What Collaborators Want: Planning, Monitoring and Evaluating Research Collaborations

2017 ◽  
Vol 3 (1) ◽  
pp. 93-103 ◽  
Author(s):  
N. I. Fisher ◽  
A. J. Peacock

This article describes an approach to planning, monitoring and evaluating research collaborations based on a structured approach to eliciting and measuring the value that each partner seeks to derive from the collaboration. During the phase of formulating the collaborative arrangements, the process can bring clarity to the initial expectations of each partner and so, possibly avoid prospective difficulties from the outset. During the course of the collaboration, it provides a means of assessing where improvements in the relationship might be needed. And at the end of the project, it provides a basis for assessing what has worked well, and what might need to be considered carefully in a future collaboration. The process also provides a basis for benchmarking collaborative ventures, based on ratings associated with the critical drivers of successful partnerships. Part of the process is studied in the context of the formation of a collaboration relating to cyber security research.

Author(s):  
Hongbo Lv ◽  
Zhiying Zhou

With the wide use of smartphones, mobile cyber has become an indispensable part of our lives. While smartphones are used almost every aspect of our lives, awareness of personal information protection is underdeveloped, and information leak has become one particular problem on mobile cyber. At the same time, personal information resources have become more valuable than ever. This chapter investigates users' attitudes toward cyber information leakage and methods to protect personal information. The software SPSS 19 was used to analysis the relationship among cyber environment, applicability and practicability of protection methods, economic cost, and overall evaluation (satisfaction). A suggestion that may promote personal information awareness and promote cyber security from technical, legal, and social aspects is also provided.


2017 ◽  
Vol 21 (3) ◽  
pp. 223-241 ◽  
Author(s):  
Pablo Briñol ◽  
Richard E. Petty ◽  
Geoffrey R. O. Durso ◽  
Derek D. Rucker

The present review focuses on how power—as a perception regarding the self, the source of the message, or the message itself—affects persuasion. Contemporary findings suggest that perceived power can increase or decrease persuasion depending on the circumstances and thus might result in both short-term and long-term consequences for behavior. Given that perceptions of power can produce different, and even opposite, effects on persuasion, it might seem that any relationship is possible and thus prediction is elusive or impossible. In contrast, the present review provides a unified perspective to understand and organize the psychological literature on the relationship between perceived power and persuasion. To accomplish this objective, present review identifies distinct mechanisms by which perceptions of power can influence persuasion and discusses when these mechanisms are likely to operate. In doing so, this article provides a structured approach for studying power and persuasion via antecedents, consequences, underlying psychological processes, and moderators. Finally, the article also discusses how power can affect evaluative judgments more broadly.


2019 ◽  
Vol 8 (4) ◽  
pp. 7835-7839

Our paper notices that with a high probability the computer faced with physical attacks can be in a suspended mode. We have more interest in addressing a series of existing and plausible threats to cyber security where the opponent possesses unconventional attack capabilities. Such unconventionality includes, in our exploration t but not restricted to, crowd sourcing, physical coercion, substantial machine resources, malicious insiders, etc. Throughout this paper, we have a tendency to tend to demonstrate but our philosophy is applied to affect several exemplary eventualities of unconventional threats, and elaborate on the model systems data secrets across sleepwake cycles. Most PCs, particularly laptops, remain in rest suspend to RAM, when not in dynamic use. A vital inspect for unattended PCs in rest is that the nearness of client insider facts in framework memory. An aggressor with material approach of a computer in rest will launch side vein memory attacks, by handling liable device drivers; regular mitigations include like bugs etc. A sophisticated assailant can likewise fall back on chilly boot assaults by handling DRAM memory impact. Hypnoguard2 protects in RAM information once a laptop is in sleep simply just in case of assorted memory attacks ecosystem for every desktop and mobile platforms, the appliance of reliable computing still remains rare or exclusively by certain manufacturers. In reality, a way larger issue is that the inspiration of trust is sometimes a combination, this becomes a significant barrier for the tutorial analysis due to lack of access to hardware primitives or public documentation. We believe the high level methodology of these research topics can contribute to advancing the security research under strong adversarial assumptions, and the promotion of software hardware orchestration in protecting execution integrity therein.


2019 ◽  
Vol 5 (2) ◽  
pp. 123
Author(s):  
Yuda Syahputra ◽  
Neviyarni Neviyarni ◽  
Netrawati Netrawati ◽  
Yeni Karneli ◽  
Hariyani Hariyani

Tujuan pada penelitian ini adalah untuk menganalisis terapi transaksional dalam seting kelompok. Analisis transaksional pada mulanya direncanakan sebagai suatu bentuk treatment kelompok dan prosedur-prosedur terapeutik yang memberikan hasil dalam setting kelompok. Jenis penelitian ini adalah penelitian kepustakaan, yaitu serangkaian penelitian yang berkaitan dengan metode pengumpulan data perpustakaan, atau penelitian yang objek penelitiannya dieksplorasi melalui berbagai informasi perpustakaan (buku atau jurnal ilmiah) yang membahas tentang analisis transaksional dalam seting kelompok. Konsep dan teknik Analisis transaksional efektif diterapkan dalam sesi konseling kelompok. Analisis transaksional menyediakan pendekatan terstruktur yang memungkinkan anak-anak dan remaja untuk melihat hubungan antara apa yang mereka pelajari dalam keluarga mereka dan sikap mereka terhadap orang lain._________________________________________________________Transactional analysis is transactional psychotherapy that can be used in individual counseling, but is more suitable for use in group counseling (E. M. Berne, 1975). The purpose of this study was to analyze transactional therapy in group settings. Transactional analysis was originally planned as a form of group treatment and therapeutic procedures that gave results in group settings. This type of research is library research, which is a series of studies related to library data collection methods, or research whose object of research is explored through various library information (books or scientific journals) that discuss transactional analysis in group settings. Concepts and techniques of transactional analysis are effectively applied in group counseling sessions. Transactional analysis provides a structured approach that allows children and adolescents to see the relationship between what they learn in their families and their attitudes toward others


2018 ◽  
Vol 6 (2) ◽  
pp. 49-60 ◽  
Author(s):  
Brandon Valeriano ◽  
Ryan C. Maness

Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations. This skewed perspective suggests constant cyber disasters that are confronting humanity constantly. The general tone of the debate argues that cyber war is already upon us and our future will only witness more cyber doom. However, these hyperbolic perspectives are being countered by empirical investigations that produce the opposite of what is to be expected. It is generally observed that limited cyber engagements throughout the geopolitical system are the dominant form of interaction. Our task here is to offer a different path forward. We first posit what can be known about cyber security interactions with data as well as what cannot. Where is the water’s edge in cyber security research? We then examine the known works in the field that utilize data and evidence to examine cyber security processes. Finally, we conclude with an offering of what types of studies need to be done in the future to move the field forward, away from the prognostication and generalizations so typical in the discourse in this constantly changing and growing field.


Author(s):  
Maurice Hendrix ◽  
Ali Al-Sherbaz ◽  
Victoria Bloom

Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security professionals. Thus cyber security seems especially well-suited to Serious Games. This paper investigates whether games can be effective cyber security training tools. The study is conducted by means of a structured literature review supplemented with a general web search.While there are early positive indications there is not yet enough evidence to draw any definite conclusions. There is a clear gap in target audience with almost all products and studies targeting the general public and very little attention given to IT professionals and managers. The products and studies also mostly work over a short period, while it is known that short-term interventions are not particularly effective at affecting behavioural change.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Yee-Yin Choong ◽  
Mary F Theofanos ◽  
Karen Renaud ◽  
Suzanne Prior

Abstract Children use technology from a very young age and often have to authenticate. The goal of this study is to explore children’s practices, perceptions, and knowledge regarding passwords. Given the limited work to date and that the world’s cyber posture and culture will be dependent on today’s youth, it is imperative to conduct cyber-security research with children. We conducted surveys of 189 3rd to 8th graders from two Midwest schools in the USA. We found that children have on average two passwords for school and three to four passwords for home. They kept their passwords private and did not share with others. They created passwords with an average length of 7 (3rd to 5th graders) and 10 (6–8th graders). But, only about 13% of the children created very strong passwords. Generating strong passwords requires mature cognitive and linguistic capabilities which children at this developmental stage have not yet mastered. They believed that passwords provide access control, protect their privacy and keep their “stuff” safe. Overall, children had appropriate mental models of passwords and demonstrated good password practices. Cyber-security education should strive to reinforce these positive practices while continuing to provide and promote age-appropriate developmental security skills. Given the study’s sample size and limited generalizability, we are expanding our research to include children from 3rd to 12th graders across multiple US school districts.


Sign in / Sign up

Export Citation Format

Share Document