74 research outputs found

    Using event-related brain potentials to explore the temporal dynamics of decision-making related to information security

    Get PDF
    Insider threat from individuals operating within an organization presents a significant source of violations of information security. Our previous research has used scalp recorded event-related brain potentials (ERPs) and the Information Security Paradigm (ISP) to identify the neural correlates of decision-making processes related to violations of information security. In the current study, we sought to expand this research by examining the effects of two variables that were drawn from the broader decision-making literature (i.e., the benefactor and delay of a reward) on ERPs measured in the ISP. In the ISP we varied whether Josh—a hypothetical IT specialist—or a significant other was the benefactor of a violation, and whether the benefit of a violation was received after a short or long delay. The choice data revealed that individuals were less likely to endorse an unethical action than a control action. The electrophysiological data revealed ERPs that differentiated ethical scenarios from control scenarios between 200 and 2,000 ms after onset of the decision prompt, distributed over the occipital, central, and lateral frontal regions of the scalp. These ERPs were insensitive to the benefactor and delay of the reward. In contrast, there was slow wave activity over the frontal-polar region that was sensitive to both variables. The current findings provide evidence for separable neural systems that are either generally related to ethical decision-making in the ISP or are sensitive to the benefactor or delay of a reward resulting from an unethical decision

    A Social Cognitive Neuroscience Approach to Information Security

    Get PDF
    Information security (InfoSec) represents a significant challenge for private citizens, corporations, and government entities. Breaches of InfoSec, may lower consumer confidence (Yayla & Hu, 2011), shape national and international politics (Groll, 2017), and represent a significant threat to the world economy (e.g., estimated costs of breaches related to cybercrime were $3 trillion in 2015; Cybersecurity Ventures). Significant progress has been made in the context of developing and refining hardware and software infrastructure to thwart cybercrime (Ayuso, Gasca, & Lefevre, 2012; Choo, 2011). However, much less attention has been devoted to understanding the factors that lead individuals within an organization to compromise the digital assets of a company or government entity (Posey, Bennett, & Roberts, 2011; Warkentin & Willison, 2009). The need to for a greater understanding of the causes of insider threat becomes readily apparent when one considers that roughly 50% of security violations result from the activities of individuals within an organization (Richardson, 2011). Additionally, in a recent survey 89% of respondents felt that their organizations were at risk from an insider attack, and 34% felt very or extremely vulnerable (Vormetric Data Security, 2015). In this paper we describe our program of research that examines the neural basis of individual decision making related to InfoSec, and is grounded in a social cognitive neuroscience approach. We also consider evidence from studies examining the effects of individual and cultural differences on decision making related to InfoSec. Together this evidence may serve to motivate future research that integrates theories from neuroscience and the social and behavioral sciences in order to deepen our understanding of the factors that lead individuals to compromise InfoSec

    Predictors of Pathology Smartphone Use: Reward Processing, Depressive Symptoms, and Self-Control

    Get PDF
    The widespread adoption of smartphones that allow us to work, engage with friends and family, and pursue leisure activities has been associated with the emergence of pathological smartphone use wherein individuals experience anxiety and depressive symptoms when separated from their devices and may be more likely to engage in risky behavior while using their phone. Consistent with the broader literature on behavioral addictions, smartphone pathology is associated with increased depressive symptoms and decreased self-control. The current study builds upon a foundation of evidence from studies of pathological technology use including video games, the Internet, and social media to explore the association between the neural correlates of reward processing and smartphone pathology, depressive symptoms, and self-control. Our findings reveal that greater levels of smartphone pathology are associated with decreased neural activity related to the processing of both gains and losses when the individual is the agent of choice in a simple gambling task. Additionally, we replicate the association between depressive symptoms, self-control and smartphone pathology; and further demonstrate that reward processing represents a unique predictor of pathology beyond any shared association with depressive symptoms and self-control

    Pinnacle sets of signed permutations

    Full text link
    Pinnacle sets record the values of the local maxima for a given family of permutations. They were introduced by Davis-Nelson-Petersen-Tenner as a dual concept to that of peaks, previously defined by Billey-Burdzy-Sagan. In recent years pinnacles and admissible pinnacles sets for the type AA symmetric group have been widely studied. In this article we define the pinnacle set of signed permutations of types BB and DD. We give a closed formula for the number of type BB/DD admissible pinnacle sets and answer several other related enumerative questions.Comment: 15 pages, 3 figures, to appear in Discrete Mathematic

    The design and construction of a simulated linac control area (SLCA) for Radiation Therapy

    Get PDF
    Purpose Knowledge and skills needed by radiation therapists (therapeutic radiographers) in cutting edge radiation therapy are wide ranging – combining care for patients with high level technical and medical skills. In the UK pre-registration training takes place in both university and clinical departments. But increasing pressures on clinical departments means training time is limited; extending training into simulated environments has been proven to be highly effective [1] giving students more time to learn and develop, in a safe, non-clinical environment, using the same equipment, methods and discipline of the real clinic. This project aims to extend our simulation facilities to include a Linac control area, to complement students’ skills to safely and effectively ensure accurate and precise patient set-up and delivery of treatment. This paper describes the design and construction of such an area within our simulation centre. Methods Our aim was to create an SLCA with hardware and software components for patient selection, set-up, on-treatment image acquisition and registration and radiation delivery (with and without treatment interruptions). Using true-to-life components was as a high priority. The SLCA was designed around ARIA software, our Virtual Environment for RT (VERT) system, an indexed, flatbed motorised couch, a screened area to create a treatment bunker, a CCTV system, a real Linac function keypad with a specially designed MU counter/sound module, real controlled area/radiation on lighting panels and a simulated door interlock system. Results A schematic of the SLCA is shown in fig 1. All electronic components were built or assembled with documented specifications and design briefs. Screens create a ‘bunker’ so students set-up a patient in front of/using the VERT system and leave the room to the SLCA, as in a real bunker. The patient is visible all the time through the CCTV system. Patient and treatment plan can be selected on ARIA. CBCT acquisition and image registration is possible through the VERT system. The function keypad (from a decommissioned Elekta Linac) is interfaced to the MU counter and radiation-on light. MU are programmed into the counter and verified, before ‘beam-on’ is pressed, starting the MU counter, radiation-on sound (at realistic doserates) and radiation-on light. Conclusion All components have been designed and assembled; all work well as per design specification, enabling true-to-life patient set-up, patient selection and plan check, on-treatment CBCT verification and radiation-on effect with sound and light. The MU counter can be programmed with interruptions, so error scenarios can be simulated for training. The SLCA door interlock is being completed so simulated radiation cannot be initiated without a completed door interlock; and simulated radiation is interrupted when the door interlock is broken. Evaluation is on-going with clinical and university staff and UG/PG Radiation Therapy students. Ref: [1] S-J Ketterer et al. Simulated versus traditional therapeutic radiography placements: a randomized controlled trial. Radiog 2020;26:140-146. https://doi.org/10.1016/j.radi.2019.10.005 Keywords: Radiotherapy, Simulation, Lina

    Introductory programming: a systematic literature review

    Get PDF
    As computing becomes a mainstream discipline embedded in the school curriculum and acts as an enabler for an increasing range of academic disciplines in higher education, the literature on introductory programming is growing. Although there have been several reviews that focus on specific aspects of introductory programming, there has been no broad overview of the literature exploring recent trends across the breadth of introductory programming. This paper is the report of an ITiCSE working group that conducted a systematic review in order to gain an overview of the introductory programming literature. Partitioning the literature into papers addressing the student, teaching, the curriculum, and assessment, we explore trends, highlight advances in knowledge over the past 15 years, and indicate possible directions for future research

    Neural Activity Related to Information Security Decision Making: Effects of Who Is Rewarded and When the Reward Is Received

    Full text link
    Breaches of information security resulting from cybercrime represents a significant threat to the security and well-being of individuals, corporations, and governments. Therefore, understanding the neurocognitive processes that lead individuals to violate information security policy represents a fundamental pursuit for NeuroIS researchers. In the current study, we examined the effects of whether an individual or a close associate benefited from a violation of information security, and the temporal delay before the benefit was received on event-related brain potentials (ERPs) related to ethical decision making. The electrophysiological data revealed modulations of the ERPs that were generally sensitive to ethical decision making, or that were specifically sensitive to the recipient or timing of the reward. The components that were sensitive to the two independent variables were observed over the anterior frontal region of the scalp, consistent with the neuroimaging literature demonstrating that several prefrontal structures participate in self-referent processing and intertemporal choice
    • 

    corecore