
Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626
Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A
2017-01-01
The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.
Garcia Quiroga, Manuela; Hamilton-Giachritsis, Catherine; Ibañez Fanés, Margarita
2017-08-01
Attachment has been assessed in children living in alternative care (AC) settings, such as Residential Homes (RC) and Foster Care (FC). However, no study has been conducted to compare attachment styles in residential, foster and parental care conducted as usual in the same country at the same point in time. There is also a lack of studies conducted in less developed countries. Therefore, the aim of this study was to compare outcomes for children living in three different types of care in Chile. Three groups of children (N=77), living in (RC), (FC) and with biological parents (PC) were compared. Attachment styles, Indiscriminate Friendliness (IF) and socio-emotional/behavioral difficulties were assessed. Higher rates of secure attachment were observed in the RC group (36.1%) when compared to studies in RC in other countries (mean 18%). However, children in both types of AC were significantly more likely to have insecure and/or disorganized attachment styles than PC children. Higher rates of socio-emotional and behavioral problems were observed in RC (55.6%) and FC (50%) compared to PC (10%). Within type of AC, no significant differences were found, for attachment styles or for socio-emotional/behavioral difficulties, the only difference were the levels of IF, with children in RC having higher levels. As a conclusion, impact of placement in AC can vary between different countries, other factors, rather than only type of AC could better explain differences in attachment security for children. Implications for research and practices are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Zhang, Wei; Wang, Jun
2018-05-01
A novel nonlinear stochastic interacting price dynamics is proposed and investigated by the bond percolation on Sierpinski gasket fractal-like lattice, aim to make a new approach to reproduce and study the complexity dynamics of real security markets. Fractal-like lattices correspond to finite graphs with vertices and edges, which are similar to fractals, and Sierpinski gasket is a well-known example of fractals. Fractional ordinal array entropy and fractional ordinal array complexity are introduced to analyze the complexity behaviors of financial signals. To deeper comprehend the fluctuation characteristics of the stochastic price evolution, the complexity analysis of random logarithmic returns and volatility are preformed, including power-law distribution, fractional sample entropy and fractional ordinal array complexity. For further verifying the rationality and validity of the developed stochastic price evolution, the actual security market dataset are also studied with the same statistical methods for comparison. The empirical results show that this stochastic price dynamics can reconstruct complexity behaviors of the actual security markets to some extent.
Differentiating Between Attachment Styles and Behaviors and their Association with Marital Quality.
Sandberg, Jonathan G; Bradford, Angela B; Brown, Andrew P
2017-06-01
The purpose of this study was to distinguish between the influence of attachment styles and behaviors on marital quality for couples. Data were gathered from 680 couples in a married relationship. Results showed attachment style and behaviors predicted marital quality for both men and women, with higher levels of attachment related to greater quality. Attachment behaviors predicted more of the variance in quality than did styles. Specific implications regarding how therapists may wish to foster behaviors that promote attachment security in marriages are discussed. © 2015 Family Process Institute.
From Pressure to Path: Barometer-based Vehicle Tracking
Ho, Bo-Jhang; Martin, Paul; Swaminathan, Prashanth; Srivastava, Mani
2017-01-01
Pervasive mobile devices have enabled countless context-and location-based applications that facilitate navigation, life-logging, and more. As we build the next generation of smart cities, it is important to leverage the rich sensing modalities that these numerous devices have to offer. This work demonstrates how mobile devices can be used to accurately track driving patterns based solely on pressure data collected from the device’s barometer. Specifically, by correlating pressure time-series data against topographic elevation data and road maps for a given region, a centralized computer can estimate the likely paths through which individual users have driven, providing an exceptionally low-power method for measuring driving patterns of a given individual or for analyzing group behavior across multiple users. This work also brings to bear a more nefarious side effect of pressure-based path estimation: a mobile application can, without consent and without notifying the user, use pressure data to accurately detect an individual’s driving behavior, compromising both user privacy and security. We further analyze the ability to predict driving trajectories in terms of the variance in barometer pressure and geographical elevation, demonstrating cases in which more than 80% of paths can be accurately predicted. PMID:29503981
From Pressure to Path: Barometer-based Vehicle Tracking.
Ho, Bo-Jhang; Martin, Paul; Swaminathan, Prashanth; Srivastava, Mani
2015-11-01
Pervasive mobile devices have enabled countless context-and location-based applications that facilitate navigation, life-logging, and more. As we build the next generation of smart cities, it is important to leverage the rich sensing modalities that these numerous devices have to offer. This work demonstrates how mobile devices can be used to accurately track driving patterns based solely on pressure data collected from the device's barometer. Specifically, by correlating pressure time-series data against topographic elevation data and road maps for a given region, a centralized computer can estimate the likely paths through which individual users have driven, providing an exceptionally low-power method for measuring driving patterns of a given individual or for analyzing group behavior across multiple users. This work also brings to bear a more nefarious side effect of pressure-based path estimation: a mobile application can, without consent and without notifying the user, use pressure data to accurately detect an individual's driving behavior, compromising both user privacy and security. We further analyze the ability to predict driving trajectories in terms of the variance in barometer pressure and geographical elevation, demonstrating cases in which more than 80% of paths can be accurately predicted.
Altınoğlu Dikmeer, Ilkiz; Erol, Neşe; Gençöz, Tülin
2014-01-01
This study aimed to investigate and compare emotional and behavioral problems in Turkish adoptees and non-adopted peers raised by their biological parents. The study included 61 adopted children (34 female and 27 male) aged 6-18 years and 62 age- and gender-matched non-adopted children (35 female and 27 male). Parents rated their children's problem behaviors using the Child Behavior Checklist/6-18, temperament characteristics using the School Age Temperament Inventory, their own personality traits using the Basic Personality Traits Inventory, and their parenting styles using the Measure of Child Rearing Styles. Children rated their parents' availability and reliability as attachment figures using the Kerns Security Scale and parenting styles using the Measure of Child Rearing Styles. Adolescents aged 11-18 years self-rated their problem behaviors using the Youth Self Report. Group differences and correlations were analyzed. There were non-significant differences in all scale scores between the adopted and non-adopted groups. In contrast to the literature, age of the children at the time of adoption was not associated with problem behaviors or attachment relationships. On the other hand, the findings indicate that as the age at which the children learned that they had been adopted increased emotional and behavioral problems increased. Adoption alone could not explain the problem behaviors observed in the adopted children; the observed problem behaviors should be considered within the context of the developmental process.
17 CFR 1.8 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... swaps, security-based swaps, and mixed swaps. 1.8 Section 1.8 Commodity and Securities Exchanges... Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In general. Any person may... Exchange Act and the rules and regulations promulgated thereunder; or (3) A mixed swap, as that term is...
17 CFR 1.8 - Requests for interpretation of swaps, security-based swaps, and mixed swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... swaps, security-based swaps, and mixed swaps. 1.8 Section 1.8 Commodity and Securities Exchanges... Requests for interpretation of swaps, security-based swaps, and mixed swaps. (a) In general. Any person may... Exchange Act and the rules and regulations promulgated thereunder; or (3) A mixed swap, as that term is...
Code of Federal Regulations, 2010 CFR
2010-04-01
... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...
Code of Federal Regulations, 2011 CFR
2011-04-01
... as a national securities exchange or exemption from registration based on limited volume. 240.6a-1... national securities exchange or exemption from registration based on limited volume. (a) An application for registration as a national securities exchange, or for exemption from such registration based on limited volume...
A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
NASA Astrophysics Data System (ADS)
Saito, Takamichi
Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).
System and method for key generation in security tokens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.
Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).
Food Insecurity and Eating Behavior Relationships Among Congregate Meal Participants in Georgia.
Myles, TaMara; Porter Starr, Kathryn N; Johnson, Kristen B; Sun Lee, Jung; Fischer, Joan G; Ann Johnson, Mary
2016-01-01
This study explored relationships of food insecurity with cognitive restraint, uncontrolled eating, and emotional eating behaviors among congregate meal participants in northeast Georgia [n = 118 years, age 60 years and older, mean (SD) age = 75 ( 8 ) years, 75% female, 43% Black, 53% obese (Body Mass Index ≥ 30)]. Food insecurity was assessed with a 6-item questionnaire. Scores ranged from 0 to 6 and were defined as high or marginal food security, FS, 0-1 (70%); low food security, LFS, 2-4 (20%); very low food security, VLFS, 5-6 (10%); and low and very low food security, LVLFS, 2-6 (30%). Eating behavior was assessed with an 18-item Three-Factor Eating Questionnaire R-18. In bivariate analyses food insecurity was consistently associated with cognitive restraint scores above the median split and to a lesser extent with uncontrolled eating scores (p ≤ 0.05). No association was found between emotional eating and food insecurity. In multivariate linear and logistic regression analyses, food insecurity was consistently associated with cognitive restraint (p ≤ 0.05) even when controlled for potential confounders (demographics, Body Mass Index, and chronic diseases). Food insecurity was also associated with uncontrolled eating (p ≤ 0.05), but the relationship was attenuated when controlled for potential confounding variables. Although cognitive restraint is defined as the conscious restriction of food intake to control body weight or promote weight loss, these findings suggest there may be other dimensions of cognitive restraint to consider in nutritional assessment and interventions among food-insecure older adults.
Nemati, Farshad; Whishaw, Ian Q
2007-08-22
The exploratory behavior of rats on an open field is organized in that animals spend disproportionate amounts of time at certain locations, termed home bases, which serve as centers for excursions. Although home bases are preferentially formed near distinctive cues, including visual cues, animals also visit and pause and move slowly, or linger, at many other locations in a test environment. In order to further examine the organization of exploratory behavior, the present study examined the influence of the point of entry on animals placed on an open field table that was illuminated either by room light or infrared light (a wavelength in which they cannot see) and near which, or on which, distinctive cues were placed. The main findings were that in both room light and infrared light tests, rats visited and lingered at the point of entry significantly more often than comparative control locations. Although the rats also visited and lingered in the vicinity of salient visual cues, the point of entry still remained a focus of visits. Finally, the preference for the point of entry increased as a function of salience of the cues marking that location. That the point of entry influences the organization of exploratory behavior is discussed in relation to the idea that the exploratory behavior of the rat is directed toward optimizing security as well as forming a spatial representation of the environment.
Cyber Culture and Personnel Security: Report 2 - Ethnographic Analysis of Second Life
2011-07-01
respondents reported experiencing highly stressful events during their early childhood , albeit to varying degrees. These events included divorce ...adjudication, and continuous evaluation phases. Moreover, personnel’s activities in the cyber world may negatively affect their judgment, day-to-day...described below: Behaviors That Can be Used to Negatively Influence Personnel A core concern for personnel security is that individuals might become
Increasing the security at vital infrastructures: automated detection of deviant behaviors
NASA Astrophysics Data System (ADS)
Burghouts, Gertjan J.; den Hollander, Richard; Schutte, Klamer; Marck, Jan-Willem; Landsmeer, Sander; den Breejen, Eric
2011-06-01
This paper discusses the decomposition of hostile intentions into abnormal behaviors. A list of such behaviors has been compiled for the specific case of public transport. Some of the deviant behaviors are hard to observe by people, as they are in the midst of the crowd. Examples are deviant walking patterns, prohibited actions such as taking photos and waiting without taking the train. We discuss our visual analytics algorithms and demonstrate them on CCTV footage from the Amsterdam train station.
The effects of prompting and reinforcement on safe behavior of bicycle and motorcycle riders.
Okinaka, Takeru; Shimazaki, Tsuneo
2011-01-01
A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was effective at increasing safe behavior exhibited by bicycle and motorcycle riders. No differences were observed between vehicle type or gender with regard to engagement in safe behavior.
Ferrie, J E; Shipley, M J; Marmot, M G; Stansfeld, S A; Smith, G D
1998-07-01
This study examined changes in the health status of civil servants whose employment security was threatened. Data were derived from a longitudinal cohort of 10,308 men and women, office staff in 20 British civil service departments. Physiological measurements, self-reported morbidity, and health-related behaviors for 530 members of the department under threat were compared with those of 19 other departments, during the period of uncertainty and during stable employment 5 years earlier. From a position of advantage or no difference at baseline, self-reported morbidity and physiological risk factors tended to increase among respondents from the threatened department compared with those from other departments. For both sexes, increases were significant for body mass index (P < .001) and sleeping 9 or more hours (odds ratio [OR] = 1.88; 95% confidence interval [CI] = 1.3, 2.8; P < .01); modest but significant increases were seen in ischemia (OR = 1.45; 95% CI = 1.0, 2.1) and cholesterol concentration (0.08 mmol/L; 95% CI = 0.01, 0.14). Among women only, a significant relative increase in blood pressure (P < .01) was recorded. Over the same period health-related behaviors changed little. Threats to employment security have adverse consequences for health status that are unexplained by health selection or health-related behaviors.
Middle Eastern Energy Security: Synchronizing Domestic and Foreign Policy
2009-05-18
Reversing profligacy is largely an undertaking to change consumer behavior that will reduce demand and therefore dependence on oil. It will have the...transportation technology and associated goods and services. One of the most powerful catalysts for change in America is consumer behavior . As such...and reducing consumption run the risk of failure because changing consumer behavior and long-standing cultural norms will face stiff resistance in the
2010-12-01
U.S. Army Research Institute for the Behavioral and Social Sciences Research Report 1934 Augmented performance...release; distribution is unlimited. U.S. Army Research Institute for the Behavioral and Social Sciences Department of the Army Deputy...distribution of reports to: U.S. Army Research Institute for the Behavioral and Social Sciences, Attn: DAPE-ARI-ZXM, 2511 Jefferson Davis Highway, Arlington
Behavioral Indicators of Drug Carrying in Open Spaces
2015-04-30
approached by that patrol. The findings of Phase I was documented in three reports. These reports include: 1) Behavioral Indicators of Illegal and Legal ...not focus solely on persons carrying firearms or drugs because there are jurisdiction-specific legal and use-of-force elements which dictate the...to develop training for law enforcement and security personnel to utilize behavioral indicators in a safe, legal , and effective manner. Training
Diminishing self-disclosure to maintain security in partners' care.
Lemay, Edward P; Melville, Michael C
2014-01-01
Six studies demonstrate that perceivers' desire to bond with targets motivates perceivers to misconstrue their own self-disclosure in ways that maintain perceivers' security in targets' care and commitment. Perceivers who strongly valued relationships with targets reported high levels of global self-disclosure, consistent with many findings suggesting salutary effects of disclosure. However, these same perceivers reported low self-disclosure of needs and desires in hypothetical (Study 1) and actual (Study 2) situations characterized by targets' unresponsive behavior. Similarly, in daily report (Study 3) and behavioral observation (Study 4) studies, perceivers who valued relationships with targets perceived high levels of self-disclosure when targets were responsive, but they perceived low self-disclosure when targets were unresponsive, and these perceptions seemed partly illusory. In turn, these perceptions of low self-disclosure in situations characterized by partners' unresponsive behavior predicted decreased perceptions of diagnosticity of targets' behavior (Studies 1-3) and buffered the negative affective and interpersonal effects of unresponsive behavior (Study 4). Experimental manipulations (Studies 5 and 6) demonstrated the motivational nature of perceived self-disclosure. Collectively, the results suggest that a desire to bond with targets motivates perceivers to downplay the diagnosticity of targets' unresponsive behavior through diminishing their self-disclosure, in turn preserving perceivers' trust in targets' care and commitment.
Health-protective effects of attachment among African American girls in psychiatric care.
Emerson, Erin; Donenberg, Geri R; Wilson, Helen W
2012-02-01
African American girls in psychiatric care are at increased risk for HIV and sexually transmitted infection (STI) through sexual risk taking. Adolescent sexual behavior often reflects peer norms and behavior. Secure attachment patterns with mothers and peers might lessen the effects of negative peer influences and reduce sexual risk taking among African American girls. This study examined the relationships among mother-daughter and peer attachment, peer norms, and sexual-risk behaviors in African American girls seeking outpatient psychiatric care. A group of 12-16-year-old African American girls (N = 262; M age = 14.45 years) reported on their attachment to their mothers and peers, peer risk-taking and dating behaviors, peer pressure, and sexual-risk behaviors (e.g., number of partners, high-risk partners, and condom use). Structural equation modeling examined whether peer attachment and peer norms mediated the relationship between mother attachment and sexual risk. Findings supported peer norms, but not peer attachment, as a mediator of mother attachment and girls' sexual-risk behaviors. Findings revealed important family and peer factors for African American girls in psychiatric care. HIV prevention programs may be strengthened by improving mother-daughter relationships, addressing the importance of peer relationships, and emphasizing how secure mother-daughter relationships can temper the impact of peer norms.
NASA Astrophysics Data System (ADS)
Suryanto, D. A.; Adisasmita, S. A.; Hamid, S.; Hustim, M.
2018-04-01
Currently, Train passanger safety measures are more predominantly measurable using negative dimensions in user mode behavior, such as accident rate, accident intensity and accident impact. This condition suggests that safety improvements aim only to reduce accidents. Therefore, this study aims to measure the safety level of light train transit modes (KRL) through the dimensions of traveling safety on commuters based on positive safety indicators with severel condition departure times and returns for work purposes and long trip rates above KRL. The primary survey were used in data collection methods. Structural Equation Modeling (SEM) were used in data analysis. The results show that there are different models of the safety level of departure and return journey. The highest difference is in the security dimension which is the internal variable of KRL users.
Secure Base Narrative Representations and Intimate Partner Violence: A Dyadic Perspective
Karakurt, Gunnur; Silver, Kristin E.; Keiley, Margaret K.
2015-01-01
This study aimed to understand the relationship between secure base phenomena and dating violence among couples. Within a relationship, a secure base can be defined as a balancing act of proximity-seeking and exploration at various times and contexts with the assurance of a caregiver’s availability and responsiveness in emotionally distressing situations. Participants were 87 heterosexual couples. The Actor-Partner Interdependence Model was used to examine the relationship between each partner’s scores on secure base representational knowledge and intimate partner violence. Findings demonstrated that women’s secure base representational knowledge had a significant direct negative effect on the victimization of both men and women, while men’s secure base representational knowledge did not have any significant partner or actor effects. Therefore, findings suggest that women with insecure attachments may be more vulnerable to being both the victims and the perpetrators of PMID:27445432
Ewing, E Stephanie Krauthamer; Diamond, Guy; Levy, Suzanne
2015-01-01
Attachment-Based Family Therapy (ABFT) is a manualized family-based intervention designed for working with depressed adolescents, including those at risk for suicide, and their families. It is an empirically informed and supported treatment. ABFT has its theoretical underpinnings in attachment theory and clinical roots in structural family therapy and emotion focused therapies. ABFT relies on a transactional model that aims to transform the quality of adolescent-parent attachment, as a means of providing the adolescent with a more secure relationship that can support them during challenging times generally, and the crises related to suicidal thinking and behavior, specifically. This article reviews: (1) the theoretical foundations of ABFT (attachment theory, models of emotional development); (2) the ABFT clinical model, including training and supervision factors; and (3) empirical support.
Aviation Security: Biometric Technology and Risk Based Security Aviation Passenger Screening Program
2012-12-01
distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words ) Since 9/11, the Transportation Security Administration (TSA...Council POE Point Of Entry RBS Risk-Based Security SENTRI Secure Electronic Network for Travelers Rapid Inspection SFPD Secure Flight Passenger...Committee on Biometrics provides the origins of biometrics; the term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure