1,469 research outputs found

    Workplace Stressors and Withdrawal Intentions in Law Enforcement: The Role of Living a Calling

    Get PDF
    Working in law enforcement is considered a dangerous and challenging profession. Not only do law enforcement officers experience stress related to job tasks but they experience additional job stress related to organizational processes and procedures. Ongoing exposure to job stress can lead to low job satisfaction and high job turnover (Biggs, Brough & Barbour, 2014). However, the job turnover for those in law enforcement is only approximately ten percent. To date, there has been no research examining this discrepancy or predictors of low withdrawal intentions in law enforcement. This study looks to examine the relationship between living a calling, job stressors, perceived organization and withdrawal intentions for those working in law enforcement. A survey was distributed to sworn, law enforcement officers currently working in a law enforcement role (N=134). The results suggest that living a calling predicts low withdrawal intentions for law enforcement officers who consider their work as a calling. Job stressors or perceived organizational support were not shown to influence the living a calling and low withdrawal intentions relationship. The implications and limitations of this study are also discussed

    The Study of Neurological Response in Art Therapy and Trauma: A Literature Review

    Get PDF
    This review will focus on neurological research and art therapy practice to consider benefits of the integration of science and the creative therapies. These topics will be addressed through a trauma informed theoretical lens, focusing on Post-Traumatic Stress Disorder and Traumatic Brain Injury diagnoses in the US military veteran population. Arts-based, qualitative, and quantitative research were correlated within this review to discover links between neurology and art therapy’s unique impact on trauma, and the outcome of combining these practices. The conclusions found that, with limited research connecting these two fields, there is a possibility for enhanced trauma treatment through the integration of neurological research and art therapy practice

    Sicherheit von Cloud-basierten Plattformen zur Anwendungsintegration : eine Bewertung aktueller Angebote

    Get PDF
    Cloud-basierte Plattformen zur Anwendungsintegration versprechen die einfache und kostengünstige Integration zwischen Anwendungen in der Cloud und bestehenden „On-Premise“-Anwendungen. Sie bieten zahlreiche Anwendungsadapter und erlauben den grafischen Entwurf, die Ausführung und die Verwaltung von komplexen Integrationsprozessen in der Cloud. Allerdings sind sie sicherheitskritische Elemente innerhalb der IT-Architektur, da sie Zugriff auf unterschiedliche Anwendungen und Daten des Unternehmens haben können. Daher stellt sich die Frage, inwiefern notwendige Sicherheitsanforderungen durch die Anbieter Cloud-basierter Plattformen erfüllt werden. In diesem Artikel werden sieben ausgewählte Integrationsplattformen detaillierter betrachtet und anhand der Sicherheitsanforderungen des Bundesamtes für Sicherheit in der Informationstechnik (BSI) bewertet

    “Collaborative” provenance research – About the (im)possibility of smashing colonial frameworks

    Get PDF
    This article aims to reflect on the aporias and paradoxes of a postcolonial, collaborative research approach to ethnographic collections dating from colonial times. While, at least in Germany, ‘provenance research’ and ‘collaboration’ have become politically opportune, important questions concerning the possibilities or impossibilities of overcoming colonial categories, epistemologies and imbalances of power remain to be answered. Based on research and collaboration with stakeholders over the course of two projects on the Tanzania collections of the Ethnologisches Museum Berlin, this article asks how far ‘collaboration’ and ‘decolonization’ risk remaining merely empty, fashionable phrases, if, on the one hand, today’s concern with the colonial context of collections in European museums seems to be to a great extent self-referential and avoiding radical criticism of today’s power asymmetries; and, on the other, the deconstruction of colonial class, gender, race, and ethnic categorizations, and of the resulting representations is hindered – if not made impossible – by the epistemologies implicit in the order of the collections themselves but also by identity politic

    Design Principles for Digital Upskilling in Organizations

    Get PDF

    Analyze Before You Sensitize: Preparation of a Targeted ISA Training

    Get PDF
    This paper describes a procedure to enable the planning of targeted measures to increase the Information Security Awareness (ISA) of employees of an institution. The procedure is practically applied at a German university. With the help of a comprehensive analysis, which is based on findings of social psychology, necessary topics for ISA measures are identified. In addition, reasons are sought for why employees do not conduct information security. The procedure consists of a qualitative phase with interviews and a quantitative phase with a questionnaire. It turned out that the procedure provided many clues to the design of ISA measures. These include organizational and technical measures that can help employees to ensure information-safe behavior. In addition, it was found that there were deviations between the qualitative and quantitative phases and therefore, both phases are necessary. The paper critically discusses the procedure and also addresses the strengths and weaknesses of the analysis

    Integration Platform as a Service

    Get PDF
    Erworben im Rahmen der Schweizer Nationallizenzen (http://www.nationallizenzen.ch)Around 2000, the term “enterprise application integration” (EAI) became popular with IT departments. Until then, silo applications – custom-developed or packaged, host- or client-server-based – had been connected with numerous point-to-point interfaces. The resulting complexity of the application landscape affected the implementation of additional business requirements such as electronic marketplaces, e-commerce, and supply chain management. Commonly used middleware techniques such as message queues, object request brokers, or remote procedure calls required significant and costly alterations of source and target systems

    Developing a Maturity Model for Information Security Awareness Using a Polytomous Extension of the Rasch Model

    Get PDF
    Advancing digitization in companies leads to increased importance of information and their security. Since people play a crucial role in protecting information, it is important to sensitize them to information security. Many companies find it difficult to raise the so-called information security awareness (ISA) in a planned and targeted way. With a maturity model (MM) for ISA, companies are able to carry out an assessment of the current state regarding ISA and thereby actively manage and plan their future ISA measures. The proposed MM has five maturity levels that were determined mathematically with the help of a polytomous extension of the Rasch model and a hierarchical cluster analysis. The required data for the calculations has been gathered with a survey among 105 organizations. The evaluation has shown that the MM is well-suited to identify strengths and weaknesses with regard to ISA within organizations

    Automated Measuring of Information Security Related Habits

    Get PDF
    Since the digital age requires interaction with digital services, the information security awareness (ISA) of everyone gets more important than ever. Since the ISA is defined as a set of aspects, it is not enough to increase the knowledge. This work focuses on the aspect of habits. Therefore, we used design science research to create an artifact which allows the automated measurement of habits. The automation can be achieved through a client-server application which tracks the behavior of employees in a GDPR-compliant way and calculates multiple metrics based on the tracked behavior. However, not all of the defined metrics are applicable in every company. Therefore, additional process iterations of the design science research methodology are required
    corecore