3,269 research outputs found

    An Analysis of Eye Scanpath Entropy in a Progressively Forming Virtual Environment

    Get PDF
    A sign of presence in virtual environments is that people respond to situations and events as if they were real, where response may be considered at many different levels, ranging from unconscious physiological responses through to overt behavior,emotions, and thoughts. In this paper we consider two responses that gave different indications of the onset of presence in a gradually forming environment. Two aspects of the response of people to an immersive virtual environment were recorded: their eye scanpath, and their skin conductance response (SCR). The scenario was formed over a period of 2 min, by introducing an increasing number of its polygons in random order in a head-tracked head-mounted display. For one group of experimental participants (n 8) the environment formed into one in which they found themselves standing on top of a 3 m high column. For a second group of participants (n 6) the environment was otherwise the same except that the column was only 1 cm high, so that they would be standing at normal ground level. For a third group of participants (n 14) the polygons never formed into a meaningful environment. The participants who stood on top of the tall column exhibited a significant decrease in entropy of the eye scanpath and an increase in the number of SCR by 99 s into the scenario, at a time when only 65% of the polygons had been displayed. The ground level participants exhibited a similar decrease in scanpath entropy, but not the increase in SCR. The random scenario grouping did not exhibit this decrease in eye scanpath entropy. A drop in scanpath entropy indicates that the environment had cohered into a meaningful perception. An increase in the rate of SCR indicates the perception of an aversive stimulus. These results suggest that on these two dimensions (scanpath entropy and rate of SCR) participants were responding realistically to the scenario shown in the virtual environment. In addition, the response occurred well before the entire scenario had been displayed, suggesting that once a set of minimal cues exists within a scenario,it is enough to form a meaningful perception. Moreover, at the level of the sympathetic nervous system, the participants who were standing on top of the column exhibited arousal as if their experience might be real. This is an important practical aspect of the concept of presence

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    Privacy and Cloud Computing in Public Schools

    Get PDF
    Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take advantage of new opportunities for cost savings, flexibility, and always-available service among others. As public schools in the United States rapidly adopt cloud-computing services, and consequently transfer increasing quantities of student information to third-party providers, privacy issues become more salient and contentious. The protection of student privacy in the context of cloud computing is generally unknown both to the public and to policy-makers. This study thus focuses on K-12 public education and examines how school districts address privacy when they transfer student information to cloud computing service providers. The goals of the study are threefold: first, to provide a national picture of cloud computing in public schools; second, to assess how public schools address their statutory obligations as well as generally accepted privacy principles in their cloud service agreements; and, third, to make recommendations based on the findings to improve the protection of student privacy in the context of cloud computing. Fordham CLIP selected a national sample of school districts including large, medium and small school systems from every geographic region of the country. Using state open public record laws, Fordham CLIP requested from each selected district all of the district’s cloud service agreements, notices to parents, and computer use policies for teachers. All of the materials were then coded against a checklist of legal obligations and privacy norms. The purpose for this coding was to enable a general assessment and was not designed to provide a compliance audit of any school district nor of any particular vendor.https://ir.lawnet.fordham.edu/clip/1001/thumbnail.jp

    The Effect of Electoral Competitiveness on Voter Turnout

    Get PDF
    This study is a quantitative analysis of the effect of campaign expenditures and turnout. It finds that expenditures can be a supplement to boosting turnout but would be ineffective on its own

    Thermal Alteration of Labile Elements in Carbonaceous Chondrites

    Full text link
    Carbonaceous chondrite meteorites are some of the oldest Solar System planetary materials available for study. The CI group has bulk abundances of elements similar to those of the solar photosphere. Of particular interest in carbonaceous chondrite compositions are labile elements, which vaporize and mobilize efficiently during post-accretionary parent-body heating events. Thus, they can record low-temperature alteration events throughout asteroid evolution. However, the precise nature of labile-element mobilization in planetary materials is unknown. Here we characterize the thermally induced movements of the labile elements S, As, Se, Te, Cd, Sb, and Hg in carbonaceous chondrites by conducting experimental simulations of volatile-element mobilization during thermal metamorphism. This process results in appreciable loss of some elements at temperatures as low as 500 K. This work builds on previous laboratory heating experiments on primitive meteorites and shows the sensitivity of chondrite compositions to excursions in temperature. Elements such as S and Hg have the most active response to temperature across different meteorite groups. Labile element mobilization in primitive meteorites is essential for quantifying elemental fractionation that occurred on asteroids early in Solar System history. This work is relevant to maintaining a pristine sample from asteroid (101955) Bennu from the OSIRIS-REx mission and constraining the past orbital history of Bennu. Additionally, we discuss thermal effects on surface processes of near-Earth asteroids, including the thermal history of "rock comets" such as (3200) Phaethon. This work is also critical for constraining the concentrations of contaminants in vaporized water extracted from asteroid regolith as part of future in situ resource utilization for sustained robotic and human space exploration.Comment: 12 pages of text, 3 tables, 7 figures, accepted by Icaru

    Measures of Hip Function and Symptoms

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/163446/2/acr24231_am.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/163446/1/acr24231.pd

    La gestión de riesgos operativos en la seguridad física y la reducción de pérdidas económicas en la oficina principal del Banco de la Nación, 2014

    Get PDF
    Hoy en día las empresas financieras requieren del manejo adecuado de las situaciones de riesgos que afectan su normal accionar. Entre algunas causales de riesgo encontramos los temas de seguridad física y material, calidad, costos, tiempo que los clientes valoran como parte de la calidad de la empresa y su propia satisfacción. En este sentido, la gestión del riesgo está asociada a un proceso articulado y complejo cuya finalidad es reducir los riesgos sociales y las pérdidas económicas. Se ha encontrado que las instituciones financieras como el Banco de la Nación están proclives a diversas situaciones de riesgo por lo que la presente investigación busca encontrar si existe una relación entre la implementación de la gestión de riesgos operativos, especialmente en la seguridad física y la reducción de pérdidas económicas. Así, el objetivo de la investigación se centra en establecer si existe una relación entre la gestión de riesgo para la seguridad física y la reducción de pérdidas económicas en la oficina principal del Banco de la Nación. La metodología es hipotética deductiva, de tipo básica, casual y por ende correlacional, no experimental, y transversal, de enfoque cuantitativo. El informe final de la investigación se inicia con un capítulo destinado a la introducción, en el segundo capítulo se aborda la metodología aplicada; el tercer capítulo continúa con el análisis de resultados y finalmente se presentan algunas conclusiones y recomendaciones. Los principales resultados encontrados son los siguientes: Existe una alta relación entre la gestión de riesgo operativo en la seguridad física y la reducción de pérdidas económicas en la oficina principal del Banco de la Nación, asimismo existe una moderada relación entre los desperfectos en alarmas de oficina y la reducción de pérdidas económicas y si se confirma una alta relación entre el insuficiente personal de seguridad y la reducción de pérdidas económicas

    Phytoforensics: Trees as bioindicators of potential indoor exposure via vapor intrusion

    Get PDF
    Human exposure to volatile organic compounds (VOCs) via vapor intrusion (VI) is an emerging public health concern with notable detrimental impacts on public health. Phytoforensics, plant sampling to semi-quantitatively delineate subsurface contamination, provides a potential non-invasive screening approach to detect VI potential, and plant sampling is effective and also time- and cost-efficient. Existing VI assessment methods are time- and resourceintensive, invasive, and require access into residential and commercial buildings to drill holes through basement slabs to install sampling ports or require substantial equipment to install groundwater or soil vapor sampling outside the home. Tree-core samples collected in 2 days at the PCE Southeast Contamination Site in York, Nebraska were analyzed for tetrachloroethene (PCE) and results demonstrated positive correlations with groundwater, soil, soil-gas, sub-slab, and indoor-air samples collected over a 2-year period. Because treecore samples were not collocated with other samples, interpolated surfaces of PCE concentrations were estimated so that comparisons could be made between pairs of data. Results indicate moderate to high correlation with average indoor-air and sub-slab PCE concentrations over long periods of time (months to years) to an interpolated tree-core PCE concentration surface, with Spearman\u27s correlation coefficients (ρ) ranging from 0.31 to 0.53 that are comparable to the pairwise correlation between sub-slab and indoor-air PCE concentrations (ρ = 0.55, n = 89). Strong correlations between soil-gas, sub-slab, and indoor-air PCE concentrations and an interpolated tree-core PCE concentration surface indicate that trees are valid indicators of potential VI and human exposure to subsurface environment pollutants. The rapid and non-invasive nature of tree sampling are notable advantages: even with less than 60 trees in the vicinity of the source area, roughly 12 hours of tree-core sampling with minimal equipment at the PCE Southeast Contamination Site was sufficient to delineate vapor intrusion potential in the study area and offered comparable delineation to traditional sub-slab sampling performed at 140 properties over a period of approximately 2 years
    corecore