220,365 research outputs found

    Attachment Styles Within the Coach-Athlete Dyad: Preliminary Investigation and Assessment Development

    Get PDF
    The present preliminary study aimed to develop and examine the psychometric properties of a new sport-specific self-report instrument designed to assess athletes’ and coaches’ attachment styles. The development and initial validation comprised three main phases. In Phase 1, a pool of items was generated based on pre-existing self-report attachment instruments, modified to reflect a coach and an athlete’s style of attachment. In Phase 2, the content validity of the items was assessed by a panel of experts. A final scale was developed and administered to 405 coaches and 298 athletes (N = 703 participants). In Phase 3, confirmatory factor analysis of the obtained data was conducted to determine the final items of the Coach-Athlete Attachment Scale (CAAS). Confirmatory factor analysis revealed acceptable goodness of fit indexes for a 3-first order factor model as well as a 2-first order factor model for both the athlete and the coach data, respectively. A secure attachment style positively predicted relationship satisfaction, while an insecure attachment style was a negative predictor of relationship satisfaction. The CAAS revealed initial psychometric properties of content, factorial, and predictive validity, as well as reliability

    Attachment Styles Within the Coach-Athlete Dyad: Preliminary Investigation and Assessment Development

    Get PDF
    The present preliminary study aimed to develop and examine the psychometric properties of a new sport-specific self-report instrument designed to assess athletes’ and coaches’ attachment styles. The development and initial validation comprised three main phases. In Phase 1, a pool of items was generated based on pre-existing self-report attachment instruments, modified to reflect a coach and an athlete’s style of attachment. In Phase 2, the content validity of the items was assessed by a panel of experts. A final scale was developed and administered to 405 coaches and 298 athletes (N = 703 participants). In Phase 3, confirmatory factor analysis of the obtained data was conducted to determine the final items of the Coach-Athlete Attachment Scale (CAAS). Confirmatory factor analysis revealed acceptable goodness of fit indexes for a 3-first order factor model as well as a 2-first order factor model for both the athlete and the coach data, respectively. A secure attachment style positively predicted relationship satisfaction, while an insecure attachment style was a negative predictor of relationship satisfaction. The CAAS revealed initial psychometric properties of content, factorial, and predictive validity, as well as reliability

    Investigating Regulative Implications for User-generated Content and a Design Proposal

    Get PDF
    The rapid increase of the Internet connectivity and the data publishing activity, like user-generated content, has lead Internet Service Providers (ISPs) to establish more efficient mechanisms for content delivery, such as caching. Mechanisms such as content-aware-networks and in-network caching reduce network load, server load, and user response time, thus, manage the network. However, caching of content also raises major implications in terms of legal acts and bills (e.g., data privacy, copyright), dealing with access control, validation scheme, and regulations (e.g., contractual obligation, legal restrictions). In general, user-generated content is linked with sensitive information, such as geographical information, medical and financial information, personal identifiable data, photos, videos, and contact information. Therefore, it is essential to secure data and regulate access. The latter, is gained by including access control mechanisms in the data exchange process, where a user requesting data must prove his access rights. Therefore, a user has to show an access ticket, which includes his rights based on legal and regulative implications. In order to secure any kind of data exchange, authentication of each participating communication entity (e.g., content owner, server, and end-user) is essential, which is part of the proposed two-way authentication handshake in this paper that is performed to generate a secure communication channel. The main contribution of this paper is to show that transmission, storage, and usage of user-generated data in caches within the network is manageable within the legal laws on sensitivity, copyright, and privacy. The scope of studying these laws, acts, and policies is restricted to Switzerland (CH), the European Union (EU), and the United States of America (USA). Finally, a solution is presented including access ticketing and two-way authentication mechanisms based oncommonstandards from IP network

    Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities)

    Get PDF
    There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities. Many vulnerabilities are caused by software errors that are created by software developers. Insecure software development practices are common due to a variety of factors, which include inefficiencies within existing knowledge transfer mechanisms based on vulnerability databases (VDBs), software developers perceiving security as an afterthought, and lack of consideration of security as part of the software development lifecycle (SDLC). The resulting communication gap also prevents developers and security experts from successfully sharing essential security knowledge. The cybersecurity community makes their expert knowledge available in forms including vulnerability databases such as CAPEC and CWE, and pattern catalogues such as Security Patterns, Attack Patterns, and Software Fault Patterns. However, these sources are not effective at providing software developers with an understanding of how malicious hackers can exploit vulnerabilities in the software systems they create. As developers are familiar with pattern-based approaches, this paper proposes the use of Vulnerability Anti-Patterns (VAP) to transfer usable vulnerability knowledge to developers, bridging the communication gap between security experts and software developers. The primary contribution of this paper is twofold: (1) it proposes a new pattern template – Vulnerability Anti-Pattern – that uses anti-patterns rather than patterns to capture and communicate knowledge of existing vulnerabilities, and (2) it proposes a catalogue of Vulnerability Anti-Patterns (VAP) based on the most commonly occurring vulnerabilities that software developers can use to learn how malicious hackers can exploit errors in software
    corecore