3,383 research outputs found

    Results from new fungus-tolerant grapevine varieties for Organic Viticulture

    Get PDF
    Two red and three white new fungus-tolerant grape varieties were tested within a period of five years. REGENT, RONDO, JOHANNITER and Gf 48-12 show a better wine quality than PINOT NOIR or SILVANER and can be recommended for Organic Viticulture as well as for the conventional viticulture to reduce copper and fungicide applications

    Building on Good Foundations: Constructing a Research Data Management Program for a Research University

    Get PDF
    Objectives: The director of the university health sciences library (DHSL) and the new director of research data management (DRDM) must develop an eighteen-month plan to create a research data management program for the entire university. The program needs to support mandated data management plans and sharing, and encourage good data management practices throughout the institution. Methods: Collaborating with constituent groups, the DRDM worked with the DHSL to create a roadmap to deploy research data support across the university. Building on early work done at research and health sciences libraries with well-developed research data management services, the team opted not to conduct extensive faculty and research needs assessment regarding data management, assuming that discipline research data needs are similar from institution to institution. A strengths, weaknesses, opportunities, and threats (SWOT) analysis was done to assess the data landscape of the university and identify areas where further professional development would be helpful for the DRDM and DHSL. The university website was used to identify researchers who seemed to be working with data, and these people were contacted with a series of open ended questions. The literature was reviewed to identify best practices and tools for use in research data management. Results: The program started with targeted meetings and presentations to faculty. The team assessed and took steps to address team knowledge deficits. Collaborative relationships were developed with liaison librarians in both libraries to extend their awareness of research data management and provide appropriate referrals. Plans were made to develop and share a core curriculum with liaison librarians for instruction in their areas. A communication plan was developed with the aid of the libraries\u27 communication officer and web developer. Strategic partnerships were identified and pursued. Progress will be assessed to ensure that the needs of the research community are being met

    Starting a Research Data Management Program Based in a University Library

    Get PDF
    As the need for research data management grows, many libraries are considering adding data services to help with the research mission of their institution. The Virginia Commonwealth University (VCU) Libraries created a position and hired a director of research data management in September 2013. The position was new to the libraries and the university. With the backing of the library administration, a plan for building relationships with VCU faculty, researchers, students, service and resource providers, including grant administrators, was developed to educate and engage the community in data management plan writing and research data management training

    Discrete emotion-congruent false memories in the DRM paradigm

    Get PDF
    Research has shown that false memory production is enhanced for material that is emotionally congruent with the mood of the participant at the time of encoding. So far this research has only examined the influence of generic negative affective mood states and generic negative stimuli on false memory production. In addition, much of the research is limited as it focuses on valence and arousal dimensions, and fails to take into account the more comprehensive nature of emotions. The current study demonstrates that this effect goes beyond general negative or positive moods and acts at a more discrete emotional level. Participants underwent a standard emotion induction procedure before listening to negative emotional or neutral associative word lists. The emotions induced, negative word lists and associated non-presented critical lures, were related to either fear or anger, two negative valence emotions that are also both high in arousal. Results showed that when valence and arousal are controlled for, false memories are more likely to be produced for discrete emotionally congruent compared to incongruent materials. These results support spreading activation theories of false remembering and add to our understanding of the adaptive nature of false memory production

    Student Perceptions Of Password Security And Maintenance

    Get PDF
    Increasing concerns about security and privacy have raised the bar for interest in ways to protect information. Although newer approaches include face recognition, the use of passwords is commonly used today as the best approach for protecting data. Web sites, software programs, financial institutions universities, and many commercial stores are requiring that a password include the following attributes: consist of a fixed number of characters, include numbers and letters, special characters and lower and upper case letters. In addition, repetition of a password is not allowed, i.e. the updated password must be original to the user. These circumstances are just a few of the requirements that have made generating a password somewhat of a challenge. Many institutions also require changing a password on a regular schedule. The growth of the use of password coupled with the frequency of changing these codes have made the creation and use of passwords a challenging necessity. This paper explores how students view and use password protection. One of the questions addressed in this research is: Do student attitudes toward password protection impact how passwords are used? Another inquiry discussed in this paper is perception of the importance of the use of passwords. Interest in using an automated tool to facilitate use of password protection is also explored. Evidence connecting the use of passwords and the habits developed by undergraduates in protecting their information are also explored in this paper. Some of the questions addressed in this research include the following: • How many web sites do you visit that require a password? • Given the following classifications: personal banking, social networking, shopping, and gaming, how many websites of each type do you use that require passwords? • How do you view the importance of password security? • How many passwords do you use? • How often do you change your password(s) voluntarily? • How often do you change your password(s) because you are required to? • Do you find it challenging to change your passwords, given many sites requirements, to include a capital letter, symbol or other character? • Are you familiar with any software that aids in creation and/or saving of your personal passwords? If so, which software? • Would you be interested in such a tool, if you aren’t familiar with one? • Of the following devices: desktop, iPad, laptop, and cell phone, how would you rate the importance of securing them with password protection? The findings of the survey help to understand the perspective of today’s students and how to address the critical need to secure their passwords. The consequence of misapplying a password can lead to frustration, loss of information, and delays in accessing data. The practice of employing an automated password tool is seen as a solution to the complexities of creating and applying passwords. This research contributes to understanding some of the attitudes and habits of students in their use of passwords. Approximately 94% of the respondents to the survey felt that password protection was important. The perception of the degree of trouble of changing password was almost evenly divided between a high level of difficult and a low level of difficulty among the students surveyed. The majority of students in the study (57%) are interested in learning about a software tool to automate password management. In terms of the relationships between the perceptions and the behaviors reported in the survey, it was found that there is a significant relationship between the number of sites requiring passwords and the use of passwords. There was also a significant relationship between the difficulty in changing passwords and interest in an automated tool

    Accounting Compensation Modeling Using The Analytic Hierarchy Process Supporting The Sarbanes-Oxley Act

    Get PDF
    The Sarbanes-Oxley Act (SOA) of 2002 included a wide range of reforms for issuers of publicly traded securities, auditors, corporate board members, and lawyers. It was aimed at deterring and punishing corporate and accounting fraud with severe penalties for wrongdoers, and protecting the interests of workers and shareholders. The SOA along with the economic downturn of 2008 and the subsequent passing of the Dodd-Frank Act has focused additional attention to executive compensation especially for CEOs. This paper proposes that the Analytic Hierarchy Process (AHP) may be useful in developing input to compensation contracts in ways that support regulations and the interests of investors and stockholders. AHP is suggested as a framework to explore when considering the factors that can be used to measure the performance of a CEO. Seven reasons for using AHP for this purpose are presented in this report: (1) emphasizes objectivity and consistency, (2) creates an audit trail for compensation agreements, (3) improves understanding between CEOs and compensation committees, (4) supports review and updating CEO compensation contracts, (5) augments CEO selection, (6) supports SOA and Dodd-Frank Act, and (7) may attract investors

    Test-Induced Priming Impairs Source Monitoring Accuracy in the DRM Procedure

    Get PDF
    Three experiments investigated the effects of test-induced priming (TIP) on false recognition in the Deese/Roediger-McDermott procedure. In Experiment 1, TIP significantly increased false recognition for participants who made old/new decisions at test but not for participants who made remember/know judgements or were given diagnostic information to help them avoid false recognition. In Experiment 2, a TIP effect was observed with old/new recognition but not when participants were required to remember whether study items were spoken by a male or a female. In Experiment 3, false recognition increased when critical lures were preceded by ten studied items but not when preceded by five studied and five unstudied items from the same list. These findings suggest that TIP increases false recognition by disrupting source monitoring processes
    • …
    corecore