Search results for "Computer security"
showing 10 items of 433 documents
Development and validation of the Spanish Hazard Perception Test.
2014
The aim of the current study is to develop and obtain valid evidence for a hazard perception test suitable for the Spanish driving population. To obtain valid evidence to support the use of the test, the effect of hazardous and quasi-hazardous situations on the participants' hazard prediction is analyzed and the pattern of results for drivers with different driving experience--that is, learner, novice, and expert drivers and reoffender vs. nonoffender drivers--is compared. Potentially hazardous situations are those that develop without involving any real hazard (i.e., the driver did not actually have to decelerate or make any evasive maneuver to avoid a potential collision). The current stu…
Inhibiting and Facilitating Factors to End a Violent Relationship: Patterns of Behavior Among Women in Spain
2013
The objective of this study are (a) to explore the factors, which facilitate or inhibit women’s responses to intimate partner violence (IPV) and their ability to leave a violent relationship; (b) to identify patterns of behavior in abused women based on their perception of the violence and the actions they take to find help or a solution to the problems derived from IPV. Semistructured interviews were carried out. The critical path is defined as the sequence of decisions and actions taken by affected women to address the violence they experienced. Based on this concept, we identified several factors that affect women’s responses to violence, and categorized them into inhibiting and facilita…
Usability and Trust in E-Banking
2007
This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…
Supporting Reporting: On the Positive Effects of Text- and Video-Based Awareness Material on Responsible Journalistic Suicide News Writing.
2016
Suicide is a global public health problem. Media impact on suicide is well confirmed and there are several recommendations on how media should and should not report on suicide to minimize the risk of copycat behavior. Those media guidelines have been developed to improve responsible reporting on suicide (RRS). Although such guidelines are used in several countries, we lack empirical evidence on their causal effect on actual journalistic news writing. We conducted an experiment with journalism students (N = 78) in Germany in which we tested whether exposure to awareness material promoting RRS influences news writing. As a supplement to the widely used text-based material, we tested the impac…
Factorial Structure of Web-Credibility in a population of Italian Internet Users. A pilot study
2009
Recent studies by Fogg and his colleagues have defined a new psychological construct called Web credibility. It describes the principal dimensions which lead people to believe (or not) online information. In this framework, the factorial structure of Web credibility was explored in a sample of 152 Italian students of psychology who were Internet users, using a questionnaire. A consistent four-factorial structure emphasized crucial aspects of Web credibility, namely, Inaccuracy, Efficiency, Social Validation, and Commercial Features. Such results seem in line with Fogg's theoretical model; however, further research is required to identify dimensions of this construct.
Sleepiness, sleep, and use of sleepiness countermeasures in shift-working long-haul truck drivers
2015
Driver sleepiness is a prevalent phenomenon among professional drivers working unconventional and irregular hours. For compromising occupational and traffic safety, sleepiness has become one of the major conundrums of road transportation. To further elucidate the phenomenon, an on-road study canvassing the under-explored relationship between working hours and sleepiness, sleep, and use of sleepiness countermeasures during and outside statutory rest breaks was conducted. Testing the association between the outcomes and working hours, generalized estimating equations models were fitted on a data collected from 54 long-haul truck drivers (mean 38.1 ± 10.5 years, one female) volunteering in the…
Pseudonyms for Cancer Registries
1996
AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be prote…
State of the Art Literature Review on Network Anomaly Detection
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…