30,109 research outputs found

    How to recognise a kick : A cognitive task analysis of drillers’ situation awareness during well operations

    Get PDF
    Acknowledgements This article is based on a doctoral research project of the first author which was sponsored by an international drilling rig operator. The views presented are those of the authors and should not be taken to represent the position or policy of the sponsor. The authors wish to thank the industrial supervisor and the drilling experts for their contribution and patience, as well as Aberdeen Drilling School for allowing the first author to attend one of their well control courses.Peer reviewedPostprin

    Rett Syndrome

    Get PDF
    Rett syndrome is a thief! It robs little girls of their projected life. It lulls their families into a false sense of security while their little girls develop normally for 6 to 18 months. Then it insidiously robs them of their skills and abilities until they are trapped in a body that won't respond. These little girls are called "silent angels" (Hunter, 2007). Rett syndrome (RS) was originally identified in 1966 by the Austrian neurologist Andreas Rett, but his research and findings were written in an obscure form of the German language the medical world could not and did not translate. It wasn't until 1983, that Rett syndrome was re-identified and labeled as its own disorder (Hunter, 2007). The Rett Syndrome Research Foundation (2006) summarizes the condition best with: Rett syndrome is a debilitating neurological disorder diagnosed almost exclusively in females. Children with Rett syndrome appear to develop normally until 6 to 18 months of age when they enter a period of regression, losing speech and motor skills. Most develop repetitive hand movements, irregular breathing patterns, seizures and extreme motor control problems. Rett syndrome leaves its victims profoundly disabled, requiring maximum assistance with every aspect of daily living. There is no cure. (Retrieved October 14, 2008 from http://www.rsrf.org/about_rett_syndrome/) Research is ever going to regards to Rett syndrome. What is known as of now is that Rett syndrome is caused by a mutation of the gene MECP2. It is not passed down in families and it knows no ethnic boundaries. The majority of Rett girls live to adulthood (RSRF, 2006). The male child doesn't usually survive birth with Rett syndrome

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем

    Intellectual autonomy, epistemic dependence and cognitive enhancement

    Get PDF
    Intellectual autonomy has long been identified as an epistemic virtue, one that has been championed influentially by (among others) Kant, Hume and Emerson. Manifesting intellectual autonomy, at least, in a virtuous way, does not require that we form our beliefs in cognitive isolation. Rather, as Roberts and Wood (Intellectual virtues: an essay in regulative epistemology, OUP Oxford, Oxford, pp. 259–260, 2007) note, intellectually virtuous autonomy involves reliance and outsourcing (e.g., on other individuals, technology, medicine, etc.) to an appropriate extent, while at the same time maintaining intellectual self-direction. In this essay, I want to investigate the ramifications for intellectual autonomy of a particular kind of epistemic dependence: cognitive enhancement. Cognitive enhancements (as opposed to therapeutic cognitive improvements) involve the use of technology and medicine to improve cognitive capacities in healthy individuals, through mechanisms ranging from smart drugs to brain-computer interfaces. With reference to case studies in bioethics, as well as the philosophy of mind and cognitive science, it is shown that epistemic dependence, in this extreme form, poses a prima facie threat to the retention of intellectual autonomy, specifically, by threatening to undermine our intellectual self-direction. My aim will be to show why certain kinds of cognitive enhancements are subject to this objection from self-direction, while others are not. Once this is established, we’ll see that even some extreme kinds of cognitive enhancement might be not merely compatible with, but constitutive of, virtuous intellectual autonomy

    Spreading in Social Systems: Reflections

    Full text link
    In this final chapter, we consider the state-of-the-art for spreading in social systems and discuss the future of the field. As part of this reflection, we identify a set of key challenges ahead. The challenges include the following questions: how can we improve the quality, quantity, extent, and accessibility of datasets? How can we extract more information from limited datasets? How can we take individual cognition and decision making processes into account? How can we incorporate other complexity of the real contagion processes? Finally, how can we translate research into positive real-world impact? In the following, we provide more context for each of these open questions.Comment: 7 pages, chapter to appear in "Spreading Dynamics in Social Systems"; Eds. Sune Lehmann and Yong-Yeol Ahn, Springer Natur

    Building the HIVe: disrupting biomedical HIV and AIDS research with gay men, other men who have sex with men (MSM) and transgenders

    Get PDF
    Networked and digital technologies now mediate the sexual behaviors of many gay men, other men that have sex with men and transgenders, challenging the effectiveness of biomedical HIV/AIDS research and prevention practices. Driven by the normative positivist philosophy of science, these approaches—while paramount to fighting the epidemic—have neglected to rethink their ontological and epistemological assumptions when confronting the social drivers of HIV. Building the HIVe responds by forefronting community-based and led sociological HIV/AIDS research and prevention that addresses digitally mediated and driven sexual behaviors. The HIVe disrupts biomedical approaches by building an accessible and dynamic social science research community engaged in reflexive performativity to improve the health and human rights of marginalized communities disproportionately at risk of HIV/AIDS

    A Motivational Determinant of Facial Emotion Recognition : Regulatory Focus Affects Recognition of Emotions in Faces

    Get PDF
    Funding: The research was supported by The Netherlands Organization for Scientific Research (NWO, project 452-07-006). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.Peer reviewedPublisher PD

    Trademark Vigilance in the Twenty-First Century: An Update

    Get PDF
    The trademark laws impose a duty upon brand owners to be vigilant in policing their marks, lest they be subject to the defense of laches, a reduced scope of protection, or even death by genericide. Before the millennium, it was relatively manageable for brand owners to police the retail marketplace for infringements and counterfeits. The Internet changed everything. In ways unforeseen, the Internet has unleashed a tremendously damaging cataclysm upon brands—online counterfeiting. It has created a virtual pipeline directly from factories in China to the American consumer shopping from home or work. The very online platforms that make Internet shopping so convenient, and that have enabled brands to expand their sales, have exposed buyers to unwittingly purchasing fake goods which can jeopardize their health and safety as well as brand reputation. This Article updates a 1999 panel discussion titled Trademark Vigilance in the Twenty-First Century, held at Fordham Law School, and explains all the ways in which vigilance has changed since the Internet has become an inescapable feature of everyday life. It provides trademark owners with a road map for monitoring brand abuse online and solutions for taking action against infringers, counterfeiters and others who threaten to undermine brand value

    Web 2.0 technologies for learning: the current landscape – opportunities, challenges and tensions

    Get PDF
    This is the first report from research commissioned by Becta into Web 2.0 technologies for learning at Key Stages 3 and 4. This report describes findings from an additional literature review of the then current landscape concerning learner use of Web 2.0 technologies and the implications for teachers, schools, local authorities and policy makers
    corecore