2,116 research outputs found

    The role of gender in the relations among Dark Triad and psychopathy, sociosexuality, and moral judgments

    Get PDF
    The Dark Triad (D3) traits of narcissism, Machiavellianism, and psychopathy have been linked to a range of moral behavior, and to sociosexuality and sexual behavior, particularly in males. The current study examined whether males and females differ with respect to relations among D3 traits and dimensions of psychopathy from the Triarchic Psychopathy Measure (TriPM), sexual behavior, sociosexuality, tendency towards infidelity, and moral judgments, using a community sample. D3 and TriPM measures were generally more strongly correlated with sexual behavior for males in ways that might increase numbers of matings and sexual partners, but were more strongly correlated with intention towards infidelity and sociosexual attitudes for females—in ways that might facilitate extra-pair mating. Sociosexuality and self-reported sexual behavior showed a strong pattern of overall and gender-specific relations to moral judgments. D3 and psychopathy measures were also related to everyday moral judgments, although generally less so than were sociosexuality and sexual behavior. These results clearly point to the importance of taking gender into account when considering the relations between D3 traits, sexual behavior, sociosexuality, and moral judgments

    Inverse Function: Pre-Service Teachers’ Techniques and Meanings

    Get PDF
    Researchers have argued teachers and students are not developing connected meanings for function inverse, thus calling for a closer examination of teachers’ and students’ inverse function meanings. Responding to this call, we characterize 25 pre-service teachers’ inverse function meanings as inferred from our analysis of clinical interviews. After summarizing relevant research, we describe the methodology and theoretical framework we used to interpret the pre-service teachers’ activities. We then present data highlighting the techniques the pre-service teachers used when responding to tasks that involved analytical and graphical representations of functions and inverse functions in both decontextualized and contextualized situations and discuss our inferences of their meanings based on their activities. We conclude with implications for the teaching and learning of inverse function and areas for future research

    Ab initio molecular dynamics calculations of ion hydration free energies

    Get PDF
    We apply ab initio molecular dynamics (AIMD) methods in conjunction with the thermodynamic integration or "lambda-path" technique to compute the intrinsic hydration free energies of Li+, Cl-, and Ag+ ions. Using the Perdew-Burke-Ernzerhof functional, adapting methods developed for classical force field applications, and with consistent assumptions about surface potential (phi) contributions, we obtain absolute AIMD hydration free energies (Delta G(hyd)) within a few kcal/mol, or better than 4%, of Tissandier 's [J. Phys. Chem. A 102, 7787 (1998)] experimental values augmented with the SPC/E water model phi predictions. The sums of Li+/Cl- and Ag+/Cl- AIMD Delta G(hyd), which are not affected by surface potentials, are within 2.6% and 1.2 % of experimental values, respectively. We also report the free energy changes associated with the transition metal ion redox reaction Ag++Ni+-> Ag+Ni2+ in water. The predictions for this reaction suggest that existing estimates of Delta G(hyd) for unstable radiolysis intermediates such as Ni+ may need to be extensively revised.Comment: 18 pages, 8 figures. This version is essentially the one published in J. Chem. Phy

    Analyzing Small Business Strategies to Prevent External Cybersecurity Threats

    Get PDF
    Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected via online semistructured interviews and the National Institute of Standards and Technology documentation as well as analyzed thematically. Six major themes emerged: (a) applying standards regarding external threats, (b) evaluation of cybersecurity strategies and effectiveness, (c) consistent awareness of the external threat landscape, (d) assessing threat security posture, (e) measuring the ability to address risk and prevent attacks related to external threats, and (f) centralizing communication across departments to provide a holistic perspective on threats. A key recommendation for cybersecurity analysts is to employ moving the target defenses to prevent external cybersecurity threats. The implications for positive social change include the potential to provide small business cybersecurity analysts with additional strategies to effectively mitigate the compromise of customer PII, creating more resilient economic infrastructures while strengthening communities

    Analyzing Small Business Strategies to Prevent External Cybersecurity Threats

    Get PDF
    Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected via online semistructured interviews and the National Institute of Standards and Technology documentation as well as analyzed thematically. Six major themes emerged: (a) applying standards regarding external threats, (b) evaluation of cybersecurity strategies and effectiveness, (c) consistent awareness of the external threat landscape, (d) assessing threat security posture, (e) measuring the ability to address risk and prevent attacks related to external threats, and (f) centralizing communication across departments to provide a holistic perspective on threats. A key recommendation for cybersecurity analysts is to employ moving the target defenses to prevent external cybersecurity threats. The implications for positive social change include the potential to provide small business cybersecurity analysts with additional strategies to effectively mitigate the compromise of customer PII, creating more resilient economic infrastructures while strengthening communities

    A smart-site-survey system using Image-based 3D metric reconstruction and interactive panorama visualization

    Get PDF
    This work presents a so-called Smart Site Survey (SSS) system that provides an efficient, web-based platform for virtual inspection of remote sites with absolute 3D metrics. Traditional manual surveying requires sending surveyors and specialised measuring tools to the targeted scene, which takes time and requires significant human resource, and often includes human error. The proposed system provides an automated site survey tool. Sample indoor scenes including offices, storage rooms, and laboratory are used for testing purposes, and highly precise virtual scenes are restored, with the measurement accuracy of 1%, i.e. an error ±1.5cm to a 150cm length. This is comparable or superior to existing works or commercial products

    Ex-nihilo II: Examination Syllabi and the Sequencing of Cosmology Education

    Full text link
    Cosmology education has become an integral part of modern physics courses. Directed by National Curricula, major UK examination boards have developed syllabi that contain explicit statements about the model of the Big Bang and the strong observational evidence that supports it. This work examines the similarities and differences in these specifications, addresses when cosmology could be taught within a physics course, what should be included in this teaching and in what sequence it should be taught at different levels.Comment: 9 pages. Accepted for publication in a special issue of Physics Educatio

    Multicenter Study of Staging and Therapeutic Predictors of Hepatocellular Carcinoma Recurrence Following Transplantation

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/146434/1/lt25194.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/146434/2/lt25194_am.pd
    • 

    corecore