680 research outputs found

    The value of taking notes during lectures

    Get PDF
    Running title: Taking notesIncludes bibliographical references (p. 42-47)Pursuant to contract no. 400-81-0030 of the National Institute of Educatio

    Does text structure/summarization instruction facilitate learning from expository text?

    Get PDF
    The work upon which this publication is based was performed pursuant to Contract no. NIE-400-81-0030 of the National Institute of Educatio

    Oral Care to Prevent Non-Ventilator Hospital Acquired Pneumonia

    Get PDF

    Is Your Susceptibility to Phishing Dependent on Your Memory?

    Get PDF
    Phishing has become a major attack vector for hackers and cost victims $687 million in the first half of 2012 alone. Additionally, despite technical solutions to defend against this threat, reports show that phishing attacks are increasing. There is therefore a pressing need to understand why users continue to fall victim to phishing, and how such attacks can be prevented. In this research-in-progress paper, we argue that the cognitive neuroscience of memory provides a useful lens through which to study the problem of phishing. A commonly reported finding from the field of memory is the eye movement-based memory effect, the phenomenon of people paying less visual attention to images that have been previously viewed. We aim to show in this paper that this effect holds in the context of email processing, and that the eye movement-based memory effect is a significant contributing factor to users’ susceptibility to phishing. We propose an experimental design that uses a memory task involving simulated phishing emails, and measures users’ behavioral responses and eye tracking data in response to our phishing manipulations. We further propose to show how training can be designed to help users overcome the eye movement-based memory effect and become less prone to phishing attacks

    Family Influence on Fruit and Vegetable Consumption Among Rural, Low-Income, Preschool Children: A Preliminary Investigation of Factors Associated with Obesity

    Get PDF
    Children raised in families with low incomes and educational levels are at-risk of food insecurity and inadequate dietary intake, particularly consumption of fruits and vegetables which is often associated with increased risk of obesity. Family Influence on Fruit and Vegetable Consumption Among Rural, Low-Income Preschool Children: A Preliminary Investigation of Factors Associated with Obesity focused on the influence of both mothers and grandmothers on the food intake of young children—a phenomena not extensively found in nutrition literature yet called for at the April, 2008 NIH Conference on Decision Making in Eating Behavior: Integrating Perspectives from the Individual, Family, and Environment Meeting. This project was designed to provide preliminary data regarding similarities and differences in nutrition-related predictors: socio-economic status, food security, access to food outlets, attitudes and behaviors. Resources, feeding practices, and personal dietary habits of 62 rural low-income mothers and grandmothers were determined. Implications for future research and programmatic initiatives are noted. This project also tested instrumentation and data collection methodologies for utility in a future, more extensive, study of intergenerational family factors affecting obesity among the targeted population. A grant proposal was submitted to USDA for funds through the National Research Initiative

    Dependability Auditing with Model Checking

    Get PDF
    Model checking offers a methodology for determining whether a model satisfies a list of correctness requirements. We propose a theory of dependability auditing with model checking based on four principles: (1) The modeling process should be partitioned into computational components and behavioral components as an aid to system understanding; (2) The complex system will be abstracted to create a model; (3) A language must be available that can represent and evaluate states and processes that evolve over time; (4) Given an adequate model and temporal specifications, a model checker can verify whether or not the input model is a model of that specification: the specification will not fail in the model. We demonstrate this theoretical framework with Web Services and electronic contracting

    One Family at a Time: A Prevention Program for At-Risk Parents

    Get PDF
    The purpose of this study was to examine the effectiveness of a psychoeducational parenting program with at-risk parents of young children. At-risk was defined as excessive parental use of verbal and corporal punishment combined with low-income status. All families were seen for 10 weeks, either individually or in very small groups. Results showed that compared with the control group, parents participating in the program significantly decreased their levels of verbal and corporal punishment, anger, stress, and reported child behavior problems; results were maintained at follow-up. Implications for counselors are provided

    Nurses Involvement in Nursing Home Culture Change: Overcoming Barriers, Advancing Opportunities

    Get PDF
    Summarizes discussions from a 2008 interdisciplinary panel convened to identify facilitators and barriers to nurses' involvement in culture change in nursing homes and actions to promote nurse competencies in resident-directed care. Makes recommendations
    • …
    corecore