4,248 research outputs found

    Safe passage for attachment systems:Can attachment security at international schools be measured, and is it at risk?

    Get PDF
    Relocations challenge attachment networks. Regardless of whether a person moves or is moved away from, relocation produces separation and loss. When such losses are repeatedly experienced without being adequately processed, a defensive shutting down of the attachment system could result, particularly when such experiences occur during or across the developmental years. At schools with substantial turnover, this possibility could be shaping youth in ways that compromise attachment security and young people’s willingness or ability to develop and maintain deep long-term relationships. Given the well-documented associations between attachment security, social support, and long-term physical and mental health, the hypothesis that mobility could erode attachment and relational health warrants exploration. International schools are logical settings to test such a hypothesis, given their frequently high turnover without confounding factors (e.g. war trauma or refugee experiences). In addition, repeated experiences of separation and loss in international school settings would seem likely to create mental associations for the young people involved regarding how they and others tend to respond to such situations in such settings, raising the possibility that people at such schools, or even the school itself, could collectively be represented as an attachment figure. Questions like these have received scant attention in the literature. They warrant consideration because of their potential to shape young people’s most general convictions regarding attachment, which could, in turn, have implications for young people’s ability to experience meaning in their lives

    Undergraduate Catalog of Studies, 2022-2023

    Get PDF

    Comparing the Performance of Initial Coin Offerings to Crowdfunded Equity Ventures

    Get PDF
    Uncertainty in markets increases the likelihood of market failure due to volatility and suboptimal functioning. While initial coin offerings (ICOs) and crowdfunded equity (CFE) offerings may improve functioning in growing markets, there is a lack of knowledge and understanding pertaining to the relative efficiency and behavior of ICO markets compared to CFE markets, potentially perpetuating and thwarting the various communities they are intended to serve. The purpose of this correlational study was to compare a group of ICOs with a group of CFE offerings to identify predictive factors of funding outcomes related to both capital offering types. Efficient market hypothesis was the study’s theoretical foundation, and analysis of variance was used to answer the research question, which examined whether capital offering type predicted the amount of funds raised while controlling for access to the offering companies’ secondary control factors: historical financial data, pro forma financial projections, detailed product descriptions, video of product demonstrations, company website, company history, company leadership, and company investors. Relying on a random sample of 115 campaigns (84 ICOs and 31 CFE) from websites ICOdrops.com, localstake.com, fundable.com, and mainvest.com, results showed differences in mean funds raised between CFEs and ICOs (346,075comparedto346,075 compared to 4,756,464, respectively). ANOVA results showed no single secondary control factors and only one two-factor interaction (company leadership and company investors) influenced mean funds raised. This study may contribute to positive social change by informing best practices among market participants including entrepreneurs, regulators, scholars, and investors

    Exploring Compassion-Driven Interaction: Bridging Buddhist Theory and Contemplative Practice Through Arts-led Research-through-Design

    Get PDF
    Compassion cultivation focuses on developing a genuine concern for others and a willingness to alleviate their suffering. As understandings of the benefits of compassion cultivation on wellbeing have evolved, an increasing interest in designing technologies for this context have followed. However, while scientific research focuses on measuring and evaluating compassion, designerly understandings of compassion informing human-computer interaction have been less explored. We are currently confronted with huge global challenges and our entanglement with technology brings paradoxes and existential tensions related to wellbeing and human flourishing. Viewing technologies as mediators of values and morality, human-computer interaction has a stake in shaping our possible futures. A shift in the field to welcoming a plurality of worldviews, invites opportunities to authentically integrate knowledge from ancient wisdom traditions into how and why we design. This research aims to advance understandings of compassion cultivation for designing technologies by developing novel approaches to research inspired by Buddhist philosophy and practice. This thesis draws upon an arts-led research-through-design approach and spiritual practice. The findings and insights from the studies contribute primarily to the areas of soma design, first-person research and design for wellbeing. The main contributions to knowledge are design guidelines emerging from three case studies: Understanding Tonglen, Wish Happiness, and Inner Suchness comprising one autoethnography and two concept-driven design artefacts for public exhibition. While in the act of researching, the contemplative practitioner-researcher, a research persona, emerged to support authentic engagement and embodied understandings of the dynamic unfolding processes of the practice. A contemplative framework to train self-observation and the concept of designerly gaze were developed to help investigate the phenomenon

    Summer/Fall 2023

    Get PDF

    Water Literacy in Drought-Prone Regions: Case Studies from Aurora, Colorado, USA and Cape Town, Western Cape, South Africa

    Get PDF
    Water managers around the world must reevaluate their approach to water security as challenges continue to grow. Supply-focused paradigms that aimed to capture, control, and commodify water resources are increasingly unreliable and often depend on environmentally and socially damaging practices. Of particular concern are regions experiencing climate shocks and aridification from rising global temperatures. In order to stretch limited water resources using equitable water policies, conservation programs, and alternative water sourcing, water managers must invest in a water literate citizenry. Water literacy is the culmination of water-related knowledge, attitudes, and behaviors. The benefits of a water literate citizenry abound, including increased transparency and trustworthiness around water management decisions, an uptake in water conservation and collective action, and a focus on community justice and water equity. However, the relative newness of water literacy research means our understanding of this concept, including what it entails and how its formed, is limited. Within this dissertation, I draw on theories of political ecology and planned behavior to respond to calls for an increased understanding of water literacy and its application within diverse case studies. First, I conduct a systematic literature review of water literacy and synthesize available definitions into an organizational framework. Then, I seek to apply this framework within the case studies of Cape Town, Western Cape (South Africa) and Aurora, Colorado (USA). These cities represent rapidly growing urban contexts that experience recurring drought seasonally and also experienced severe droughts within the last two decades. They also offer vast differences in geographic, sociopolitical, and economic contexts. The results of this research provides each city with a baseline understanding of community water literacy, which can be used to improve water management processes. Additionally, the results expose how lived experiences and sociopolitical structures can both help and hinder the formation of community water literacy

    Next-Generation Industrial Control System (ICS) Security:Towards ICS Honeypots for Defence-in-Depth Security

    Get PDF
    The advent of Industry 4.0 and smart manufacturing has led to an increased convergence of traditional manufacturing and production technologies with IP communications. Legacy Industrial Control System (ICS) devices are now exposed to a wide range of previously unconsidered threats, which must be considered to ensure the safe operation of industrial processes. Especially as cyberspace is presenting itself as a popular domain for nation-state operations, including against critical infrastructure. Honeypots are a well-known concept within traditional IT security, and they can enable a more proactive approach to security, unlike traditional systems. More work needs to be done to understand their usefulness within OT and critical infrastructure. This thesis advances beyond current honeypot implementations and furthers the current state-of-the-art by delivering novel ways of deploying ICS honeypots and delivering concrete answers to key research questions within the area. This is done by answering the question previously raised from a multitude of perspectives. We discuss relevant legislation, such as the UK Cyber Assessment Framework, the US NIST Framework for Improving Critical Infrastructure Cybersecurity, and associated industry-based standards and guidelines supporting operator compliance. Standards and guidance are used to frame a discussion on our survey of existing ICS honeypot implementations in the literature and their role in supporting regulatory objectives. However, these deployments are not always correctly configured and might differ from a real ICS. Based on these insights, we propose a novel framework towards the classification and implementation of ICS honeypots. This is underpinned by a study into the passive identification of ICS honeypots using Internet scanner data to identify honeypot characteristics. We also present how honeypots can be leveraged to identify when bespoke ICS vulnerabilities are exploited within the organisational network—further strengthening the case for honeypot usage within critical infrastructure environments. Additionally, we demonstrate a fundamentally different approach to the deployment of honeypots. By deploying it as a deterrent, to reduce the likelihood that an adversary interacts with a real system. This is important as skilled attackers are now adept at fingerprinting and avoiding honeypots. The results presented in this thesis demonstrate that honeypots can provide several benefits to the cyber security of and alignment to regulations within the critical infrastructure environment
    • …
    corecore