1,996,158 research outputs found
Career maturity of college seniors as a function of gender, sex-role identification, and choice of major
Development of identity was examined as reflected in the ability to establish and clarify purpose and develop academic autonomy, combined as Career Maturity. Each variable was related to gender sex-role identification (androgynous, masculine-identified, feminine-identified, and undifferentiated), choice of major (male-dominated, female-dominated), and sex-appropriateness of major (sex-appropriate, sex-inappropriate);Three-hundred-ninety-six seniors completed the BEM Sex Role Inventory and the Student Developmental Task and Lifestyle Inventory. Students were enrolled in engineering and business (male-dominated), or education and family and consumer sciences (female-dominated);Students clustered in majors that were sex-appropriate for them. Females in sex-appropriate majors described themselves as more feminine than females in sex-inappropriate majors. Masculinity did not differ for males by sex-appropriateness of major;Seniors were evenly represented in the four sex-role identification categories. Students in male-dominated majors were primarily masculine-identified and undifferentiated, whereas students in female-dominated majors were primarily androgynous and feminine-identified;The masculine-identified group scored higher than the undifferentiated group on all three career maturity variables. For Establishing and Clarifying Purpose the androgynous group scored higher than undifferentiated, feminine-identified, and masculine-identified groups. On Career Maturity the androgynous group scored higher than undifferentiated and feminine-identified groups;Students in female-dominated majors did not differ from those in male-dominated majors on Academic Autonomy, but they did show more evidence of Establishing and Clarifying Purpose and thus Career Maturity;Students in sex-appropriate majors did not differ overall from students in sex-inappropriate majors. The interaction between gender and sex-appropriateness of major was significant for Establishing and Clarifying Purpose and thus, Career Maturity. Women were more likely to have established purpose and achieved academic autonomy than males overall. Women in sex-appropriate majors and women and men in sex-inappropriate majors were similar to each other. Men in sex-appropriate majors scored lowest;Students in the four sex-role identity categories did not differ in their interest in going to graduate school, nor was there a difference based on sex-appropriateness of major
Provenance Threat Modeling
Provenance systems are used to capture history metadata, applications include
ownership attribution and determining the quality of a particular data set.
Provenance systems are also used for debugging, process improvement,
understanding data proof of ownership, certification of validity, etc. The
provenance of data includes information about the processes and source data
that leads to the current representation. In this paper we study the security
risks provenance systems might be exposed to and recommend security solutions
to better protect the provenance information.Comment: 4 pages, 1 figure, conferenc
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape
One year ago, Russia invaded Ukraine. Since then, tens of thousands of people have been killed, millions of Ukrainians have fled and the country has sustained tens of billions of dollars worth of damage. Importantly, this marks the first time that cyber operations have played such a prominent role in a world conflict.
Since the war began, governments, companies, civil society groups, and countless others have been working around the clock to support the Ukrainian people and their institutions. At Google, we support these efforts and continue to announce new commitments and support to Ukraine. This includes a donation of 50,000 Google Workspace licenses for the Ukrainian government and a rapid Air Raid Alerts system for Android phones in Ukraine, support for refugees, businesses, and entrepreneurs, and measures to indefinitely pause monetization and significantly limit recommendations globally for a number of Russian state news media across our platforms. One of the most pressing challenges, however, is that the Ukrainian government is under nearconstant digital attack. That’s why one of our most important contributions to date has been our ongoing work to provide cybersecurity assistance to Ukraine. Shortly after the invasion, for example, we expanded eligibility for Project Shield, our free protection against distributed denial of service attacks (DDoS), so that Ukrainian government websites and embassies worldwide could stay online and continue to offer their critical services. We continue to provide direct assistance to the Ukrainian government and critical infrastructure entities under the Cyber Defense Assistance Collaborative — including compromise assessments, incident response services, shared cyber threat intelligence, and security transformation services — to help the Ukrainian government detect, mitigate, and defend against cyber attacks. In addition, we continue to implement protections for users and track and disrupt cyber threats to help raise awareness among the security community and high risk users and maintain information quality. This level of collective defense — between governments, companies, and security stakeholders across the world — is unprecedented in scope. It is important then to pause and reflect on this work and our learnings one year later, and share those with the global security community to help prepare better defenses for the future. This report outlines our analysis of these issues and includes the following three observations, informed by over two decades of experience managing complex global security events
Stereotype Threat, Self-Affirmation, and Women\u27s Statistics Performance
Stereotype threat (fear of confirming a negative group stereotype that in turn can inhibit academic performance) has been implicated in the gender gap observed in the field of mathematics. Even though stereotype threat depresses women\u27s performance, there has been much research reporting various interventions that ameliorate its negative effects. The current study investigated stereotype threat specifically in statistics--an unexplored area in the research literature --and the alleviating effects of self-affirmation. Participants in three conditions (control, stereotype threat, stereotype threat + affirmation) completed a statistics test. In both stereotype threat conditions participants were given a verbal prime to induce stereotype threat, but only the stereotype threat + affirmation condition was given the affirmation task. The predictions that stereotype threat would depress women\u27s statistics performance and that self-affirmation would minimize stereotype threat were not supported. How a performance expectation relates to a successful stereotype threat prime was discussed as are study limitations and directions for future research
Internal and external threat in relationship with right-wing attitudes
Objective
Previous studies on the relationship between threat and right-wing attitudes have tended to focus on either internal threat, emanating from one's private life, or external threat, originating from society. However, these studies failed to examine whether these types of threats constitute two distinctive dimensions and which of these threats is most closely related to right-wing attitudes.
Method
In order to explore the dimensions underlying threat, a factor analysis on a variety of threat scales was conducted (Study 1; N?=?300). Furthermore, in a meta-analysis (Study 2; total N?=?22,086) and a questionnaire study in a large representative sample (Study 3, N?=?800) the strength of the relationships of internal and external threat with right-wing attitudes were investigated.
Results
The present studies revealed that internal and external threat can be considered as two distinct dimensions underlying threat. Moreover, whereas external threat yielded strong relationships with right-wing attitudes, internal threat only explained a minor part of the variance in these attitudes.
Conclusions
External rather than internal threat underlies the relationship between threat and right-wing attitudes
A limited skeptical threat
Doris argues that our choices are heavily influenced by forces that we wouldn’t count as genuine reasons. This unsettling conclusion is motivated by a debunking argument so wide-ranging that it isn’t foisted upon us by the sciences. Doris sometimes seems to lower his ambitions when offering instead a skeptical hypothesis argument, but that conflicts with his aims in the book
- …