Search results for "ABILITIES"

showing 8 items of 538 documents

Positive Effects of Videogame Use on Visuospatial Competencies: The Impact of Visualization Style in Preadolescents and Adolescents

2019

Use of videogames (VGs) is almost ubiquitous in preadolescents' and adolescents' everyday life. One of the most intriguing research topics about positive effects of VG use is about the domain of visuospatial competencies. Previous research show that training with videogames enables children and adolescents to improve their scores in visuospatial tests (such as mental rotation of shapes and cubes), and that such training could overcome gender differences in these domains. Our study aimed at (1) verifying the positive effects of videogame use in the visuospatial domain both for male and female adolescents and preadolescents and (2) verifying whether the visualization style (2D or isometric 3D…

visuospatial abilitiesSpatial Visualization05 social scienceslcsh:BF1-990preadolescence050105 experimental psychologyMental rotationLearning effectVisualizationStyle (sociolinguistics)Developmental psychology03 medical and health sciencesSettore M-PSI/04 - PSICOLOGIA DELLO SVILUPPO E PSICOLOGIA DELL'EDUCAZIONE0302 clinical medicinelcsh:Psychologyspatial cognitionAdolescence; Preadolescence; Spatial cognition; Videogames; Visuospatial abilitiesPsychology0501 psychology and cognitive sciencesadolescencevideogamesPsychology030217 neurology & neurosurgeryGeneral PsychologyOriginal ResearchFrontiers in Psychology
researchProduct

Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures

2022

Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…

vulnerabilitiesATCcybersecurity1090MHzlentoliikenneAerospace Engineeringcountermeasuresavionics978MHzdatalinkATMpentestingaviationexperimental platformElectrical and Electronic EngineeringUATlennonjohtoEFBkyberturvallisuusverkkohyökkäyksetlennonvarmistusADS-B1090ESIEEE Transactions on Aerospace and Electronic Systems
researchProduct

E-health systems in digital environments

2019

As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…

vulnerabilitiescyber threathealthcare systemsterveysalaetäpalvelutcyber-attackstelemedicineteleterveydenhuoltokyberturvallisuusdigitalisaatioverkkohyökkäyksethaavoittuvuus
researchProduct

Ontology and protocol secure for SCADA

2014

In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, this is an encryption tech…

vulnerabilitiessecurity protocolsdata acquisitionencryption technologycyber securityembedded applicationssupervisory controlsemantic attackssemantic security blocksecurity ontology[INFO] Computer Science [cs]SOAP protocollow latencyModbus protocolECC cryptographySCADAcontrol systems[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Assessment of Occupational Health and Job Satisfaction in Workers with Intellectual Disability: A Job Demands–Resources Perspective

2021

In the contexts where people with intellectual disability work, there are factors that determine their job satisfaction. The objective of this study was to test the adequacy of the central assumptions of the Job Demands–Resources (JD-R) theory in workers with intellectual disability employed in different work alternatives. Data from 362 workers in sheltered workshops and 192 workers in supported employment were utilized. The model was contrasted using a structural equation model and a multi-group analysis. The results supported the suitability of the model and confirmed that job demands and job resources evoke two relatively independent processes such as health impairment and motivational p…

work engagement030506 rehabilitationassessmentHealth Toxicology and MutagenesisApplied psychologylcsh:Medicinejob demands–resources theoryArticleJob SatisfactionStructural equation modelingOccupational safety and health03 medical and health sciencesIntellectual DisabilitySurveys and Questionnairesexhaustion0502 economics and businessIntellectual disabilitymedicinework-related factorsHumansOccupational HealthSupported employmentMotivationWork engagementlcsh:R05 social sciencesPublic Health Environmental and Occupational Healthmedicine.diseaseTest (assessment)Work (electrical)Job satisfactionintellectual disabilities0305 other medical sciencePsychology050203 business & managementInternational Journal of Environmental Research and Public Health
researchProduct

Working memory profiles of children with learning disabilities.

2012

working memory learning disabilities
researchProduct

Measuring Working Memory for the diagnosis of mathematics learning disabilities: The PML test battery.

2012

working memory math learning disabilities
researchProduct

Young women’s contradictory expectations and their perceived capabilities for future work-family reconciliation in Finland

2022

This paper explores young women’s expectations on future work-family reconciliation in Finland, a Nordic country well-known for the promotion of gender equality. Utilising Sen’s capabilities approach, we content-analysed thirty individual interviews to identify differences in women’s expectations and their perceived capabilities in future work and care. The results showed that irrespective of their labour market status and educational attainment, the women’s expectations were contradictory, reflecting a current Finnish gender culture that embraces both the ideal of shared parenthood and the primacy of maternal care. Between-group differences were also found. The employed women perceived the…

young womennaisetSociology and Political Sciencevanhemmuusyhteensovittaminenwork-family reconciliationGeneral Social Sciencesihanteetperhe-elämätyötasa-arvokoulutustasosukupuoliroolittyössäkäyntieriarvoisuusodotuksetcapabilitiesäitiystulevaisuustyöelämäLife-span and Life-course StudiesexpectationsJournal of Youth Studies
researchProduct