2,034 research outputs found

    Quantum Chemical Methods: Its history and future

    Get PDF

    CYBER SECURITY @ HOME: The Effect of Home User Perceptions of Personal Security Performance on Household IoT Security Intentions

    Get PDF
    This study explored potential human factors predictors of home user security intentions through the lens of past performance, perceived self-efficacy, and locus of control. While perceived self-efficacy and locus of control are elements in several organizational and individual security models, past performance has been less frequently studied. The variable, past performance, which has been referred to in other studies as prior experience, knowledge, and information security awareness, is usually a single question self-assessment of familiarity or comfort with technology. This study explores user technical prowess in further depth, using formal technical education, informal technical education, employment in an IT/CS field, and self-reported email and internet security measures as a measurement of technical ability. Security intentions were determined by best practices in hardware security, network security, and IoT device protection. Studying IoT security in home users is important because there are 26.6 billion devices connected to the Internet already, with 127 devices are being added to the network every second, which creates a very large attack surface if left unsecured. Unlike organizations, with dedicated IT departments, home users must provide their own security within their network. Instead of building security around the user, this research attempts to determine what human factors variables effect intentions to use existing security technologies. Through an online survey, home users provided information on their background, device usage, perceived ability to perform security behaviors, level of control over their environment, current security intentions, and future security intentions. Hierarchical linear regression, path modeling, and structural equation modeling determined that past performance was consistently the strongest predictor of security intentions for home users. Self-efficacy and locus of control had varying results among the disparate methods. Additionally, exposure to security concepts through the survey had an effect on user security intentions, as measured at the end of the survey. This research contributed an initial model for the effects of past performance, self-efficacy, and locus of control on security intentions. It provided verification for existing self-efficacy and locus of control measurements, as well as comprehensive, modular security intentions survey questions. Additionally, this study provided insight into the effect of demographics on security intentions

    Jack Voltaic 2.0: Threats to Critical Infrastructure

    Get PDF
    Although digital connectivity has made our infrastructure more efficient, it has made it more vulnerable to attack. As a result, infrastructure resilience is more critical today than ever before. Cyberspace attacks rarely affect a single target; instead their effects, anticipated and unanticipated, ripple across interconnected infrastructure sectors. Differing abilities to recognize a cyberspace attack, limited information sharing, varying defense capabilities, and competing authorities complicate the response. These gaps in cybersecurity leave our Nation vulnerable to exploitation by a determined adversary. The Jack Voltaic 2.0 Cyber Research Project is an innovative, bottom-up approach to developing critical infrastructure resilience. Developed by the Army Cyber Institute at West Point and hosted by the City of Houston, in partnership with AECOM and Circadence, this research assembled critical infrastructure partners to study cybersecurity and protection gaps

    Coordinating Advanced Crowd Work: Extending Citizen Science

    Get PDF
    Crowdsourcing work with high levels of coupling between tasks poses challenges for coordination. This paper presents a study of an online citizen science project that involved volunteers in such tasks: not just analyzing bulk data but also interpreting data and writing a paper for publication. However, extending the reach of citizen science adds tasks with more dependencies, which calls for more elaborate coordination mechanisms but the relationship between the project and volunteers limits how work can be coordinated. Contrariwise, a mismatch between dependencies and available coordination mechanisms can be expected to lead to performance problems. The results of the study offer recommendations for design of crowdsourcing of more complex tasks

    Using Developmental Frameworks to Implement Focus Groups in School-Aged Children

    Get PDF
    This poster describes the use of virtual focus groups with school-aged children in the development of a pediatric wellbeing picture scale to screen for mental health and wellbeing. Children\u27s opinions, creative ideas, and insights allow acquisition of new data and knowledge, but unfortunately, are frequently overlooked. When using developmentally-based principles, focus groups have been shown to be a successful and reliable method for collecting data from this age group and a novel way to better understand the child’s interactions and experiences. Focus groups have a number of advantages, allowing for in-depth exploration of discussion by the participants. Students in Nursing 499 conducted developmentally-based focus groups with children grades 3-5 to develop the Pediatric Well Being Picture Scale. Basing focus groups on theoretical frameworks of Piaget, Erikson, and Kohlberg creates an environment conducive to open discussion and expression of children’s ideas. These focus groups give children the opportunity to connect to one another and feel more comfortable in talking about items about emotional wellbeing. This allowed the researcher to gain an understanding of the children’s perspective for the items on the wellbeing scale. Limitations noted due to the virtual environment included maintaining the child’s attention, adequacy of technology, and assuring that each child had the opportunity to equally participate. Benefits include more openness and candor due a sense of anonymity from not being in the same location.https://orb.binghamton.edu/research_days_posters_2022/1066/thumbnail.jp

    Ccdc11 is a novel centriolar satellite protein essential for ciliogenesis and establishment of left-right asymmetry

    Get PDF
    The establishment of left–right (L-R) asymmetry in vertebrates is dependent on the sensory and motile functions of cilia during embryogenesis. Mutations in CCDC11 disrupt L-R asymmetry and cause congenital heart disease in humans, yet the molecular and cellular functions of the protein remain unknown. Here we demonstrate that Ccdc11 is a novel component of centriolar satellites—cytoplasmic granules that serve as recruitment sites for proteins destined for the centrosome and cilium. Ccdc11 interacts with core components of satellites, and its loss disrupts the subcellular organization of satellite proteins and perturbs primary cilium assembly. Ccdc11 colocalizes with satellite proteins in human multiciliated tracheal epithelia, and its loss inhibits motile ciliogenesis. Similarly, depletion of CCDC11 in Xenopus embryos causes defective assembly and motility of cilia in multiciliated epidermal cells. To determine the role of CCDC11 during vertebrate development, we generated mutant alleles in zebrafish. Loss of CCDC11 leads to defective ciliogenesis in the pronephros and within the Kupffer’s vesicle and results in aberrant L-R axis determination. Our results highlight a critical role for Ccdc11 in the assembly and function of motile cilia and implicate centriolar satellite–associated proteins as a new class of proteins in the pathology of L-R patterning and congenital heart disease
    • 

    corecore