• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 18
  • 2
  • Tagged with
  • 29
  • 29
  • 8
  • 6
  • 6
  • 6
  • 6
  • 6
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The Influence of Public Policy Interventions on Millennial Distracted Driving Behavior

Versuk, Karen Anne 01 January 2016 (has links)
Despite recent public policy initiatives limiting or banning forms of distracted driving resultant from cellular phone use, crashes remain on the rise. Individuals from the millennial generation, ages 16 to 35, appear to be most susceptible to distracted driving. Understanding the behaviors, attitudes, and habits of millennials is critical to developing effective policy for behavior change. A dual task ethnographic study framed by Skinner's theory of behavior modification and Maslow's hierarchy of needs motivational model, was used to investigate to what extent millennials feel public policy has influenced their driving, and if additional policy initiatives are required to deter distracted driving behavior. Two phases of inquiry, first, naturalistic observation, and then focus group were conducted at a commuter university. Distracted driving behaviors including hand held cellular phone use, eating, drinking, and passenger interaction of 100 drivers entering or exiting campus were observed, tracked, and analyzed using a researcher-developed tracking form. Eighty-four percent exhibited at least one distracted driving behavior. After which, 12 enrolled and licensed students, aged 18-35, were recruited via social media for two focus group discussions. Focus group data were inductively coded and analyzed using semantical attribution analysis. The students revealed that millennial drivers felt distracted driving policy did not address behaviors they see as worthy of intervention, they did not perceive that cellular phone use while driving posed a significant threat, and they felt current law was difficult to enforce with penalties they regarded as non-prohibitive. Social change implications include improved distracted driving public policy, which may result in driving behavior changes and a potential reduction of death, injury, and property loss.
22

Methods for machine vision based driver monitoring applications /

Kutila, Matti. January 2006 (has links) (PDF)
Diss. Tampereen teknillinen korkeakoulu, 2006. / Myös verkkojulkaisuna.
23

Three essays on unveiling complex urban phenomena: toward improved understanding

Lym, Youngbin 13 November 2020 (has links)
No description available.
24

Distracted generation (?) : technology use, texting and driving in South Africa

Kgasago, Tshepho Justice January 2017 (has links)
Thesis (M.A. (Communication Studies)) -- University of Limpopo, 2017 / The use of communication technologies has brought changes to our daily ways of doing things. Youth use technology for different purposes at different locations. As technology grows everyday with various advantages, its benefits come along with some disadvantages. Road accidents are one of the major problems that South Africa experiences. The focus of this study was to explore the danger of texting and driving and its potentials for road accidents. This research focused on the negative impact of technology, mainly technological distraction, while driving. Broadly, this research looks at the social and cultural impact of texting and mobility, with specific focus on distracted driving. This study is significant in the social analysis of technology use and distraction; this significance is made more important considering that there is very limited study of this social issue in South Africa. The always-available communication culture (such as texting while driving) should be viewed as a problematic phenomenal. For data collection, the researcher conducted a survey with adults and youth drivers to explore the perceptions and attitudes of drivers towards cell phone use, texting and driving. The researcher also conducted roadside observations of drivers to investigate the occurrence of distracted driving due to technology use, and interviews were conducted with Traffic Officers to share their professional experience on observing incidences of texting and driving. The study reveals that technology use, texting and driving is a common problem among young drivers, while adults tend to be more careful and engage less in this activity. Aspect of the findings of the study shows that 60% of drivers report that they have sent a text while driving. Moreover, the study explores ways of curbing cell phone use texting and driving on South African roads. There should be more research on distracted driving and technology use, so that more suggestions on how to curb technology use while driving can be offered
25

Development of a Digital Game-Based Learning Best Practices Checklist

Shearer, James D. 27 June 2011 (has links)
No description available.
26

Behavioral Transportation: The Role of Psychological, Cognitive, and Social Factors in Distracted Driving Behavior

Gabaldon, Janeth 07 1900 (has links)
Logistics 4.0 suggests that increased automation can enhance performance, while Logistics 5.0 emphasizes the advantages of a modern workforce that combines humans and emerging technologies. However, the logistics industry needs a deeper understanding of human factors, an area that has been overlooked so far. To bridge this research gap, this dissertation investigated distracted driving behavior among individuals involved in transportation and logistics-based applications. This investigation employed both qualitative and quantitative research methods. Essay 1 focuses on a systematic literature review (SLR) that comprehensively analyzes published research on self-response studies regarding distracted driving behavior. The study identifies five overarching categories of distractions: (a) cell phone-related, (b) technology-related, (c) nontechnology-related, (d) psychological, and (e) personality. The findings underscore the substantial research conducted on self-reported distractions associated with cell phones and technology. Essay 2 employs the protection motivation theory (PMT) to develop hypotheses that predict the engagement of young drivers in texting while driving (TWD). In addition to TWD, the survey also included cognitive failure to examine the indirect effects of PMT on TWD within a mediation framework. The results, obtained through structural equation modeling with 674 respondents aged 18-25, indicate that several factors including response cost, threat vulnerability, cognitive failure, self-efficacy, and threat severity influence TWD behavior. Essay 3 investigates the influence of young drivers' respect for safety, neutralization techniques, and polychronicity on distracted driving behavior (DDB), based on the cognitive dissonance theory (CDT). The findings, drawn from 326 respondents aged 22-29 years, indicate that drivers who prioritize safety (respect for safety) are less likely to engage in DDB. Lastly, Essay 4 takes a survey-based approach to explore how factors such as respect for safety, polychronicity, and cognitive failure influence the likelihood of engagement in distractions among industrial operators, specifically forklift drivers, in warehouse and distribution centers (WDCs). The study's results indicate that cognitive failure has a negative impact on forklift drivers' distracted driving behavior, while polychronic tendencies help drivers avoid engaging in distracted behavior.
27

A Risk Based Approach to Intelligent Transportation Systems Security

Bakhsh Kelarestaghi, Kaveh 11 July 2019 (has links)
Security threats to cyber-physical systems are targeting institutions and infrastructure around the world, and the frequency and severity of attacks are on the rise. Healthcare manufacturing, financial services, education, government, and transportation are among the industries that are the most lucrative targets for adversaries. Hacking is not just about companies, organizations, or banks; it also includes critical infrastructure. Wireless Sensors Networks, Vehicle-to-everything communication (V2X), Dynamic Message Signs (DMS), and Traffic Signal Controllers are among major Intelligent Transportation Systems (ITS) infrastructure that has already been attacked or remain vulnerable to hacking. ITS has been deployed with a focus on increasing efficiency and safety in the face of dramatic increases in travel demand. Although many studies have been performed and many security primitives have been proposed, there are significant concerns about flawless performance in a dynamic environment. A holistic security approach, in which all infrastructure performs within the satisfactory level of security remains undiscovered. Previously, hacking of road infrastructure was a rare event, however, in recent years, field devices such as DMS are hacked with higher frequency. The primary reason that transportation assets are vulnerable to cyber-attacks is due to their location. A more dramatic scenario occurs when hackers attempt to convey tampered instructions to the public. Analyzing traveler behavior in response to the hacked messages sign on the basis of empirical data is a vital step toward operating a secure and reliable transportation system. There may be room for improvement by policymakers and program managers when considering critical infrastructure vulnerabilities. With cybersecurity issues escalating every day, road users' safety has been neglected. This dissertation overcomes these challenges and contributes to the nascent but growing literature of Intelligent Transportation System (ITS) security impact-oriented risk assessment in threefold. • First, I employ a risk-based approach to conduct a threat assessment. This threat assessment performs a qualitative vulnerability-oriented threat analysis. The objective is to scrutinize safety, security, reliability, and operation issues that are prompted by a compromised Dynamic Message Signs (DMS). • Second, I examine the impact of drivers' attitudes and behaviors on compliance, route diversion behavior, and speed change behavior, under a compromised DMS. We aim to assess the determinants that are likely to contribute to drivers' compliance with forged information. To this extent, this dissertation evaluates drivers' behavior under different unauthentic messages to assess in-depth the impact of an adversarial attack on the transportation network. • Third, I evaluate distracted driving under different scenarios to assess the in-depth impact of an adversarial attack on the transportation network. To this extent, this dissertation examines factors that are contributing to the manual, visual, and cognitive distractions when drivers encountering fabricated advisory information at a compromised DMS. The results of this dissertation support the original hypothesis and indicate that with respect to the forged information drivers tend to (1) change their planned route, (2) become involved in distracting activities, and (3) change their choice speed at the presence of a compromised DMS. The main findings of this dissertation are outlined below: 1. The DMS security vulnerabilities and predisposing conditions allow adversaries to compromise ITS functionality. The risk-based approach of this study delivers the impact-likelihood matrix, which maps the adverse impacts of the threat events onto a meaningful, visual, matrix. DMS hacking adverse impacts can be categorized mainly as high-risk and medium-risk clusters. The safety, operational (i.e., monetary losses) and behavioral impacts are associated with a high-risk cluster. While the security, reliability, efficiency, and operational (i.e., congestion) impacts are associated with the medium-risk cluster. 2. Tech friendly drivers are more likely to change their route under a compromised DMS. At the same time, while they are acquiring new information, they need to lowering their speed to respond to the higher information load. Under realistic-fabricated information, about 65% of the subjects would depart from their current route. The results indicate that females and subjects with a higher driving experience are more likely to change their route. In addition, those subjects who are more sensitive to the DMS's traffic-related messages and those who use DMS under congested traffic condition are more likely to divert. Interestingly, individuals with lower education level, Asians, those who live in urban areas, and those with trouble finding their direction in new routes are less likely to pick another route rather the one they planned for. 3. Regardless of the DMS hacking scenarios, drivers would engage in at least one of the distractive activities. Among the distractive activities, cognitive distraction has the highest impact on the distracted driving likelihood. Meaning, there is a high chance that drivers think of something other than driving, look at surrounding traffic and scenery, or talk to other passengers regarding the forged information they saw on the DMS. Drivers who rely and trust in technology, and those who check traffic condition before starting their trips tend to become distracted. In addition, the result identified that at the presence of bogus information, drivers tend to slow down or stop in order to react to the DMS. That is, they would either (1) become involved in activities through the means of their phone, (2) they would mind wander, look around, and talk to a passenger about the sign, and (3) search for extra information by means of their vehicle's radio or internet. 4. Females, black individuals, subjects with a disability, older, and those with high trust in DMS are less likely to ignore the fabricated messages. In contrary, white, those who drive long hours, and those who see driving as a tedious task are more likely to ignore the bogus messages. Drivers who comply with traffic regulations and have a good driving record are likely to slow down under the tampered messages. Furthermore, female drivers and those who live in rural areas are more likely to slow down under fabricated advisory information. Furthermore, this dissertation identifies that planning for alternative route and involvement in distractive activities cause speed variation behaviors under the compromised DMS. This dissertation is the first to investigate the adverse impact of a compromised DMS on the road users and operators. I attempt to address the current gap in the literature by assessing and evaluating the impact of ITS security vulnerabilities. Broader impacts of this study include (1) to systematically raising awareness among policy-makers and engineers, (2) motivating further simulations and real-world experiments to investigate this matter further, (3) to systematically assessing the adverse impact of a security breach on transportation reliability and safety, and drivers' behavior, and (4) providing insights for system operators and decision-makers to prioritize the risk of a compromised DMS. Additionally, the outcome can be integrated with the nationwide connected vehicle and V2X implementations and security design. / Doctor of Philosophy / Security threats are targeting institutions and infrastructure around the world, and the frequency and severity of security attacks are on the rise. Healthcare manufacturing, financial services, education, government, and transportation are among the industries that are the most lucrative targets for adversaries. Hacking is not just about companies, organizations, or banks; it also includes critical infrastructure. Intelligent Transportation Systems have been deployed with a focus on increasing efficiency and safety in the face of dramatic increases in traffic volume. Although many studies have been performed and many security primitives have been proposed, there are significant concerns about flawless performance in a dynamic environment. A holistic security approach, in which all infrastructure performs within the satisfactory level of security remains undiscovered. Previously, hacking of road infrastructure was a rare event, however, in recent years, field devices, such as dynamic message signs, are hacked with higher frequency. The primary reason that transportation assets are vulnerable to cyber-attacks is that of their location in public. A more dramatic scenario occurs when hackers attempt to convey tampered instructions to the public. Analyzing traveler behavior in response to the hacked messages sign on the basis of empirical data is a vital step toward operating a secure and reliable transportation system. This study is the first to investigate the adversarial impact of a compromised message sign on the road users and operators. I attempt to address the current gap in the literature by assessing and evaluating the impact of ITS security vulnerabilities.
28

EXPLORING THE IMPACT OF TEXTING WHILE DRIVING TEXT BAN LAWS IN OHIO AND PENNSYLVANIA: A CASE STUDY

Shuster, Jaime Lynn 26 July 2018 (has links)
No description available.
29

Information Points and Optimal Discharging Speed: Effects on the Saturation Flow at Signalized Intersections

Gao, Lijun January 2015 (has links)
No description available.

Page generated in 0.0856 seconds