The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these device...The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand.展开更多
In the context of traumatic stress, the dominant discourse has mainly focused on distress, thus undermining the role that eustress has in traumatic experiences. One of the few exceptions to this has been the research ...In the context of traumatic stress, the dominant discourse has mainly focused on distress, thus undermining the role that eustress has in traumatic experiences. One of the few exceptions to this has been the research on posttraumatic growth, which has generated much interest since its beginning. There is an increasing interest in posttraumatic growth in various cultures and hence an expansion of the measure, the Post Traumatic Growth Inventory (PTGI), into various languages. This article is the first to perform a rigorous investigation of the psychometric properties of the PTGI, including the scale and subscale reliability, inter-item and subscale correlations, and using a CFA approach. The properties are established with a French translation using two populations of caregivers: those bereaved by HIV/AIDS and parents who are caring for a child with a life-limiting illness. These properties were determined for both the original 21 item scale as well as the shortened version.展开更多
Women have been stereotyped as better multitaskers when compared to their male counterparts. The purpose of this study is to investigate whether there are differences in gender performance when performing cognitive co...Women have been stereotyped as better multitaskers when compared to their male counterparts. The purpose of this study is to investigate whether there are differences in gender performance when performing cognitive combined tasks. Twenty-four graduate students (twelve females and twelve males) volunteered to participate in the study. The task requires participants to indicate when they perceive a change in the intensity of an auditory signal while simultaneously solving algebraic problems. Multivariate Analysis of Variance (MANOVA) results reveal no significant differences between genders when performing the combined tasks (p = 0.1831 and 2 = 0.7891) although the average number of false alarms made during the combined tasks by males is nearly 11% higher than the average number of false alarms made by females. However, (Multivariate Analysis of Variance) ANOVA results for the combined tasks show that males outperform females on the computational task while listening for changes in the auditory signal F(1, 22) - 5.09, p 〈 0.03, but there are no significant differences in their ability to detect noise intensity variation or in the number of false alarms made while multitasking. For the single task analysis the ANOVAs indicate no significant differences in signal detection task performance, computational task performance, or the number of false alarms made by males and females.展开更多
We analyze a continuous review lost sales inventory system with two types of orders—regular and emergency. The regular order has a stochastic lead time and is placed with the cheapest acceptable supplier. The emergen...We analyze a continuous review lost sales inventory system with two types of orders—regular and emergency. The regular order has a stochastic lead time and is placed with the cheapest acceptable supplier. The emergency order has a deterministic lead time is placed with a local supplier who has a higher price. The emergency order is not always filled since the supplier may not have the ability to provide the order on an emergency basis at all times. This emergency order has a higher cost per item and has a known probability of being filled. The total costs for this system are compared to a system without emergency placement of orders. This paper provides managers with a tool to assess when dual sourcing is cost optimal by comparing the single sourcing and dual sourcing models.展开更多
文摘The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand.
文摘In the context of traumatic stress, the dominant discourse has mainly focused on distress, thus undermining the role that eustress has in traumatic experiences. One of the few exceptions to this has been the research on posttraumatic growth, which has generated much interest since its beginning. There is an increasing interest in posttraumatic growth in various cultures and hence an expansion of the measure, the Post Traumatic Growth Inventory (PTGI), into various languages. This article is the first to perform a rigorous investigation of the psychometric properties of the PTGI, including the scale and subscale reliability, inter-item and subscale correlations, and using a CFA approach. The properties are established with a French translation using two populations of caregivers: those bereaved by HIV/AIDS and parents who are caring for a child with a life-limiting illness. These properties were determined for both the original 21 item scale as well as the shortened version.
文摘Women have been stereotyped as better multitaskers when compared to their male counterparts. The purpose of this study is to investigate whether there are differences in gender performance when performing cognitive combined tasks. Twenty-four graduate students (twelve females and twelve males) volunteered to participate in the study. The task requires participants to indicate when they perceive a change in the intensity of an auditory signal while simultaneously solving algebraic problems. Multivariate Analysis of Variance (MANOVA) results reveal no significant differences between genders when performing the combined tasks (p = 0.1831 and 2 = 0.7891) although the average number of false alarms made during the combined tasks by males is nearly 11% higher than the average number of false alarms made by females. However, (Multivariate Analysis of Variance) ANOVA results for the combined tasks show that males outperform females on the computational task while listening for changes in the auditory signal F(1, 22) - 5.09, p 〈 0.03, but there are no significant differences in their ability to detect noise intensity variation or in the number of false alarms made while multitasking. For the single task analysis the ANOVAs indicate no significant differences in signal detection task performance, computational task performance, or the number of false alarms made by males and females.
文摘We analyze a continuous review lost sales inventory system with two types of orders—regular and emergency. The regular order has a stochastic lead time and is placed with the cheapest acceptable supplier. The emergency order has a deterministic lead time is placed with a local supplier who has a higher price. The emergency order is not always filled since the supplier may not have the ability to provide the order on an emergency basis at all times. This emergency order has a higher cost per item and has a known probability of being filled. The total costs for this system are compared to a system without emergency placement of orders. This paper provides managers with a tool to assess when dual sourcing is cost optimal by comparing the single sourcing and dual sourcing models.