45 research outputs found

    Introducing an adolescent cognitive maturity index

    Get PDF
    Children show substantial variation in the rate of physical, cognitive, and social maturation as they traverse adolescence and enter adulthood. Differences in developmental paths are thought to underlie individual differences in later life outcomes, however, there remains a lack of consensus on the normative trajectory of cognitive maturation in adolescence. To address this problem, we derive a Cognitive Maturity Index (CMI), to estimate the difference between chronological and cognitive age predicted with latent factor estimates of inhibitory control, risky decision-making and emotional processing measured with standard neuropsychological instruments. One hundred and forty-one children from the Adolescent Development Study (ADS) were followed longitudinally across three time points from ages 11–14, 13–16, and 14–18. Age prediction with latent factor estimates of cognitive skills approximated age within ±10 months (r = 0.71). Males in advanced puberty displayed lower cognitive maturity relative to peers of the same age; manifesting as weaker inhibitory control, greater risk-taking, desensitization to negative affect, and poor recognition of positive affect

    The Behavioral Roots of Information Systems Security:Exploring Key Factors Related to Unethical IT Use

    Get PDF
    Unethical information technology (IT) use, related to activities such as hacking, software piracy, phishing, and spoofing, has become a major security concern for individuals, organizations, and society in terms of the threat to information systems (IS) security. While there is a growing body of work on this phenomenon, we notice several gaps, limitations, and inconsistencies in the literature. In order to further understand this complex phenomenon and reconcile past findings, we conduct an exploratory study to uncover the nomological network of key constructs salient to this phenomenon, and the nature of their interrelationships. Using a scenario-based study of young adult participants, and both linear and nonlinear analyses, we uncover key nuances of this phenomenon of unethical IT use. We find that unethical IT use is a complex phenomenon, often characterized by nonlinear and idiosyncratic relationships between the constructs that capture it. Overall, ethical beliefs held by the individuals, along with economic, social, and technological considerations are found to be relevant to this phenomenon. In terms of practical implications, these results suggest that multiple interventions at various levels may be required to combat this growing threat to IS security
    corecore