1,293 research outputs found

    Modeling inertia causatives:validating in the password manager adoption context

    Get PDF
    Cyber criminals are benefiting from the fact that people do not take the required precautions to protect their devices and communications. It is the equivalent of leaving their home’s front door unlocked and unguarded, something no one would do. Many efforts are made by governments and other bodies to raise awareness, but this often seems to fall on deaf ears. People seem to resist changing their existing cyber security practices: they demonstrate inertia. Here, we propose a model and instrument for investigating the factors that contribute towards this phenomenon

    Calculs 3d prédictifs pour la conception d'alvéoles de stockage de déchets radioactifs HAVL

    Get PDF
    National audienceFor the "HA cells" experimentation in the URL of Bure (Andra), coupled mechanical modelings (creep or hydraulic behavior) were carried out to predict the expected behavior of argillites during excavation of a disposal cell (stresses, displacements, EDZ). These predictions are then compared to in situ measurements (displacement and pore pressure).Dans le cadre de l'expérimentation "alvéoles HA" au laboratoire souterrain de recherche de Bure (Andra), des modélisations mécaniques couplées (comportement différé ou hydraulique) ont été réalisées pour prédire le comportement attendu des argilites à l'excavation d'une alvéole (contraintes, déplacements, EDZ). Elles sont ensuite comparées avec les mesures in situ (déplacements et pression interstitielle)

    Difficultés conceptuelles des troubles de personnalité

    Get PDF
    Grùce à l'étude d'aspects comme les définitions multiples du trouble de personnalité, les données de la psychométrie la différence entre approche catégorielle et dimensionnelle, l'étiologie, la question du trait et de l'état et celle de la stabilité du diagnostic, il est suggéré qu'une meilleure connaissance des débats entourant la définition du trouble de personnalité permettra au clinicien d'apporter les subtilités nécessaires à l'établissement d'un diagnostic et d'un plan de traitement. Au delà de la connaissance des critÚres catégoriels du DSM, le clinicien aura avantage à se familiariser avec les notions de traits, dimensions et tempérament pour mieux saisir les développements de la recherche sur l'étiologie du trouble de personnalité.This article examines the debate surrounding the concepts of personality disorders through a review of the Medline literature on personality disorders definitions, psychometric studies, etiologies, categorical versus dimensional as well as trait-state issues and stability of diagnosis. It is suggested that clinicians will gain better diagnosis accuracy and more refined treatment planning if they understand the conceptual difficulties belonging to personality disorders. Beyond the knowledge of DSM diagnostic criteria, they should familiarise themselves with notions of traits, dimensions and temperament as these paradigms help to follow current developments in personality etiology research.Gracias al estudio de aspectos como las definiciones multiples del desorden de la personalidad, los resultados de la psicometria, la dife-rencia entre enfoque categorial y dimensional, la etiologia, la cuestion del rasgo y del estado y la de la estabilidad del diagnÎstico, se ha suge-rido que un mejor conocimiento de los debates al rededor de la défini- Difficultés conceptuelles des troubles de personnalité 271ciÎn del desorden de la personalidad permitirßa al clßnico esclarecer las sutilezas necesarias al diagnÎstico y al establecimiento de un plan de tratamiento. Mas alla del conocimiento de los criterios categoriales del DSM, para el clßnico es una ventaja familiarizarse con las nociones de los rasgos, dimesiones y temperamento para comprender mejor los de-sarrollos de la investigaciÎn sobre la etiologßa des desorden de la personalidad

    A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs

    Get PDF
    PurposeThere is widespread concern about the fact that small- and medium-sized enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps because smaller businesses lack sufficient situational awareness to make informed decisions in this space, or because they lack the resources to implement security controls and precautions.Design/methodology/approachIn this paper, Endsley’s theory of situation awareness was extended to propose a model of SMEs’ cyber situational awareness, and the extent to which this awareness triggers the implementation of cyber security measures. Empirical data were collected through an online survey of 361 UK-based SMEs; subsequently, the authors used partial least squares modeling to validate the model.FindingsThe results show that heightened situational awareness, as well as resource availability, significantly affects SMEs’ implementation of cyber precautions and controls.Research limitations/implicationsWhile resource limitations are undoubtedly a problem for SMEs, their lack of cyber situational awareness seems to be the area requiring most attention.Practical implicationsThe findings of this study are reported and recommendations were made that can help to improve situational awareness, which will have the effect of encouraging the implementation of cyber security measures.Originality/valueThis is the first study to apply the situational awareness theory to understand why SMEs do not implement cyber security best practice measures

    Dust emission by powder handling: Influence of the hopper outlet on the dust plume

    Get PDF
    Dust generation in solids handling involving free fall of bulk materials and impacts on a stockpile can cause many problems in industry and be a great danger for operators health. This paper describes an experimental set up to characterize the dust plume formed in free fall of powders from a hopper and investigates the influence of various outlet geometries on the dust plume. For this purpose an image analysis technique was developed to quantify the characteristics of the dust plume

    Revealing the cyber security non-compliance “attribution gulf”

    Get PDF
    Non-compliance is a well-known issue in the field of cyber security. Non-compliance usually manifests in an individual’s sins of omission or commission, and it is easy to conclude that the problem is attributable to their personal flawed decision making. However, the individual’s decision not to comply is likely also to be influenced by a range of environmental and contextual factors. Bordieu, for example, suggests that personal habitus influences decisions. We identified a wide range of possible explanations for non-compliance from the research literature and classified these, finding that a number of the identified factors were indeed habitus related. We then used Q-methodology to determine which of these non-compliance explanations aligned with public attributions of non-compliance causatives. We discovered an “attribution gulf”, with popular opinion attributing non-compliance primarily to individual failings or ignorance. The existence of this attribution gap means that those designing cyber security interventions are likely to neglect the influence of habitus on choices and decisions. We need to broaden our focus if non-compliance is to be reduced
    • 

    corecore