801 research outputs found

    Women and Illegal Activities: Gender Differences and Women's Willingness to Comply Over Time

    Get PDF
    In recent years the topics of illegal activities such as corruption or tax evasion have attracted a great deal of attention. However, there is still a lack of substantial empirical evidence about the determinants of compliance. The aim of this paper is to investigate empirically whether women are more willing to be compliant than men and whether we observe (among women and in general) differences in attitudes among similar age groups in different time periods (cohort effect) or changing attitudes of the same cohorts over time (age effect) using data from eight Western European countries from the World Values Survey and the European Values Survey that span the period from 1981 to 1999. The results reveal higher willingness to comply among women and an age rather than a cohort effect. Working Paper 06-5

    Teaching Engineering students to "Think thief"

    Get PDF
    We report on an educational experiment where information technology students were encouraged to think out of the box about the dark side of information technology. Instead of taking the usual point of view of the engineer we challenged the students to take the point of view of the motivated offender. After teaching the course three years, we report on the exciting ideas our students came up with, and on the lessons we learned in designing and teaching the course. The main conclusions are (a) thinking thief inspires students to design creative projects, (b) working with real subjects creates a powerful learning experience, and (c) students are struggling with methodological issues

    Young people, crime and school exclusion: a case of some surprises

    Get PDF
    During the 1990s the number of young people being permanently excluded from schools in England and Wales increased dramatically from 2,910 (1990/91) to a peak of 12,700 (1996/97). Coinciding with this rise was a resurgence of the debate centring on lawless and delinquent youth. With the publication of Young People and Crime (Graham and Bowling 1995) and Misspent Youth (Audit Commission 1996) the 'common sense assumption' that exclusion from school inexorably promoted crime received wide support, with the school excludee portrayed as another latter day 'folk devil'. This article explores the link between school exclusion and juvenile crime, and offers some key findings from a research study undertaken with 56 young people who had experience of being excluded from school. Self-report interview questions reveal that whilst 40 of the young people had offended, 90% (36) reported that the onset of their offending commenced prior to their first exclusion. Moreover, 50 (89.2% of the total number of young people in the sample), stated that they were no more likely to offend subsequent to being excluded and 31 (55.4%) stated that they were less likely to offend during their exclusion period. Often, this was because on being excluded, they were 'grounded' by their parents

    Media and the contact hypothesis: an experimental study on the impact of parasocial contact

    Full text link
    "Does parasocial contact impact on inter-group bias? Widening the scope of Contact Theory, this study aims at experimentally examine the impact of parasocial out-group presentation on decisions in a two-person prisoner's dilemma game and social cognitive constructions of the social event. Within a minimal group experiment, 80 university students were randomly assigned to anonymous or video-wise personalization conditions. Participants rather took personal advantage of expected contributions to a commonly shared dilemma situation in anonymous settings than if a member of the out-group was personalized (p<.05). As perceptions of group boundaries, out-group homogeneity, and similarity did not systematically differ across the conditions, implications are discussed." (author's abstract)"Hat parasozialer Kontakt Einfluss auf intergruppale Diskriminierung? Im Sinne einer Erweiterung der Kontakthypothese liefert die vorliegende Studie eine experimentelle Prüfung des Einflusses von parasozialer Out-Group Präsentation sowohl auf Verteilungsentscheidungen im Prisoner's Dilemma Game als auch auf sozial kognitive Konstruktionen des sozialen Ereignisses. In einem minimalen Gruppen Experiment wurden 80 UniversitätsstudentInnen zufällig einer von zwei Experimentalbedingungen (anonyme Bedingung vs. Video - personalisierte Bedingung) zugewiesen. TeilnehmerInnen in der anonymen Bedingung haben eher einen Vorteil auf Kosten des Mitspielers/ der Mitspielerin aus erwarteten Zuteilungen geschlagen, als wenn ein Mitglied der Fremdgruppe per Video personalisiert wurde (p<.05). Wahrnehmungen der Gruppengrenzen, Outgroup Homogenität und Ähnlichkeit variierten nicht systematisch zwischen den experimentellen Bedingungen. Implikationen werden diskutiert." (Autorenreferat

    Physical location of smart key activators:A building security penetration test

    Get PDF
    Purpose When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in complying with a security policy (i.e. walk from the office to the smart key activator) influences vulnerability. In particular, the attractiveness of a no-effort alternative (i.e. someone else walking from your office to the key activators to perform a task on your behalf) was evaluated. The contribution of this study relates to showing how experimental psychology can be used to determine the cost-benefit analysis (CBA) of physical building security measures. Design/methodology/approach Twenty-seven different “offenders” visited the offices of 116 employees. Using a script, each offender introduced a problem, provided a solution and asked the employee to hand over their office key. Findings A total of 58.6 per cent of the employees handed over their keys to a stranger; no difference was found between female and male employees. The likelihood of handing over the keys for employees close to a key activator was similar to that of those who were further away. Research limitations/implications The results suggest that installing additional key activators is not conducive to reducing the building’s security vulnerability associated with the handing over of keys to strangers. Originality/value No research seems to have investigated the distribution of smart key activators in the context of a physical penetration test. This research highlights the need to raise awareness of social engineering and of the vulnerabilities introduced via smart locks (and other smart systems). </jats:sec

    Reactive oxygen species regulate context-dependent inhibition of NFAT5 target genes

    Get PDF
    The activation of nuclear factor of activated T cells 5(NFAT5), a well-known osmoprotective factor, can be induced by isotonic stimuli, such as activated Toll-like receptors (TLRs). It is unclear, however, how NFAT5 discriminates between isotonic and hypertonic stimuli. In this study we identified a novel context-dependent suppression of NFAT5 target gene expression in RAW 264.7 macrophages stimulated with lipopolysaccharide (LPS) or a high salt (NaCl) concentration. Although LPS and NaCl both used NFAT5 as a core transcription factor, these stimuli mutually inhibited distinct sets of NFAT5 targets within the cells. Although reactive oxygen species (ROS) are essential for this inhibition, the source of ROS differed depending on the context: mitochondria for high salt and xanthine oxidase for TLRs. Specifically, the high salt-induced suppression of interleukin-6 (IL-6) production was mediated through the ROS-induced inhibition of NFAT5 binding to the IL-6 promoter. The context-dependent inhibition of NFAT5 target gene expression was also confirmed in mouse spleen and kidney tissues that were cotreated with LPS and high salt. Taken together, our data suggest that ROS function as molecular sensors to discriminate between TLR ligation and osmotic stimuli in RAW 264.7 macrophages, directing NFAT5 activity toward proinflammatory or hypertonic responses in a context-dependent manner.open3

    How Effective is Anti-Phishing Training for Children?:(Distinguished Paper Award)

    Get PDF
    User training is a commonly used method for preventing victimization from phishing attacks. In this study, we focus on training children, since they are active online but often overlooked in interventions. We present an experiment in which children at Dutch primary schools received an anti-phishing training. The subjects were subsequently tested for their ability to distinguish phishing from non-phishing. A control group was used to control for external effects. Furthermore, the subjects received a re-test after several weeks to measure how well the children retained the training. The training improved the children's overall score by 14%. The improvement was mostly caused by an increased score on the questions where they had to detect phishing. The score on recognizing legitimate emails was not affected by the training. We found that the improved phishing score returned to pre-training levels after four weeks. Conversely, the score of recognition of legitimate emails increased over time. After four weeks, trained pupils scored significantly better in recognizing legitimate emails than their untrained counterparts. Age had a positive effect on the score (i.e., older children scored higher than younger ones); but sex had no significant influence. In conclusion, educating children to improve their ability to detect phishing works in the short term only. However, children go to school regularly, making it easier to educate them than adults. An increased focus on the cybersecurity of children is essential to improve overall cybersecurity in the future
    corecore