Search results for "Computer security"

showing 10 items of 433 documents

Development and validation of the Spanish Hazard Perception Test.

2014

The aim of the current study is to develop and obtain valid evidence for a hazard perception test suitable for the Spanish driving population. To obtain valid evidence to support the use of the test, the effect of hazardous and quasi-hazardous situations on the participants' hazard prediction is analyzed and the pattern of results for drivers with different driving experience--that is, learner, novice, and expert drivers and reoffender vs. nonoffender drivers--is compared. Potentially hazardous situations are those that develop without involving any real hazard (i.e., the driver did not actually have to decelerate or make any evasive maneuver to avoid a potential collision). The current stu…

AdultMaleEngineeringAutomobile DrivingAdolescentPsychometricsApplied psychologyPopulationVideo RecordingPoison controlComputer securitycomputer.software_genreOccupational safety and healthYoung AdultRisk-TakingInjury preventionHumanseducationeducation.field_of_studybusiness.industryPublic Health Environmental and Occupational HealthHuman factors and ergonomicsReproducibility of ResultsMiddle AgedCollisionHazardTest (assessment)SpainAutomobile Driver ExaminationFemaleSafetybusinessSafety ResearchcomputerLicensureTraffic injury prevention
researchProduct

Inhibiting and Facilitating Factors to End a Violent Relationship: Patterns of Behavior Among Women in Spain

2013

The objective of this study are (a) to explore the factors, which facilitate or inhibit women’s responses to intimate partner violence (IPV) and their ability to leave a violent relationship; (b) to identify patterns of behavior in abused women based on their perception of the violence and the actions they take to find help or a solution to the problems derived from IPV. Semistructured interviews were carried out. The critical path is defined as the sequence of decisions and actions taken by affected women to address the violence they experienced. Based on this concept, we identified several factors that affect women’s responses to violence, and categorized them into inhibiting and facilita…

AdultMaleEngineeringHealth (social science)media_common.quotation_subjectHealth BehaviorPoison controlComputer securitycomputer.software_genreAffect (psychology)Suicide preventionOccupational safety and healthPathology and Forensic MedicineDevelopmental psychologyYoung AdultRisk FactorsPerceptionInjury preventionHumansInterpersonal RelationsInternal-External Controlmedia_commonbusiness.industryBattered WomenHuman factors and ergonomicsGeneral MedicineMiddle AgedSelf ConceptSexual PartnersSocial PerceptionSpainIntergenerational RelationsSpouse AbuseDomestic violenceFemalebusinessAttitude to HealthLawcomputerViolence and Victims
researchProduct

Usability and Trust in E-Banking

2007

This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…

AdultMaleSettore M-PSI/01 - Psicologia GeneraleEconomicse-banking e-banking servicesInternet privacyTrustSecurity policyRisk AssessmentUser groupHumansStudentsWeb usabilityComputer SecurityGeneral PsychologyInternetAttitude to Computersbusiness.industryData CollectionFraudE bankingUsabilityItalyInstitution (computer science)FemalePsychologybusinessPsychological Reports
researchProduct

Supporting Reporting: On the Positive Effects of Text- and Video-Based Awareness Material on Responsible Journalistic Suicide News Writing.

2016

Suicide is a global public health problem. Media impact on suicide is well confirmed and there are several recommendations on how media should and should not report on suicide to minimize the risk of copycat behavior. Those media guidelines have been developed to improve responsible reporting on suicide (RRS). Although such guidelines are used in several countries, we lack empirical evidence on their causal effect on actual journalistic news writing. We conducted an experiment with journalism students (N = 78) in Germany in which we tested whether exposure to awareness material promoting RRS influences news writing. As a supplement to the widely used text-based material, we tested the impac…

AdultMaleSuicide PreventionAdolescentJournalismWritingeducationApplied psychologyVideo RecordingPoison controlGuidelines as TopicComputer securitycomputer.software_genreSuicide prevention03 medical and health sciencesYoung Adult0302 clinical medicineEducation ProfessionalGermanyInjury preventionMedicineHumans030212 general & internal medicineMass MediaStudentsMass mediaAudiovisual Aidsbusiness.industryHuman factors and ergonomicsAwarenessMiddle AgedImitative Behavior030227 psychiatryPsychiatry and Mental healthClinical PsychologyCopycatddc:300JournalismFemalebusinesscomputerSocial cognitive theoryArchives of suicide research : official journal of the International Academy for Suicide Research
researchProduct

Factorial Structure of Web-Credibility in a population of Italian Internet Users. A pilot study

2009

Recent studies by Fogg and his colleagues have defined a new psychological construct called Web credibility. It describes the principal dimensions which lead people to believe (or not) online information. In this framework, the factorial structure of Web credibility was explored in a sample of 152 Italian students of psychology who were Internet users, using a questionnaire. A consistent four-factorial structure emphasized crucial aspects of Web credibility, namely, Inaccuracy, Efficiency, Social Validation, and Commercial Features. Such results seem in line with Fogg's theoretical model; however, further research is required to identify dimensions of this construct.

AdultMaleWeb-credibilitySettore M-PSI/01 - Psicologia GeneraleFactorialWeb credibilityPopulationPilot ProjectsSample (statistics)EfficiencyModels PsychologicalTrustcognitive assessementWorld Wide WebUser-Computer InterfaceSurveys and QuestionnairesHumansStudentseducationGeneral PsychologyStructure (mathematical logic)Interneteducation.field_of_studyAttitude to ComputersPrincipal (computer security)Equipment DesignTranslatingItalyFemaleInternet usersFactor Analysis StatisticalConstruct (philosophy)PsychologySocial psychologyfactorial study
researchProduct

Sleepiness, sleep, and use of sleepiness countermeasures in shift-working long-haul truck drivers

2015

Driver sleepiness is a prevalent phenomenon among professional drivers working unconventional and irregular hours. For compromising occupational and traffic safety, sleepiness has become one of the major conundrums of road transportation. To further elucidate the phenomenon, an on-road study canvassing the under-explored relationship between working hours and sleepiness, sleep, and use of sleepiness countermeasures during and outside statutory rest breaks was conducted. Testing the association between the outcomes and working hours, generalized estimating equations models were fitted on a data collected from 54 long-haul truck drivers (mean 38.1 ± 10.5 years, one female) volunteering in the…

AdultMalemedicine.medical_specialtySleepinessEveningShift workPoison controlTransportationHuman Factors and ErgonomicsComputer securitycomputer.software_genreCoffeeOccupational safety and healthShift workOn-road studySleep Disorders Circadian RhythmCaffeineSurveys and QuestionnairesWork Schedule ToleranceOdds RatioHumansMedicineAttentionOccupationsSocial BehaviorSafety Risk Reliability and Qualityta515FinlandRoad transportationMorningbusiness.industryAccidents TrafficPublic Health Environmental and Occupational HealthActigraphyta3142Middle AgedConfidence intervalSleepiness countermeasureMotor VehiclesAlertnessPhysical therapyCentral Nervous System StimulantsFemaleSleepbusinesscomputerAccident Analysis & Prevention
researchProduct

Pseudonyms for Cancer Registries

1996

AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be prote…

Advanced and Specialized NursingInformation privacyeducation.field_of_studybusiness.industryPopulationHealth InformaticsCryptographyPseudonymComputer securitycomputer.software_genreHealth informaticsData flow diagramHealth Information ManagementSynonym (database)MedicinebusinesseducationcomputerRequirements analysisMethods of Information in Medicine
researchProduct

State of the Art Literature Review on Network Anomaly Detection

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatComputer science05 social sciences050801 communication & media studiesDenial-of-service attack02 engineering and technology021001 nanoscience & nanotechnologyComputer securitycomputer.software_genrenetwork anomaly detection0508 media and communicationsAnomaly detectionState (computer science)tietoturva0210 nano-technologyverkkohyökkäyksetcomputer
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct