523 research outputs found

    Identifying mothers' and children's use and perceptions of power in their relationship

    Get PDF
    This study investigated attributes of power in the parent-child relationship. This concept was examined in three domains of conflict: personal, conventional, and prudential. Forty-one children (20 boys, 21 girls) ranging from seven to 12 years ( M = 10.12, SD = 1.42) and their mothers from a middle-class background participated in this study. This research assessed parents and children's perceptions of the types and level of power (French & Raven, 1959) through an interview consisting of 12 conflict-provoking situations. The dyad completed the Parent-Child Relationship Questionnaire (PCRQ; Furman & Giberson, 1995) and mothers completed the Parental Authority Questionnaire-Revised (PAQ-R; Reitman et. al., 2002), Behavior Assessment System for Children (BASC-2; Reynolds & Kamphaus, 2004), and the Marlowe-Crowne Social Desirability Scale (MC-SD; Strahan & Gerbasi, 1972). Results show that in the personal domain, children were rated as having more power, and in both the conventional and prudential domains, mothers were rated as having more power. Children of mothers with an authoritarian parenting style rated the mother as having more power in the personal, conventional, and prudential domains, while mothers rated themselves as having more power in the prudential domain. Permissive parenting was related to children rating themselves as having more power in the prudential domain. For types of power, mothers used more coercive and information power than their children, whereas children used more legitimate and sneaky power. This research may aid in parents' understanding that use of power could differ across domains

    Making computers keep secrets.

    Get PDF
    Massachusetts Institute of Technology. Dept. of Electrical Engineering. Thesis. 1973. Ph.D.MICROFICHE COPY ALSO AVAILABLE IN BARKER ENGINEERING LIBRARY.Vita.Bibliography: leaves 338-341.Ph.D

    Memes of Gandhi and Mercury in Anti-Vaccination Discourse

    Get PDF
    This study focuses on two widely circulating memes in the anti-vaccination movement, namely lists of vaccine ingredients containing mercury, and quotes attributed to Mahatma Gandhi. Mercury has been identified by conspiracy theorists as one of the most harmful components of vaccines, and Gandhi, who has condemned vaccination practices, has been celebrated as a significant source of authority. Quotes attributed to Gandhi against vaccination, complete with picture and embellished font, circulate across various popular platforms, as do intimidating images of syringes dipped in poison coupled with a list of seemingly occult or dangerous ingredients. This article analyses both memes, moving from the imageboard 4chan to the search engine Google Images, and illustrates how the repurposed, often ironic use of visual tropes can either undermine or strengthen the claims that accompany them. The aim is to explore the intersections of conspiracy theory, visual rhetoric, and digital communication in order to elucidate the ambiguity of memes as vehicles for the spread of controversial health-related information

    A critical review of cyber-physical security for building automation systems

    Full text link
    Modern Building Automation Systems (BASs), as the brain that enables the smartness of a smart building, often require increased connectivity both among system components as well as with outside entities, such as optimized automation via outsourced cloud analytics and increased building-grid integrations. However, increased connectivity and accessibility come with increased cyber security threats. BASs were historically developed as closed environments with limited cyber-security considerations. As a result, BASs in many buildings are vulnerable to cyber-attacks that may cause adverse consequences, such as occupant discomfort, excessive energy usage, and unexpected equipment downtime. Therefore, there is a strong need to advance the state-of-the-art in cyber-physical security for BASs and provide practical solutions for attack mitigation in buildings. However, an inclusive and systematic review of BAS vulnerabilities, potential cyber-attacks with impact assessment, detection & defense approaches, and cyber-secure resilient control strategies is currently lacking in the literature. This review paper fills the gap by providing a comprehensive up-to-date review of cyber-physical security for BASs at three levels in commercial buildings: management level, automation level, and field level. The general BASs vulnerabilities and protocol-specific vulnerabilities for the four dominant BAS protocols are reviewed, followed by a discussion on four attack targets and seven potential attack scenarios. The impact of cyber-attacks on BASs is summarized as signal corruption, signal delaying, and signal blocking. The typical cyber-attack detection and defense approaches are identified at the three levels. Cyber-secure resilient control strategies for BASs under attack are categorized into passive and active resilient control schemes. Open challenges and future opportunities are finally discussed.Comment: 38 pages, 7 figures, 6 tables, submitted to Annual Reviews in Contro

    Understanding the construct of human trust in domestic service robots

    Get PDF
    Simple robots are already being deployed and adopted by some consumers for use at home. The robots currently in development for home use are far more sophisticated. However, it was not know the extent to which humans would trust them. The purpose of this study was to identify factors that influence trust in domestic service robots across a range of users with different capabilities and experience levels. Twelve younger adults (aged 18-28) and 24 older adults (12 low technology users and 12 high technology users) aged 65-75 participated in a structured interview, card-sorting task, and several questionnaires. Most participants had heard about or seen robots, but indicated they had little experience with them. However, most had positive opinions about robots and indicated they would trust a robot to assist with tasks in their homes, though it was dependent on the task. Before making a decision to trust a robot, participants wanted to know a lot of information about the robot such robot reliability, capabilities, and limitations. When asked to select their trust preference for human versus robot assistance for specific tasks, participants had preferences for both human and robot assistance, although it was dependent on the task. Many participants defined trust in robots similar to definitions of trust in automation (Ezer, 2008; Jian et al., 2000). Additionally, they had high rates of selection for adjectives used to describe trust in automation and also selected some adjectives used to describe trust in humans when asked to select characteristics they most associated with trustworthy and untrustworthy robots. Overall, there were some differences between age and technology experience groups, but there were far more similarities. By carefully considering user needs, robot designers can develop robots that have the potential to be adopted by a wide range of people.Ph.D

    What do Collaborations with the Arts Have to Say About Human-Robot Interaction?

    Get PDF
    This is a collection of papers presented at the workshop What Do Collaborations with the Arts Have to Say About HRI , held at the 2010 Human-Robot Interaction Conference, in Osaka, Japan

    Agents of Redemptive Hope: Churches and Communities Addressing the Problem of Anger and the African American Adolescent Male

    Get PDF
    Many African American adolescent males struggle with controlling their anger leading to abusive and addictive behaviors. The question is, should the Churches respond, and if so, how can they help? This paper argues that the Church must reach out with the compassion and healing message of the gospel to the at-risk young Black males who are having difficulty dealing with anger issues to ensure a positive future for the next generation of strong and stable Black men

    Bridging the Gap Between Intent and Outcome: Knowledge, Tools & Principles for Security-Minded Decision-Making

    Get PDF
    Well-intentioned decisions---even ones intended to improve aggregate security--- may inadvertently jeopardize security objectives. Adopting a stringent password composition policy ostensibly yields high-entropy passwords; however, such policies often drive users to reuse or write down passwords. Replacing URLs in emails with safe URLs that navigate through a gatekeeper service that vets them before granting user access may reduce user exposure to malware; however, it may backfire by reducing the user\u27s ability to parse the URL or by giving the user a false sense of security if user expectations misalign with the security checks delivered by the vetting process. A short timeout threshold may ensure the user is promptly logged out when the system detects they are away; however, if an infuriated user copes by inserting a USB stick in their computer to emulate mouse movements, then not only will the detection mechanism fail but the insertion of the USB stick may present a new attack surface. These examples highlight the disconnect between decision-maker intentions and decision outcomes. Our focus is on bridging this gap. This thesis explores six projects bound together by the core objective of empowering people to make decisions that achieve their security and privacy objectives. First, we use grounded theory to examine Amazon reviews of password logbooks and to obtain valuable insights into users\u27 password management beliefs, motivations, and behaviors. Second, we present a discrete-event simulation we built to assess the efficacy of password policies. Third, we explore the idea of supplementing language-theoretic security with human-computability boundaries. Fourth, we conduct an eye-tracking study to understand users\u27 visual processes while parsing and classifying URLs. Fifth, we discuss preliminary findings from a study conducted on Amazon Mechanical Turk to examine why users fall for unsafe URLs. And sixth, we develop a logic-based representation of mismorphisms, which allows us to express the root causes of security problems. Each project demonstrates a key technique that can help in bridging the gap between intent and outcome
    corecore