233 research outputs found

    YouGov

    Get PDF
    https://scholarworks.bgsu.edu/arfp/1021/thumbnail.jp

    Career maturity of college seniors as a function of gender, sex-role identification, and choice of major

    Get PDF
    Development of identity was examined as reflected in the ability to establish and clarify purpose and develop academic autonomy, combined as Career Maturity. Each variable was related to gender sex-role identification (androgynous, masculine-identified, feminine-identified, and undifferentiated), choice of major (male-dominated, female-dominated), and sex-appropriateness of major (sex-appropriate, sex-inappropriate);Three-hundred-ninety-six seniors completed the BEM Sex Role Inventory and the Student Developmental Task and Lifestyle Inventory. Students were enrolled in engineering and business (male-dominated), or education and family and consumer sciences (female-dominated);Students clustered in majors that were sex-appropriate for them. Females in sex-appropriate majors described themselves as more feminine than females in sex-inappropriate majors. Masculinity did not differ for males by sex-appropriateness of major;Seniors were evenly represented in the four sex-role identification categories. Students in male-dominated majors were primarily masculine-identified and undifferentiated, whereas students in female-dominated majors were primarily androgynous and feminine-identified;The masculine-identified group scored higher than the undifferentiated group on all three career maturity variables. For Establishing and Clarifying Purpose the androgynous group scored higher than undifferentiated, feminine-identified, and masculine-identified groups. On Career Maturity the androgynous group scored higher than undifferentiated and feminine-identified groups;Students in female-dominated majors did not differ from those in male-dominated majors on Academic Autonomy, but they did show more evidence of Establishing and Clarifying Purpose and thus Career Maturity;Students in sex-appropriate majors did not differ overall from students in sex-inappropriate majors. The interaction between gender and sex-appropriateness of major was significant for Establishing and Clarifying Purpose and thus, Career Maturity. Women were more likely to have established purpose and achieved academic autonomy than males overall. Women in sex-appropriate majors and women and men in sex-inappropriate majors were similar to each other. Men in sex-appropriate majors scored lowest;Students in the four sex-role identity categories did not differ in their interest in going to graduate school, nor was there a difference based on sex-appropriateness of major

    Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape

    Get PDF
    One year ago, Russia invaded Ukraine. Since then, tens of thousands of people have been killed, millions of Ukrainians have fled and the country has sustained tens of billions of dollars worth of damage. Importantly, this marks the first time that cyber operations have played such a prominent role in a world conflict. Since the war began, governments, companies, civil society groups, and countless others have been working around the clock to support the Ukrainian people and their institutions. At Google, we support these efforts and continue to announce new commitments and support to Ukraine. This includes a donation of 50,000 Google Workspace licenses for the Ukrainian government and a rapid Air Raid Alerts system for Android phones in Ukraine, support for refugees, businesses, and entrepreneurs, and measures to indefinitely pause monetization and significantly limit recommendations globally for a number of Russian state news media across our platforms. One of the most pressing challenges, however, is that the Ukrainian government is under nearconstant digital attack. That’s why one of our most important contributions to date has been our ongoing work to provide cybersecurity assistance to Ukraine. Shortly after the invasion, for example, we expanded eligibility for Project Shield, our free protection against distributed denial of service attacks (DDoS), so that Ukrainian government websites and embassies worldwide could stay online and continue to offer their critical services. We continue to provide direct assistance to the Ukrainian government and critical infrastructure entities under the Cyber Defense Assistance Collaborative — including compromise assessments, incident response services, shared cyber threat intelligence, and security transformation services — to help the Ukrainian government detect, mitigate, and defend against cyber attacks. In addition, we continue to implement protections for users and track and disrupt cyber threats to help raise awareness among the security community and high risk users and maintain information quality. This level of collective defense — between governments, companies, and security stakeholders across the world — is unprecedented in scope. It is important then to pause and reflect on this work and our learnings one year later, and share those with the global security community to help prepare better defenses for the future. This report outlines our analysis of these issues and includes the following three observations, informed by over two decades of experience managing complex global security events

    Enhanced Fluoride Over-Coated Al Mirrors for FUV Astronomy

    Get PDF
    Astronomical observations in the Far Ultraviolet (FUV) spectral region are some of the more challenging due to the very distant and faint objects that are typically searched for in cosmic origin studies such as origin of large scale structure, the formation, evolution, and age of galaxies and the origin of stellar and planetary systems. These challenges are driving the need to improve the performance of optical coatings over a wide spectral range that would increase reflectance in mirrors and reduced absorption in dielectric filters used in optical telescope for FUV observations. This paper will present recent advances in reflectance performance for Al+MgF2 mirrors optimized for Lyman-alpha wavelength by performing the deposition of the MgF2 overcoat at elevated substrate temperatures. We will also present optical characterization of little studied rare-earth fluorides such as GdF3 and LuF3 that exhibit low-absorption over a wide wavelength range and could therefore be used as high refractive index alternatives for dielectric coatings at FUV wavelengths

    A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth

    Get PDF
    Illicit crypto-mining leverages resources stolen from victims to mine cryptocurrencies on behalf of criminals. While recent works have analyzed one side of this threat, i.e.: web-browser cryptojacking, only commercial reports have partially covered binary-based crypto-mining malware. In this paper, we conduct the largest measurement of crypto-mining malware to date, analyzing approximately 4.5 million malware samples (1.2 million malicious miners), over a period of twelve years from 2007 to 2019. Our analysis pipeline applies both static and dynamic analysis to extract information from the samples, such as wallet identifiers and mining pools. Together with OSINT data, this information is used to group samples into campaigns. We then analyze publicly-available payments sent to the wallets from mining-pools as a reward for mining, and estimate profits for the different campaigns. All this together is is done in a fully automated fashion, which enables us to leverage measurement-based findings of illicit crypto-mining at scale. Our profit analysis reveals campaigns with multi-million earnings, associating over 4.4% of Monero with illicit mining. We analyze the infrastructure related with the different campaigns, showing that a high proportion of this ecosystem is supported by underground economies such as Pay-Per-Install services. We also uncover novel techniques that allow criminals to run successful campaigns.Comment: A shorter version of this paper appears in the Proceedings of 19th ACM Internet Measurement Conference (IMC 2019). This is the full versio

    中国の脅威と靖国神社

    Get PDF
    原著Original国立情報学研究所で電子

    Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

    Full text link
    Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register domains that combine a popular trademark with one or more phrases (e.g., betterfacebook[.]com, youtube-live[.]com). We perform the first large-scale, empirical study of combosquatting by analyzing more than 468 billion DNS records---collected from passive and active DNS data sources over almost six years. We find that almost 60% of abusive combosquatting domains live for more than 1,000 days, and even worse, we observe increased activity associated with combosquatting year over year. Moreover, we show that combosquatting is used to perform a spectrum of different types of abuse including phishing, social engineering, affiliate abuse, trademark abuse, and even advanced persistent threats. Our results suggest that combosquatting is a real problem that requires increased scrutiny by the security community.Comment: ACM CCS 1

    Optical Coating Performance for Heat Reflectors of the JWST-ISIM Electronic Component

    Get PDF
    A document discusses a thermal radiator design consisting of lightweight composite materials and low-emittance metal coatings for use on the James Webb Space Telescope (JWST) structure. The structure will have a Thermal Subsystem unit to provide passive cooling to the Integrated Science Instrument Module (ISIM) control electronics. The ISIM, in the JWST observatory, is the platform that provides the mounting surfaces for the instrument control electronics. Dissipating the control electronic generated-heat away from JWST is of paramount importance so that the spacecraft s own heat does not interfere with the infrared-light gathering of distant cosmic sources. The need to have lateral control in the emission direction of the IEC (ISIM Electronics Compartment) radiators led to the development of a directional baffle design that uses multiple curved mirrorlike surfaces. This concept started out from the so-called Winston non-imaging optical concentrators that use opposing parabolic reflector surfaces, where each parabola has its focus at the opposite edge of the exit aperture. For this reason they are often known as compound parabolic concentrators or CPCs. This radiator system with the circular section was chosen for the IEC reflectors because it offers two advantages over other designs. The first is that the area of the reflector strips for a given radiator area is less, which results in a lower mass baffle assembly. Secondly, the fraction of energy emitted by the radiator strips and subsequently reflected by the baffle is less. These fewer reflections reduced the amount of energy that is absorbed and eventually re-emitted, typically in a direction outside the design emission range angle. A baffle frame holds the mirrors in position above a radiator panel on the IEC. Together, these will direct the majority of the heat from the IEC above the sunshield away towards empty space
    corecore