101 |
NONPROFIT BOARD GOVERNANCE: BARRIERS TO MILLENNIAL AND RACIAL MINORITY DIVERSITY IN BOARD SERVICEEDWARDS, SHAWN, 0000-0001-5292-1248 January 2020 (has links)
Nonprofits need dedicated people to meet the mission of the organization and to address the social and societal conditions they were established to address. How are nonprofit organizations cultivating the next generation of leaders? With five generations of workers in the workplace, the field for new, nonprofit, board-level volunteers is large. However, research shows that young professionals and marginalized racial minorities are underrepresented or not represented in this area. Why is this our current reality and what is hindering the service of these leaders on nonprofit boards? This dissertation examines the role of representation in generational and racial terms on the board of directors of nonprofit organizations in South Carolina. / Business Administration/Human Resource Management
|
102 |
An Evaluation of Compatibility, Effectiveness, Utility, and Implementation of Plagiarism-Detection Software Operating in the Honor Code Environment at Brigham Young UniversityJoeckel, George Louis 04 December 2007 (has links) (PDF)
Turnitin plagiarism-detection software was operating as a pilot program conducted by the Center for Teaching and Learning in Winter 2007 on the Brigham Young University (BYU) campus. A sample of 6 instructors and 79 student users participated in this evaluation. The evaluation findings show that Turnitin is compatible with the academic honesty environment created by BYU's Honor Code. Turnitin has been effective at detecting intentional and inadvertent plagiarism at BYU. It has also addressed the problem of multiple submissions of the same material. Recommendations are made for promoting Turnitin at the campus and department level. Training tools are proposed for instructors: a FAQ page, an online tutorial, and a set of guidelines for introducing Turnitin to a class.
|
103 |
The Benefits of Explicit Vocabulary Teaching in the EFL ClassroomLonghurst, Mark January 2013 (has links)
For students of English as a foreign language (EFL), a certain level of knowledge of vocabulary is required for successful communication to occur. Based on personal experiences in the classroom which have shown that students often lack language variation, accuracy, coherence and descriptiveness, this paper deals with the issue of teaching vocabulary in a more conscientious and focused way to help ensure that students will become more competent in using the language effectively. The Swedish curriculum for English, LGR11, is built up around the ideology known as communicative language teaching (CLT). This entails that as long as a learner is exposed to a foreign language, and has sufficient opportunities to use that language, the learning of the language will occur. The results of this paper suggest that we cannot only rely on a pure form of CLT for students to reach higher ability levels, but that a certain amount of focused vocabulary teaching, in context with classroom activities, is also necessary.
|
104 |
Intention and Indiscernibilia: : Against Interpretive IntentionalismJohansson, Alexander January 2023 (has links)
What determines the meaning of a work of art? This paper considers three theories of art-critical interpretation: moderate actual intentionalism (the artist’s intention partly determines the work’s meaning), hypothetical intentionalism (the work’s meaning is the best hypothesis of what the artist could have meant), and the value-maximizing theory (interpretations which maximize the work’s value are to be preferred). I argue that moderate actual intentionalism is incoherent, collapsing either into the intentional fallacy or into an extreme form of intentionalism. I argue further that hypothetical intentionalism is premised on a distinction between two orders of intention which cannot be maintained, and, trades on a mischaracterization of the force of hypothetical intentions. I argue for the value-maximizing theory, which I claim provides an elegant interpretive framework while being theoretically untroubled vis-à-vis its competitors.
|
105 |
An Exploratory Examination of Positive and Negative Emotional Attractors' Impact on Coaching Intentional ChangeHoward, Anita D. 21 July 2009 (has links)
No description available.
|
106 |
The Effects of Depth of Processing and Handedness On Episodic MemoryButler, Michael L. 02 July 2007 (has links)
No description available.
|
107 |
Time Well Spent? : A Study About Learning Words with Digital Flashcards in a Classroom Setting in Upper-Secondary School in SwedenThambert, Sabina January 2024 (has links)
Learning new words and acquiring vocabulary could arguably be the most important thing when learning a new language. Without words, you would not be able to express anything even if you were to have perfect grammar, since you would not have anything to fill the grammatical structures with. Therefore, in general, it is of interest to explore and investigate how learning new words could be done but as a teacher, there is specific interest as to how learning new words could be done in a classroom setting. Previous research shows that there is a need for explicit vocabulary learning where acquiring new vocabulary is treated as an explicit learning criterion in schools in Sweden. Therefore it felt like a suitable topic to delve into as a soon-to-be licensed teacher of English. An experimental pre-test, immediate post-test and delayed post-test-design study was run, in which a test group of English 5-students from an academic program at upper-secondary school, productively practised ten target items. The ten target items were learnt by using digital flashcards in the program Quizlet. The students had two occasions where they practised the words for ten minutes learning with a day in between. The results indicate that using digital flashcards can be an, if not effective, at least a good way of introducing and learning new words since the retention of the words two weeks after the final learning occasion, tested to be over 50% when the students were asked to translate the target items from Swedish to English.
|
108 |
The Development of a Computer Adaptive Test Of the Five Factor Model of Personality: Applications and ExtensionsBrown, Reagan 20 June 1997 (has links)
Although not universally accepted, much of the field has converged upon the Five Factor Model (FFM) of personality as constituting a comprehensive taxonomy of normal personality functioning. A weakness common to all personality inventories is excessive length, which can result in examinee fatigue, and ultimately, poor data quality. Computer adaptive testing offers a solution to the test fatigue problem by administering only the items that are informative for that examinee on a given scale. A new test based upon the FFM of normal personality administered in a computer adaptive fashion was constructed. Reliability and validity evidence were obtained, with favorable results. New approaches to the detection of intentional response distortion were explored with mixed results including some promising findings in need of cross-validation. Response latencies were able to discriminate between honest and faking subjects, but the findings were unable to clarify the issue of whether faking is an easier or more laborious cognitive process than honest answering. New directions in computer adaptive personality testing research are proposed. / Ph. D.
|
109 |
Electromagnetic Interference Attacks on Cyber-Physical Systems: Theory, Demonstration, and DefenseDayanikli, Gokcen Yilmaz 27 August 2021 (has links)
A cyber-physical system (CPS) is a complex integration of hardware and software components to perform well-defined tasks. Up to this point, many software-based attacks targeting the network and computation layers have been reported by the researchers. However, the physical layer attacks that utilize natural phenomena (e.g., electromagnetic waves) to manipulate safety-critic signals such as analog sensor outputs, digital data, and actuation signals have recently taken the attention. The purpose of this dissertation is to detect the weaknesses of cyber-physical systems against low-power Intentional Electromagnetic Interference (IEMI) attacks and provide hardware-level countermeasures.
Actuators are irreplaceable components of electronic systems that control the physically moving sections, e.g., servo motors that control robot arms. In Chapter 2, the potential effects of IEMI attacks on actuation control are presented. Pulse Width Modulation (PWM) signal, which is the industry–standard for actuation control, is observed to be vulnerable to IEMI with specific frequency and modulated–waveforms. Additionally, an advanced attacker with limited information about the victim can prevent the actuation, e.g., stop the rotation of a DC or servo motor. For some specific actuator models, the attacker can even take the control of the actuators and consequently the motion of the CPS, e.g., the flight trajectory of a UAV. The attacks are demonstrated on a fixed-wing unmanned aerial vehicle (UAV) during varying flight scenarios, and it is observed that the attacker can block or take control of the flight surfaces (e.g., aileron) which results in a crash of the UAV or a controllable change in its trajectory, respectively.
Serial communication protocols such as UART or SPI are widely employed in electronic systems to establish communication between peripherals (e.g., sensors) and controllers. It is observed that an adversary with the reported three-phase attack mechanism can replace the original victim data with the 'desired' false data. In the detection phase, the attacker listens to the EM leakage of the victim system. In the signal processing phase, the exact timing of the victim data is determined from the victim EM leakage, and in the transmission phase, the radiated attack waveform replaces the original data with the 'desired' false data. The attack waveform is a narrowband signal at the victim baud rate, and in a proof–of–concept demonstration, the attacks are observed to be over 98% effective at inducing a desired bit sequence into pseudorandom UART frames. Countermeasures such as twisted cables are discussed and experimentally validated in high-IEMI scenarios.
In Chapter 4, a state-of-art electrical vehicle (EV) charger is assessed in IEMI attack scenarios, and it is observed that an attacker can use low–cost RF components to inject false current or voltage sensor readings into the system. The manipulated sensor data results in a drastic increase in the current supplied to the EV which can easily result in physical damage due to thermal runaway of the batteries. The current switches, which control the output current of the EV charger, can be controlled (i.e., turned on) by relatively high–power IEMI, which gives the attacker direct control of the current supplied to the EV.
The attacks on UAVs, communication systems, and EV chargers show that additional hardware countermeasures should be added to the state-of-art system design to alleviate the effect of IEMI attacks. The fiber-optic transmission and low-frequency magnetic field shielding can be used to transmit 'significant signals' or PCB-level countermeasures can be utilized which are reported in Chapter 5. / Doctor of Philosophy / The secure operation of an electronic system depends on the integrity of the signals transmitted from/to components like sensors, actuators, and controllers. Adversaries frequently aim to block or manipulate the information carried in sensor and actuation signals to disrupt the operation of the victim system with physical phenomena, e.g., infrared light or acoustic waves. In this dissertation, it is shown that low-power electromagnetic (EM) waves, with specific frequency and form devised for the victim system, can be utilized as an attack tool to disrupt, and, in some scenarios, control the operation of the system; moreover, it is shown that these attacks can be mitigated with hardware-level countermeasures. In Chapter 2, the attacks are applied to electric motors on an unmanned aerial vehicle (UAV), and it is observed that an attacker can block (i.e., crash of the UAV) or control the UAV motion with EM waves. In Chapter 3, it is shown that digital communication systems are not resilient against intentional electromagnetic interference (IEMI), either. Low–power EM waves can be utilized by attackers to replace the data in serial communication systems with a success rate %98 or more. In Chapter 4, the attacks are applied to the sensors and actuators of electric vehicle chargers with low–cost over–the–shelf amplifiers and antennas, and it is shown that EM interference attacks can manipulate the sensor data and boosts the current supplied to the EV, which can result in overheating and fire. To ensure secure electronic system operation, hardware–level defense mechanisms are discussed and validated with analytical solutions, simulations, and experiments.
|
110 |
14與18個月嬰兒理解他人的溝通意圖 / Fourteen- and Eighteen-Month-Old Infants Understand Others' Communicative Intents簡嘉慧, Chien, Chia Hui Unknown Date (has links)
理解他人的意圖,指的是理解他人的行為背後蘊含著一個希望達成的具體目標,是嬰兒社會認知發展中一項重要的基礎能力,而此能力的發展應具有跨文化一致性。然而,過去國內外研究結果顯示,台灣與西方嬰兒透過非語言線索理解他人溝通意圖的能力有明顯的落差。因此,本研究為了瞭解台灣嬰兒理解非語言線索的溝通意圖之能力,並找出可能導致上述不同研究結果的作業差異原因,將藉由兩項實驗來探討此議題。實驗一以藏物遊戲為實驗派典,觀察14與18個月的台灣嬰兒,在「眼神注視」、「手指指示」及「意圖性語音」三種非語言線索情境中,是否可藉由對線索溝通意圖的理解而找出隱藏的意圖目標物。結果發現14個月的台灣嬰兒,可理解他人「手指指示」線索的溝通意圖,但無法理解「眼神注視」與「意圖性語音」線索的溝通意圖,而18個月的台灣嬰兒則是可理解他人「眼神注視」線索的溝通意圖,但卻無法理解「手指指示」與「意圖性語音」線索的溝通意圖。為了排除藏物容器設計可能造成的干擾因素,實驗二調整了藏物容器裝置,以同樣的實驗方式觀察台灣嬰兒理解他人非語言線索溝通意圖的能力。結果發現,14個月的台灣嬰兒仍只能藉由「手指指示」線索理解他人的溝通意圖,但18個月的台灣嬰兒則已可透過「眼神注視」、「手指指示」及「意圖性語音」三種非語言線索理解他人的溝通意圖。此結果說明,台灣與西方嬰兒透過非語言線索理解他人溝通意圖的能力大致相同,即嬰兒理解他人溝通意圖的能力確實具有跨文化一致性。 / Understanding the intents of others, to understand the existence of specific goals that people wish to achieve from their behaviors, is one of important basic abilities in the social cognitive development of an infant. The developmental time frames of such ability should be the same across cultures. However, previous domestic and overseas studies proposed that the abilities of infants to understand the communicative intents of others through nonverbal cues are different between Taiwanese and western cultures. Hence, in this study, two controlled experiments were conducted to explore the abilities of Taiwanese infants to understand the communicative intents of others through nonverbal cues and the factors of the tasks that may cause different results between domestic and overseas studies. In the first experiment, an experimenter used the cues of gazing, pointing, and intentional vocalization in a hiding-game task to examine whether fourteen- and eighteen-month-old Taiwanese infants could infer communicative intents expressed in the three nonverbal cues and find the hidden objects. Results showed that 14-month-old Taiwanese infants could only follow the cue of pointing to find the hidden objects, but not gazing or intentional vocalization. And 18-month-old Taiwanese infants could find the hidden objects by following only the cue of gazing. To exclude the possible interferences of the target containers, the experimenter used the same procedures and settings in the second experiment as the first one, but modified the containers to clarify the hiding-game task. Results showed that 14-month-old Taiwanese infants could still follow only the cue of pointing to find the hidden object, but 18-month-old Taiwanese infants successfully followed all three types of cues. Based on these findings, the abilities of infants to understand others’ communicative intents by following nonverbal cues are the same in Taiwanese and western cultures. That is, the developmental time frames of the abilities of infants to understand the communicative intents through nonverbal cues are the same across different cultures.
|
Page generated in 0.1137 seconds