127,379 research outputs found

    Understanding Perceptions of Problematic Facebook Use: When People Experience Negative Life Impact and a Lack of Control

    Full text link
    While many people use social network sites to connect with friends and family, some feel that their use is problematic, seriously affecting their sleep, work, or life. Pairing a survey of 20,000 Facebook users measuring perceptions of problematic use with behavioral and demographic data, we examined Facebook activities associated with problematic use as well as the kinds of people most likely to experience it. People who feel their use is problematic are more likely to be younger, male, and going through a major life event such as a breakup. They spend more time on the platform, particularly at night, and spend proportionally more time looking at profiles and less time browsing their News Feeds. They also message their friends more frequently. While they are more likely to respond to notifications, they are also more likely to deactivate their accounts, perhaps in an effort to better manage their time. Further, they are more likely to have seen content about social media or phone addiction. Notably, people reporting problematic use rate the site as more valuable to them, highlighting the complex relationship between technology use and well-being. A better understanding of problematic Facebook use can inform the design of context-appropriate and supportive tools to help people become more in control.Comment: CHI 201

    Post-training load-related changes of auditory working memory: An EEG study

    Get PDF
    Working memory (WM) refers to the temporary retention and manipulation of information, and its capacity is highly susceptible to training. Yet, the neural mechanisms that allow for increased performance under demanding conditions are not fully understood. We expected that post-training efficiency in WM performance modulates neural processing during high load tasks. We tested this hypothesis, using electroencephalography (EEG) (N = 39), by comparing source space spectral power of healthy adults performing low and high load auditory WM tasks. Prior to the assessment, participants either underwent a modality-specific auditory WM training, or a modality-irrelevant tactile WM training, or were not trained (active control). After a modality-specific training participants showed higher behavioral performance, compared to the control. EEG data analysis revealed general effects of WM load, across all training groups, in the theta-, alpha-, and beta-frequency bands. With increased load theta-band power increased over frontal, and decreased over parietal areas. Centro-parietal alpha-band power and central beta-band power decreased with load. Interestingly, in the high load condition a tendency toward reduced beta-band power in the right medial temporal lobe was observed in the modality-specific WM training group compared to the modality-irrelevant and active control groups. Our finding that WM processing during the high load condition changed after modality-specific WM training, showing reduced beta-band activity in voice-selective regions, possibly indicates a more efficient maintenance of task-relevant stimuli. The general load effects suggest that WM performance at high load demands involves complementary mechanisms, combining a strengthening of task-relevant and a suppression of task-irrelevant processing

    A role-based perspective on leadership as a network of relationships.

    No full text
    The research described in this article seeks to address the question of the extent to which a role-based perspective can provide insight into the distributed and networked form of leadership

    Caloric vestibular stimulation reduces pain and somatoparaphrenia in a severe chronic central post-stroke pain patient: a case study

    Get PDF
    Central post-stroke pain is a neuropathic syndrome characterized by intolerable contralesional pain and, in rare cases, somatic delusions. To date, there is limited evidence for the effective treatments of this disease. Here we used caloric vestibular stimulation to reduce pain and somatoparaphrenia in a 57-year-old woman suffering from central post-stroke pain. Resting-state functional magnetic resonance imaging was used to assess the neurological effects of this treatment. Following vestibular stimulation we observed impressive improvements in motor skills, pain, and somatic delusions. In the functional connectivity study before the vestibular stimulation, we observed differences in the patient's left thalamus functional connectivity, with respect to the thalamus connectivity of a control group (N = 20), in the bilateral cingulate cortex and left insula. After the caloric stimulation, the left thalamus functional connectivity with these regions, which are known to be involved in the cortical response to pain, disappeared as in the control group. The beneficial use of vestibular stimulation in the reduction of pain and somatic delusion in a CPSP patient is now documented by behavioral and imaging data. This evidence can be applied to theoretical models of pain and body delusions

    Tracking Users across the Web via TLS Session Resumption

    Full text link
    User tracking on the Internet can come in various forms, e.g., via cookies or by fingerprinting web browsers. A technique that got less attention so far is user tracking based on TLS and specifically based on the TLS session resumption mechanism. To the best of our knowledge, we are the first that investigate the applicability of TLS session resumption for user tracking. For that, we evaluated the configuration of 48 popular browsers and one million of the most popular websites. Moreover, we present a so-called prolongation attack, which allows extending the tracking period beyond the lifetime of the session resumption mechanism. To show that under the observed browser configurations tracking via TLS session resumptions is feasible, we also looked into DNS data to understand the longest consecutive tracking period for a user by a particular website. Our results indicate that with the standard setting of the session resumption lifetime in many current browsers, the average user can be tracked for up to eight days. With a session resumption lifetime of seven days, as recommended upper limit in the draft for TLS version 1.3, 65% of all users in our dataset can be tracked permanently.Comment: 11 page

    Performance Spillovers and Social Network in the Workplace: Evidence from Rural and Urban Weavers in a Chinese Textile Firm

    Get PDF
    We provide some of the first rigorous evidence on performance spillovers and social network in the workplace. The data we use are rather extraordinary – weekly data for rejection rates (proportion of defective output) for all weavers in a firm during a 12 months (April 2003-March 2004) period, more than 10,000 observations. Our fixed effect estimates first point to significant spillovers of performance from high-ability weavers to low-ability weavers. On the other hand, we find no evidence for performance spillovers from low-ability to high-ability weavers. The findings are consistent with the knowledge sharing hypothesis that low-ability workers learn from high-ability workers but not vice versa. Second, by exploiting the well-documented fact that an exogenously-formed sharp divide between urban workers and rural migrant workers exists in firms in Chinese cities, we find that performance spillovers/knowledge sharing take place only within the confines of social network. Specifically rural low-ability weavers are found to improve their performance as their high-ability teammates (who are also rural migrants) improve their performance while they do not benefit from performance improvement of their high-ability teammates who are urban residents. Such heterogeneous performance interdependence of workers within the same team suggests that our evidence for performance spillovers is less likely to be a result of team specific demand shocks that generate spurious performance interdependence of all team members.knowledge sharing, performance spillovers, social network

    Evaluation of the child development grant pilot

    Get PDF
    Audience: Early Years Providers, Lead Member for Children's Services, Researchers The Child Development Grant (CDG) pilot aimed to encourage economically deprived and disengaged parents, through (cash) incentives to utilise the services offered by their local Sure Start Children’s Centres (SSCC), in particular those services that have a positive impact on the child’s development and family. This evaluation report details the learning resulting from the Child Development Grant (CDG) pilot. The pilot was one of nine Child Poverty pilots funded by the Child Poverty Unit between 2008 and 2011. York Consulting and Ipsos MORI were commissioned to undertake the evaluation in April 200

    Security Through Amnesia: A Software-Based Solution to the Cold Boot Attack on Disk Encryption

    Get PDF
    Disk encryption has become an important security measure for a multitude of clients, including governments, corporations, activists, security-conscious professionals, and privacy-conscious individuals. Unfortunately, recent research has discovered an effective side channel attack against any disk mounted by a running machine\cite{princetonattack}. This attack, known as the cold boot attack, is effective against any mounted volume using state-of-the-art disk encryption, is relatively simple to perform for an attacker with even rudimentary technical knowledge and training, and is applicable to exactly the scenario against which disk encryption is primarily supposed to defend: an adversary with physical access. To our knowledge, no effective software-based countermeasure to this attack supporting multiple encryption keys has yet been articulated in the literature. Moreover, since no proposed solution has been implemented in publicly available software, all general-purpose machines using disk encryption remain vulnerable. We present Loop-Amnesia, a kernel-based disk encryption mechanism implementing a novel technique to eliminate vulnerability to the cold boot attack. We offer theoretical justification of Loop-Amnesia's invulnerability to the attack, verify that our implementation is not vulnerable in practice, and present measurements showing our impact on I/O accesses to the encrypted disk is limited to a slowdown of approximately 2x. Loop-Amnesia is written for x86-64, but our technique is applicable to other register-based architectures. We base our work on loop-AES, a state-of-the-art open source disk encryption package for Linux.Comment: 13 pages, 4 figure

    Assessment Report 2012 Russell Brands, Pakistan AA0000000108

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2012_Russell_Brands_AR_Pakistan_AA0000000108.pdf: 57 downloads, before Oct. 1, 2020
    • …
    corecore