279 research outputs found

    A Deliverance Story

    Full text link

    Sheeransanity

    Full text link

    Commentary: State of Tennessee v. Gilbert

    Get PDF

    The Impact of Self-Efficacy, Teacher Mentoring and Administrative Support on Teacher Retention in Title 1 Schools

    Get PDF
    Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. The goal was to empirically assess the effect of a focused Security Education, Training, and Awareness (SETA) workshop, an Interactive Security Challenge (ISC), and periodic security update emails on UXAs knowledge sharing, use of cognitive heuristics and biases, and ISP compliance behavior. This quantitative study employed a pretest and posttest experimental design to evaluate the effectiveness of a SETA workshop and an ISC on the ISP compliance of UXAs. The survey instrument was developed based on prior validated instrument questions and augmented with newly designed questions related to the use of cognitive heuristics and biases. Forty-two participants completed the survey prior to and following the SETA, ISC, and security update emails. Actual compliance (AC) behavior was assessed by comparing the results of security scans on administrator’s servers prior to and 90 days following the SETA workshop and ISC. SmartPLS was used to analyze the pre-workshop data, post-workshop data, and combined data to evaluate the proposed structural and measurement models. The results indicated that Confirmation Bias (CB) and the Availability Heuristic (AH) were significantly influenced by the Information Security Knowledge Sharing (ISKS). Optimism Bias (OB) did not reach statistically significant levels relating to ISKS. OB did, however, significantly influence on perceived severity (TA-PS), perceived vulnerability (TA-PV), response-efficacy (CA-RE), and self-efficacy (CA-SE). Also, it was noted that all five security implementation data points collected to assess pre- and post-workshop compliance showed statistically significant change. A total of eight hypotheses were accepted and nine hypotheses were rejected

    An analysis of some practical methods for estimating heats of combustion in fire safety studies

    Get PDF
    The theoretical (net) heat of combustion of materials is a basic information important for fire safety studies. This paper is a review of existing methods ranging from use of tabulated data to calculations relying on more or less sophisticated engineering correlations based on the elemental compositions of materials and in some cases on their chemical structures. The presentation emphasises only those calculation methods that allow user-friendly estimations of the heats of combustion, that is to say when at most a simple datasheet processor is the only tool required. Empirical correlations developed in early times of combustion science by Dulong (France), Boie (Germany) and some others are examined here in the context of fire engineering. More recently proposed predictive methods of heats of combustion in fire or chemical engineering background, taking account of structural effects of the molecules on their heats of combustion are then presented and compared. Finally, consideration of the relevance and accuracy of the listed methods is provided and commented either by comparison of literature and calculated values, either by reference to measured data obtained by use of conventional oxygen bomb calorimetry

    ErgÀnzungen zu einer personalbibliografie Ármin(ius) Våmbéry

    Get PDF
    The paper offers additions to Michael KnĂŒppel’s bibliography from 2017 on the Hungarian Orientalist Ármin VĂĄmbĂ©ry (1832–1913). Following KnĂŒppel’s guidelines, the bibliographical entries are given in three sections: publications by VĂĄmbĂ©ry himself, works about him, and finally reviews of his works

    Numerical simulation of locomotive fires in the Lyon-Turin tunnel

    Get PDF
    Generally rail tunnels are not the cause of accidents except when the loss of their structures' integrity is the cause. In fact, the major risk in tunnel is due to the possibility of effects aggravation induced by the enclosed space. Among the possible accidents, fires can induce very problematic evacuation situations and a lot of difficulties for the rescue access and operations. All over the world, important accidents have occurred, with or without victims and they widely justify the research projects such as EUREKA FIRETUN 499 (1) or MEMORIAL TUNNEL (2). Concerning rail tunnels, fires are frequently rolling-stocks fires. Many studies have been conducted on coach fires but few results are published on locomotive fires and their consequences (3). It is true that locomotives have often got security systems for fire detection and extinction and then consequences of these fires are generally reduced to incidents causing only little harm. Nevertheless a fully developed locomotive fire can alter the mobility of a train and therefore the consequences have to be studied as one of the major scenarios for the safety in rail tunnels

    GÜNTER KEMPCKE (2000) Wörterbuch Deutsch als Fremdsprache

    Get PDF
    • 

    corecore