13,986 research outputs found

    Attachment Theory and Maternal Drug Addiction: The Contribution to\ua0Parenting interventions.

    Get PDF
    Children\u2019s emotional and relational development can be negatively influenced bymaternal substance abuse, particularly through a dysfunctional caregiving environment. Attachment Theory offers a privileged framework to analyze how drug addiction can affect the quality of adult attachment style, parenting attitudes and behaviors toward the child, and how it can have a detrimental effect on the co-construction of the attachment bond by the mother and the infant. Several studies, as a matter of fact, have identified a prevalence of insecure patterns among drug-abusing mothers and their children. Many interventions for mothers with Substance Use Disorders have focused on enhancing parental skills, but they have often overlooked the emotional and relational features of the mother\u2013infant bond. Instead, in recent years, a number of protocols have been developed in order to strengthen the relationship between drug-abusing mothers and their children, drawing lessons from Attachment Theory. The present study reviews the literature on the adult and infant attachment style in the context of drug addiction, describing currently available treatment programs that address parenting and specifically focus on the mother\u2013infant bond, relying on Attachment Theory

    Machine Learning for Unmanned Aerial System (UAS) Networking

    Get PDF
    Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex missions simultaneously. However, the limitations of the conventional approaches are still a big challenge to make a trade-off between the massive management and efficient networking on a large scale. With 5G NR and machine learning, in this dissertation, my contributions can be summarized as the following: I proposed a novel Optimized Ad-hoc On-demand Distance Vector (OAODV) routing protocol to improve the throughput of Intra UAS networking. The novel routing protocol can reduce the system overhead and be efficient. To improve the security, I proposed a blockchain scheme to mitigate the malicious basestations for cellular connected UAS networking and a proof-of-traffic (PoT) to improve the efficiency of blockchain for UAS networking on a large scale. Inspired by the biological cell paradigm, I proposed the cell wall routing protocols for heterogeneous UAS networking. With 5G NR, the inter connections between UAS networking can strengthen the throughput and elasticity of UAS networking. With machine learning, the routing schedulings for intra- and inter- UAS networking can enhance the throughput of UAS networking on a large scale. The inter UAS networking can achieve the max-min throughput globally edge coloring. I leveraged the upper and lower bound to accelerate the optimization of edge coloring. This dissertation paves a way regarding UAS networking in the integration of CPS and machine learning. The UAS networking can achieve outstanding performance in a decentralized architecture. Concurrently, this dissertation gives insights into UAS networking on a large scale. These are fundamental to integrating UAS and National Aerial System (NAS), critical to aviation in the operated and unmanned fields. The dissertation provides novel approaches for the promotion of UAS networking on a large scale. The proposed approaches extend the state-of-the-art of UAS networking in a decentralized architecture. All the alterations can contribute to the establishment of UAS networking with CPS

    IMPROVING COMPUTER-SYSTEM SECURITY WITH POLYMORPHIC WARNING DIALOGS AND SECURITY-CONDITIONING APPLICATIONS

    Get PDF
    Many computer security decisions depend on contextual information that computer systems cannot automatically obtain or verify. Users need to supply such information through, e.g., computer dialogs. Unfortunately, users often do not provide true information to computer systems, but rather (intentionally or automatically) input whatever information will quickly dismiss security dialogs and allow users to proceed with their primary goal (which is rarely computer security). Obviously, such user behavior can compromise computer systems' security. With the generalized use of the Internet today, an individual's insecure behavior can have severe negative consequences to his organization, including financial losses, unintended release of private information, or an inability to operate normally in everyday activities. In spite of such potential consequences, users continue to behave insecurely. Industry surveys and security researchers still find users to be the weakest link in the computer security chain.To address the aforementioned problems, we first propose a model that helps explain why users behave insecurely when operating computer systems. Then, based on that model, we propose and evaluate techniques that improve users' security behaviors by automatically manipulating antecedents and consequences of such behaviors. First, we propose the use of warning polymorphism, which randomizes options in security warning dialogs, and delays activation of some of those options, so as to avoid cuing automatic, possibly untrue user responses. Second, we contribute the notion of security-conditioning applications (SCAs), and implement and evaluate two types of such applications, namely, security-reinforcing applications (SRAs) and insecurity-punishing applications (IPAs). SRAs strengthen users' secure behaviors by reliably delivering reinforcing stimuli contingently upon such behaviors, according to a specific reinforcement policy and schedule. IPAs weaken users' insecure behaviors by reliably delivering aversive stimuli, pre-specified by a policy, contingently upon those behaviors. Finally, we devise vicarious security-conditioning interventions to prepare users for interaction with SCAs and accelerate the latter's security benefits and user acceptance.Results of empirical evaluations of our proposed techniques show that they are, indeed, effective in improving users' security behaviors, increasing computer systems' security. Moreover, we show that, with appropriate schedules and stimuli, such improvements are resistant to extinction over time

    Pathway to Successful Young Adulthood

    Get PDF
    The Pathway to Successful Young Adulthood assembles a wealth of findings from research, practice, theory, and policy about what it takes to improve the lives of children, youth and families, particularly those living in tough neighborhoods. By laying out a comprehensive, coherent array of actions, the Pathway informs efforts to improve community conditions within supportive policy and funding contexts. The Pathways framework does not promote a single formula or program. Rather, our emphasis is on acting strategically across disciplines, systems, and jurisdictions to increase the number of young people who make a successful transition to young adulthood. The Pathway provides a starting point to guide choices made by community coalitions, services providers, researchers, funders, and policymakers to achieve desired outcomes for young people and their families

    A descriptive review and classification of organizational information security awareness research

    Get PDF
    Information security awareness (ISA) is a vital component of information security in organizations. The purpose of this research is to descriptively review and classify the current body of knowledge on ISA. A sample of 59 peer-reviewed academic journal articles, which were published over the last decade from 2008 to 2018, were analyzed. Articles were classified using coding techniques from the grounded theory literature-review method. The results show that ISA research is evolving with behavioral research studies still being explored. Quantitative empirical research is the dominant methodology and the top three theories used are general deterrence theory, theory of planned behavior, and protection motivation theory. Future research could focus on qualitative approaches to provide greater depth of ISA understanding

    What do healthcare providers think of patients who use the Internet?: An exploratory study

    Get PDF
    The Internet is a technology that is influencing multiple human factors (i.e. cognitive and social). Adults who seek information on the Internet about their health conditions are becoming more common. Providers have been wary of patient information searches, fearing that, at worst, conflicting information may provoke confrontation and doubt and, at best, the information is trivial or already well known to the provider. For this exploratory study a survey was conducted that investigates trends in healthcare provider information technology use and information seeking opinions. This survey was followed by a highly structured interview of n=21 providers. The researcher shows two provider strategies by which patients information seeking can be used to strengthen the professional clinical relationship

    Sticks and Stones May Break My Bones, but Will Comments Ever Hurt Me? : a Burkean Analysis of Cancel Culture in Social Media Spaces

    Get PDF
    In the modern social media era, “cancel culture” is a growing phenomenon used to hold public figures accountable for perceived wrongdoings. But who gets to cancel these celebrities? And how does someone get canceled? The concept of “cancel culture” has often been discussed in the past in the sense that the United States is a culture that is prone to want to cancel others. In my study, I am looking at the fact that there is a desire to cancel a perceived wrongdoer from an online space that is functioning as its own individual culture. The terms used to describe cancel culture by scholars and online users are often imprecise, so this thesis seeks to provide a clear distinction on what cancel culture and being canceled means and provide a new concept to help explain the phenomenon: a call for cancelation. YouTubers Logan Paul and Tana Mongeau and their apology videos’ comments sections serve as the focus of this thesis that rhetorically analyzes the culture calling for cancelation in an online space. The findings of this thesis help contribute to scholarly and industry knowledge of cancel culture: what it is, how to define it, related concepts, who is calling for cancelation, and what may happen when a public figure receives a call for cancelation from the supporting culture

    A case study of technical change and rehabilitation: Intervention design and interdisciplinary team interaction

    Get PDF
    The design of effective interventions in sport psychology often requires a subtle blend of techniques, tailored to meet the client’s specific needs. Input from a variety of disciplinary support specialists, working as a team, is also frequently needed. Accordingly, this study investigated an interdisciplinary team approach to the technical change and rehabilitation of an elite weight lifter following injury; necessitating the avoidance of regression when performing under competitive pressure. Multiple coaching approaches were used and complimented by targeting specific mental skills. Kinematic analyses indicated progressive technical, and subsequently permanent, change even after 2 years. Self-report measures of self-efficacy and imagery use were deemed essential in facilitating the change. Finally, a discussion focuses on the intervention’s multifactorial nature, its application within high performance coaching, and how this may advise future research into the refinement of already existing and well-established skills

    Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization

    Full text link
    Persuasion is part and parcel of human interaction. The human persuaders in society have been always exit, masters of rhetoric skilled of changing our minds, or at least our behaviors. Leaders, mothers, salesmen, and teachers are clear examples of persuaders. Persuaders often turn to technology and digital media to amplify their persuasive ends. Besides, our lives and how we lead them influenced by technologies and digital media,but for the most part, their effects on our attitudes and behaviors have been incidental, even accidental. Although, nowadays, the use of computers to sell products and services considered as the most frequent application of persuasive technology. In this short paper, based on an extensive review of literatures, we aim to give a brief introduction to persuasive technology, and how it can play a role and contribute to enhance and deliver the best practice of IT. Some challenges of persuasive technology have been discussed. At the end, some recommendations and steps should be taken place to empower IT professional practices have been listed.Comment: 7 pages, 1 table, Published with International Journal of Computer Trends and Technology (IJCTT
    corecore