scholarly journals Neural correlates of decision making related to information security: Self-control and moral potency

PLoS ONE ◽  
2019 ◽  
Vol 14 (9) ◽  
pp. e0221808
Author(s):  
Robert West ◽  
Emily Budde ◽  
Qing Hu
2021 ◽  
pp. 014303432198897
Author(s):  
Vítor Alexandre Coelho ◽  
Marta Marchante

This study analyzed how social and emotional competencies evolved according to adolescents’ involvement in bullying, and whether gender influenced social and emotional competencies’ development. Five-hundred-fourteen students ( Mage = 12.71; SD = 1.09) were assessed through self-reports at three different time points for one year. Results showed that students involved in the three analyzed bullying roles displayed a more negative trajectory in all but one social emotional competence analyzed compared to students not involved in bullying. The exception was students who bullied others for responsible decision making. Additionally, gender differences were only found in self-esteem trajectories; boys displayed a more pronounced decrease. In larger classes, students displayed higher levels of self-control, social awareness and responsible decision-making. These results showed that reduced social and emotional competencies were a consequence of bullying involvement for every bullying role analyzed.


2009 ◽  
Vol 71 (3) ◽  
pp. 354-361 ◽  
Author(s):  
Tiffany M.Y. Lee ◽  
Li-guo Guo ◽  
Hong-zhi Shi ◽  
Yong-zhi Li ◽  
Yue-jia Luo ◽  
...  

2014 ◽  
Vol 369 (1641) ◽  
pp. 20130211 ◽  
Author(s):  
Randolph Blake ◽  
Jan Brascamp ◽  
David J. Heeger

This essay critically examines the extent to which binocular rivalry can provide important clues about the neural correlates of conscious visual perception. Our ideas are presented within the framework of four questions about the use of rivalry for this purpose: (i) what constitutes an adequate comparison condition for gauging rivalry's impact on awareness, (ii) how can one distinguish abolished awareness from inattention, (iii) when one obtains unequivocal evidence for a causal link between a fluctuating measure of neural activity and fluctuating perceptual states during rivalry, will it generalize to other stimulus conditions and perceptual phenomena and (iv) does such evidence necessarily indicate that this neural activity constitutes a neural correlate of consciousness? While arriving at sceptical answers to these four questions, the essay nonetheless offers some ideas about how a more nuanced utilization of binocular rivalry may still provide fundamental insights about neural dynamics, and glimpses of at least some of the ingredients comprising neural correlates of consciousness, including those involved in perceptual decision-making.


Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


2019 ◽  
Vol 2 (2) ◽  
pp. 57-64
Author(s):  
Arini Arini

Information is one of the important assets for the survival of an organization / business, defense security and the integrity of the country, public trust between consumers, so that the availability, accuracy and integrity must be maintained, or commonly abbreviated as CIA (Confidentiality, Integrity & Availability). ISO 27001 is an information security standard published in October 2005 by the International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). However, until now there has been no tool for companies in Indonesia to do a pre-assessment of the level of information security. Plus the lack of socialization of the rules and the lack of ISO 270001 expert in Indonesia, these are reason why the authors conducted this research. The author begins research by collecting data, by studying literature and interviewing experts to identify problems. After that, in its implementation, this research will be directed (knowledge acquisition) and reviewed directly by an ISO 27001 expert from The British Standard Institution of the United Kingdom (BSI) so that the results are more accurate. After that, the writer determines the weighting method (decision making), scoring method, system development method, and simulation method (testing). The results of the study are in the form of pre-assessment to evaluate the information security assessment index, which will be displayed according to indicators pioneered from ISO 27001: 2013 using AHP (Analytical Hierarchy Process) decision-making methods, as well as web-based making it easier to review.


Sign in / Sign up

Export Citation Format

Share Document