758 research outputs found

    An examination of the verbal behaviour of intergroup discrimination

    Get PDF
    This thesis examined relationships between psychological flexibility, psychological inflexibility, prejudicial attitudes, and dehumanization across three cross-sectional studies with an additional proposed experimental study. Psychological flexibility refers to mindful attention to the present moment, willing acceptance of private experiences, and engaging in behaviours congruent with one’s freely chosen values. Inflexibility, on the other hand, indicates a tendency to suppress unwanted thoughts and emotions, entanglement with one’s thoughts, and rigid behavioural patterns. Study 1 found limited correlations between inflexibility and sexism, racism, homonegativity, and dehumanization. Study 2 demonstrated more consistent positive associations between inflexibility and prejudice. And Study 3 controlled for right-wing authoritarianism and social dominance orientation, finding inflexibility predicted hostile sexism and racism beyond these factors. While showing some relationships, particularly with sexism and racism, psychological inflexibility did not consistently correlate with varied prejudices across studies. The proposed randomized controlled trial aims to evaluate an Acceptance and Commitment Therapy intervention to reduce sexism through enhanced psychological flexibility. Overall, findings provide mixed support for the utility of flexibility-based skills in addressing complex societal prejudices. Research should continue examining flexibility integrated with socio-cultural approaches to promote equity

    Effectiveness of Emotionally Focused Therapy (EFT) with Chinese Couple Clients: From the Chinese EFT Therapists\u27 Cultural Lens

    Get PDF
    The purpose of this phenomenological study is to understand the Chinese EFT (Emotionally Focused Therapy) therapists’ experiences of working with Chinese couples in EFT sessions, as well as to discover how the cultural factors play a role in the effectiveness of EFT use with Chinese couples. This study was conducted by finding out 10 EFT-oriented therapists and analyzing via online interviews their experiences of working with Chinese couples. The theories guiding this study are based on Emotionally Focused Therapy (EFT). One of the founding therapists of this approach is Dr. Sue Johnson. EFT is heavily influenced by attachment theory, which was first developed by John Bowlby. This study also reviews EFT’s major theoretical constructs—emotional, systematic, humanistic and experiential theories. The data was collected by doing semi-structured interviews virtually with 10 Chinese EFT-oriented therapists in China. The methods of analysis of the data was done by discovering themes or phenomena through their significant statements, then analyzing and evaluating the themes to distill the essence of the phenomenon

    Multidisciplinary perspectives on Artificial Intelligence and the law

    Get PDF
    This open access book presents an interdisciplinary, multi-authored, edited collection of chapters on Artificial Intelligence (‘AI’) and the Law. AI technology has come to play a central role in the modern data economy. Through a combination of increased computing power, the growing availability of data and the advancement of algorithms, AI has now become an umbrella term for some of the most transformational technological breakthroughs of this age. The importance of AI stems from both the opportunities that it offers and the challenges that it entails. While AI applications hold the promise of economic growth and efficiency gains, they also create significant risks and uncertainty. The potential and perils of AI have thus come to dominate modern discussions of technology and ethics – and although AI was initially allowed to largely develop without guidelines or rules, few would deny that the law is set to play a fundamental role in shaping the future of AI. As the debate over AI is far from over, the need for rigorous analysis has never been greater. This book thus brings together contributors from different fields and backgrounds to explore how the law might provide answers to some of the most pressing questions raised by AI. An outcome of the Católica Research Centre for the Future of Law and its interdisciplinary working group on Law and Artificial Intelligence, it includes contributions by leading scholars in the fields of technology, ethics and the law.info:eu-repo/semantics/publishedVersio

    Artificial Intelligence and International Conflict in Cyberspace

    Get PDF
    This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace. Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. However, scholarly work on the relationship between AI and conflict in cyberspace has been produced along somewhat rigid disciplinary boundaries and an even more rigid sociotechnical divide – wherein technical and social scholarship are seldomly brought into a conversation. This is the first volume to address these themes through a comprehensive and cross-disciplinary approach. With the intent of exploring the question ‘what is at stake with the use of automation in international conflict in cyberspace through AI?’, the chapters in the volume focus on three broad themes, namely: (1) technical and operational, (2) strategic and geopolitical and (3) normative and legal. These also constitute the three parts in which the chapters of this volume are organised, although these thematic sections should not be considered as an analytical or a disciplinary demarcation

    A Classification of Money Laundering Incidents

    Get PDF
    Money laundering is typically described as a three-stage process, including the placement, layering, and integration of criminal assets. However, the precision of the so-called three-stage model is doubtful, with significant shortcomings in the theoretical foundation, empirical support, and research practice. Previous research has failed to trigger a scientific debate about the numerous manifestations of money laundering going beyond the three-stage model. This thesis introduces a new conceptual framework in which money laundering incidents comprise properties from crime events and their immediate environment. The conceptual framework was developed in an iterative process between data and crime science theory. Original data was gathered using a quantitative approach to content analysis applied to 180 full judgment transcripts from the Court of Appeal and Administrative Court of England and Wales (1997- 2017). In a series of studies, the money laundering properties outlined in court transcripts were identified, conceptualised, and refined from the crime science perspective. In the last step, money laundering incidents were classified based on the hierarchical clustering of information from court records. The classification of money laundering incidents shows little resemblance with the standard three-stage model and offers a new viewpoint on how money laundering works. The novel approach enables researchers and practitioners to consider a broader range of properties, improving the examination and prevention of money laundering

    Investigating Digital Corporate Reporting from an Upper Echelons Theory Perspective: Evidence from the Arab Middle East

    Get PDF
    Utilising the insights of Upper Echelons Theory (UET) and bounded rationality assumption, this original study aimed to investigate the association between corporate leaders’ characteristics and both the extent and readability of Digital Corporate Reporting (DCR). Content analysis of corporate websites of 122 publicly listed Jordananian firms has been carried out. The logistics regression analysis revealed that maintaining a functioning corporate website is inversely associated with CEO age. This indicates that younger CEOs are more likely to retain a web presence for the firm than their older counterparts. The OLS regression analysis revealed that CEOs’ education and tenure were negatively associated with the extent of DCR. Moreover, it was found that Corporate Governance (CG) moderating variables hardly lessen this relationship. The results confirm the current thoughts regarding the rise of CEO effects in corporations with unique evidence from the Arab Middle East (AME). Building on the previous evidence, the study also aimed at uncovering the association between chairman characteristics and the readability of the digital version of the chairman’s Letter to Shareholders (LTS). A hand-built dataset from a sample of 379 LTS from 101 publicly listed firms in 7 AME countries over five years (2014 – 2018) were employed to achieve this objective. Focusing on the clarity of DCR, the results of this second part of this study emphasizes the potential of UET to provide incremental plausible explanations of the variance in the levels of readability of LTS. The clustered regression results of the panel data demonstrate that older and less educated chairpersons are associated with more readable disclosures. Such findings on disclosure styles demonstrate the power of individuals in positions of authority as a consequence of higher education and tenure. Such findings contribute to the evolving inquiry on the significance of readability for enhancing corporate disclosure transparency and have implications for improving the DCR extent and readability

    Towards a Peaceful Development of Cyberspace - Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of Cyberweapons

    Get PDF
    Cyberspace, already a few decades old, has become a matter of course for most of us, part of our everyday life. At the same time, this space and the global infrastructure behind it are essential for our civilizations, the economy and administration, and thus an essential expression and lifeline of a globalized world. However, these developments also create vulnerabilities and thus, cyberspace is increasingly developing into an intelligence and military operational area – for the defense and security of states but also as a component of offensive military planning, visible in the creation of military cyber-departments and the integration of cyberspace into states' security and defense strategies. In order to contain and regulate the conflict and escalation potential of technology used by military forces, over the last decades, a complex tool set of transparency, de-escalation and arms control measures has been developed and proof-tested. Unfortunately, many of these established measures do not work for cyberspace due to its specific technical characteristics. Even more, the concept of what constitutes a weapon – an essential requirement for regulation – starts to blur for this domain. Against this background, this thesis aims to answer how measures for the de-escalation of state-led conflicts in cyberspace and arms control of cyberweapons can be developed. In order to answer this question, the dissertation takes a specifically technical perspective on these problems and the underlying political challenges of state behavior and international humanitarian law in cyberspace to identify starting points for technical measures of transparency, arms control and verification. Based on this approach of adopting already existing technical measures from other fields of computer science, the thesis will provide proof of concepts approaches for some mentioned challenges like a classification system for cyberweapons that is based on technical measurable features, an approach for the mutual reduction of vulnerability stockpiles and an approach to plausibly assure the non-involvement in a cyberconflict as a measure for de-escalation. All these initial approaches and the questions of how and by which measures arms control and conflict reduction can work for cyberspace are still quite new and subject to not too many debates. Indeed, the approach of deliberately self-restricting the capabilities of technology in order to serve a bigger goal, like the reduction of its destructive usage, is yet not very common for the engineering thinking of computer science. Therefore, this dissertation also aims to provide some impulses regarding the responsibility and creative options of computer science with a view to the peaceful development and use of cyberspace

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    The Applications of Blockchain To Cybersecurity

    Get PDF
    A blockchain is a decentralized public ledger facilitating secure transactions between untrusted network nodes. It has garnered significant recognition for its pivotal role in cryptocurrency systems, where it ensures secure and decentralized transaction records. Over the past decade, blockchain has attracted considerable attention from various industries, as it holds the potential to revolutionize multiple sectors, including cybersecurity. However, this field of study is relatively new, and numerous questions remain unanswered regarding the effectiveness of blockchain in cybersecurity. This research adopted a qualitative research design to investigate the current implementations of blockchain-based security and their applicability in the current cybersecurity context. Additionally, this work explored the mechanisms employed by blockchain to uphold the security triad. Findings indicate that blockchain exhibits substantial potential in addressing existing challenges in cybersecurity, particularly those related to the Internet of Things, data integrity and ownership, and network security. Nonetheless, widespread adoption faces limitations due to technological immaturity, high-cost complexity, and regulatory hurdles. Therefore, utilizing blockchain-based solutions in cybersecurity necessitates a thorough analysis of their applicability to an organization\u27s specific needs, a clear definition of implementation goals, and careful navigation of challenges
    • …
    corecore