Introduction Negative pain-related cognitions are associated with persistence of low-back pain (LBP), but the mechanism underlying this association is not well understood. We propose that negative pain-related cognitions determine how threatening a motor task will be perceived, which in turn will affect how lumbar movements are performed, possibly with negative long-term effects on pain. Objective To assess the effect of postural threat on lumbar movement patterns in people with and without LBP, and to investigate whether this effect is associated with task-specific pain-related cognitions. Methods 30 back-healthy participants and 30 participants with LBP performed consecutive two trials of a seated repetitive reaching movement (45 times). During the first trial participants were threatened with mechanical perturbations, during the second trial participants were informed that the trial would be unperturbed. Movement patterns were characterized by temporal variability (CyclSD), local dynamic stability (LDE) and spatial variability (meanSD) of the relative lumbar Euler angles. Pain-related cognition was assessed with the task-specific ‘Expected Back Strain’-scale (EBS). A three-way mixed Manova was used to assess the effect of Threat, Group (LBP vs control) and EBS (above vs below median) on lumbar movement patterns. Results We found a main effect of threat on lumbar movement patterns. In the threat-condition, participants showed increased variability (MeanSDflexion-extension, p<0.000, η2 = 0.26; CyclSD, p = 0.003, η2 = 0.14) and decreased stability (LDE, p = 0.004, η2 = 0.14), indicating large effects of postural threat. Conclusion Postural threat increased variability and decreased stability of lumbar movements, regardless of group or EBS. These results suggest that perceived postural threat may underlie changes in motor behavior in patients with LBP. Since LBP is likely to impose such a threat, this could be a driver of changes in motor behavior in patients with LBP, as also supported by the higher spatial variability in the group with LBP and higher EBS in the reference condition.
LINK
Cybersecurity threat and incident managers in large organizations, especially in the financial sector, are confronted more and more with an increase in volume and complexity of threats and incidents. At the same time, these managers have to deal with many internal processes and criteria, in addition to requirements from external parties, such as regulators that pose an additional challenge to handling threats and incidents. Little research has been carried out to understand to what extent decision support can aid these professionals in managing threats and incidents. The purpose of this research was to develop decision support for cybersecurity threat and incident managers in the financial sector. To this end, we carried out a cognitive task analysis and the first two phases of a cognitive work analysis, based on two rounds of in-depth interviews with ten professionals from three financial institutions. Our results show that decision support should address the problem of balancing the bigger picture with details. That is, being able to simultaneously keep the broader operational context in mind as well as adequately investigating, containing and remediating a cyberattack. In close consultation with the three financial institutions involved, we developed a critical-thinking memory aid that follows typical incident response process steps, but adds big picture elements and critical thinking steps. This should make cybersecurity threat and incident managers more aware of the broader operational implications of threats and incidents while keeping a critical mindset. Although a summative evaluation was beyond the scope of the present research, we conducted iterative formative evaluations of the memory aid that show its potential.
DOCUMENT
Background: Development of more effective interventions for nonspecific chronic low back pain (LBP), requires a robust theoretical framework regarding mechanisms underlying the persistence of LBP. Altered movement patterns, possibly driven by pain-related cognitions, are assumed to drive pain persistence, but cogent evidence is missing. Aim: To assess variability and stability of lumbar movement patterns, during repetitive seated reaching, in people with and without LBP, and to investigate whether these movement characteristics are associated with painrelated cognitions. Methods: 60 participants were recruited, matched by age and sex (30 back-healthy and 30 with LBP). Mean age was 32.1 years (SD13.4). Mean Oswestry Disability Index-score in LBP-group was 15.7 (SD12.7). Pain-related cognitions were assessed by the ‘Pain Catastrophizing Scale’ (PCS), ‘Pain Anxiety Symptoms Scale’ (PASS) and the task-specific ‘Expected Back Strain’ scale(EBS). Participants performed a seated repetitive reaching movement (45 times), at self-selected speed. Lumbar movement patterns were assessed by an optical motion capture system recording positions of cluster markers, located on the spinous processes of S1 and T8. Movement patterns were characterized by the spatial variability (meanSD) of the lumbar Euler angles: flexion-extension, lateralbending, axial-rotation, temporal variability (CyclSD) and local dynamic stability (LDE). Differences in movement patterns, between people with and without LBP and with high and low levels of pain-related cognitions, were assessed with factorial MANOVA. Results: We found no main effect of LBP on variability and stability, but there was a significant interaction effect of group and EBS. In the LBP-group, participants with high levels of EBS, showed increased MeanSDlateral-bending (p = 0.004, η2 = 0.14), indicating a large effect. MeanSDaxial-rotation approached significance (p = 0.06). Significance: In people with LBP, spatial variability was predicted by the task-specific EBS, but not by the general measures of pain-related cognitions. These results suggest that a high level of EBS is a driver of increased spatial variability, in participants with LBP.
DOCUMENT
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap. In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis. With an increasing threat to information security for companies, the CISO role is moving from a technical role to an executive role. This executive function is responsible for information security across all layers of an organisation. To ensure compliance with the security policy among different groups within the company, such as employees, the board, and the IT department, the CISO must be able to adopt different postures. Soft skills are thus required to be able to assume this leadership role in the organisation. We found that when business leaders were asked about the most important soft skills the top three consisted out of 'communication', ‘leadership’ and 'interpersonal' skills while 'courtesy' was last on the list for a CISO leadership role.
MULTIFILE
Entrepreneurs are likely to be victims of ransomware. Previous studies have found that entrepreneurs tend to adopt few preventive measures, thereby increasing their chances of victimization. Due to a lack of research, however, not much is known about why entrepreneurs lack self-protective behaviors and how they can be encouraged to change said behaviors. Therefore, the purpose of this study is to explain, by means of an extended model of the Protection Motivation Theory (PMT), the motivation for entrepreneurs using protective measures against ransomware in the future. The data for our study were collected thanks to a questionnaire that was answered by 1,020 Dutch entrepreneurs with up to 250 employees. Our Structural Equation Modelling (SEM) analysis revealed that entrepreneurs are more likely to take preventive measures against ransomware if they perceive the risk of ransomware as severe (perceived severity), if they perceive their company as being vulnerable (perceived vulnerability), if they are concerned about the risks (affective response), and if they think that the people and companies around them expect them to apply preventive measures (subjective norms). However, if entrepreneurs think that they are capable of handling the risk (self-efficacy) and are convinced that their adopted preventive measures are effective (response efficacy), they are less likely to take preventive measures. Furthermore, for entrepreneurs that outsource IT security, the significant effect of perceived vulnerability and subjective norms disappears. The likelihood of entrepreneurs protecting their business against ransomware is thus influenced by a complex interplay of various motivational factors and is partly dependent on the business’ characteristics. Based on these findings, we will discuss security professionals’ prospects for increasing the cyber resilience of entrepreneurs, thus preventing cybercrime victimization.
DOCUMENT
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight their inevitability and the impossibility of completely protecting the integrity of critical computer systems. In this context, cyber-resilience offers an attractive alternative to the existing cybersecurity paradigm. We define cyber-resilience as the capacity to withstand, recover from and adapt to the external shocks caused by cyber-risks. This article seeks to provide a broader organizational understanding of cyber-resilience and the tensions associated with its implementation. We apply Weick's (1995) sensemaking framework to examine four foundational tensions of cyber-resilience: a definitional tension, an environmental tension, an internal tension, and a regulatory tension. We then document how these tensions are embedded in cyber-resilience practices at the preparatory, response and adaptive stages. We rely on qualitative data from a sample of 58 cybersecurity professionals to uncover these tensions and how they reverberate across cyber-resilience practices.
DOCUMENT
This paper proposes and showcases a methodology to develop an observational behavior assessment instrument to assess psychological competencies of police officers. We outline a step-by-step methodology for police organizations to measure and evaluate behavior in a meaningful way to assess these competencies. We illustrate the proposed methodology with a practical example. We posit that direct behavioral observation can be key in measuring the expression of psychological competence in practice, and that psychological competence in practice is what police organizations should care about. We hope this paper offers police organizations a methodology to perform scientifically informed observational behavior assessment of their police officers’ psychological competencies and inspires additional research efforts into this important area.
MULTIFILE
From the article: This paper describes the external IT security analysis of an international corporate organization, containing a technical and a social perspective, resulting in a proposed repeatable approach and lessons learned for applying this approach. Part of the security analysis was the utilization of a social engineering experiment, as this could be used to discover employee related risks. This approach was based on multiple signals that indicated a low IT security awareness level among employees as well as the results of a preliminary technical analysis. To carry out the social engineering experiment, two techniques were used. The first technique was to send phishing emails to both the system administrators and other employees of the company. The second technique comprised the infiltration of the office itself to test the physical security, after which two probes were left behind. The social engineering experiment proved that general IT security awareness among employees was very low. The results allowed the research team to infiltrate the network and have the possibility to disable or hamper crucial processes. Social engineering experiments can play an important role in conducting security analyses, by showing security vulnerabilities and raising awareness within a company. Therefore, further research should focus on the standardization of social engineering experiments to be used in security analyses and further development of the approach itself. This paper provides a detailed description of the used methods and the reasoning behind them as a stepping stone for future research on this subject. van Liempd, D., Sjouw, A., Smakman, M., & Smit, K. (2019). Social Engineering As An Approach For Probing Organizations To Improve It Security: A Case Study At A Large International Firm In The Transport Industry. 119-126. https://doi.org/10.33965/es2019_201904l015
MULTIFILE
ABSTRACT Purpose: This short paper describes the dashboard design process for online hate speech monitoring for multiple languages and platforms. Methodology/approach: A case study approach was adopted in which the authors followed a research & development project for a multilingual and multiplatform online dashboard monitoring online hate speech. The case under study is the project for the European Observatory of Online Hate (EOOH). Results: We outline the process taken for design and prototype development for which a design thinking approach was followed, including multiple potential user groups of the dashboard. The paper presents this process's outcome and the dashboard's initial use. The identified issues, such as obfuscation of the context or identity of user accounts of social media posts limiting the dashboard's usability while providing a trade-off in privacy protection, may contribute to the discourse on privacy and data protection in (big data) social media analysis for practitioners. Research limitations/implications: The results are from a single case study. Still, they may be relevant for other online hate speech detection and monitoring projects involving big data analysis and human annotation. Practical implications: The study emphasises the need to involve diverse user groups and a multidisciplinary team in developing a dashboard for online hate speech. The context in which potential online hate is disseminated and the network of accounts distributing or interacting with that hate speech seems relevant for analysis by a part of the user groups of the dashboard. International Information Management Association
LINK
Anthropology is traditionally broken into several subfields, physical/biological anthropology, social/cultural anthropology, linguistic anthropology, archaeology, and sometimes also applied anthropology. Anthropology of the environment, or environmental anthropology, is a specialization within the field of anthropology that studies current and historic human-environment interactions. Although the terms environmental anthropology and ecological anthropology are often used interchangeably, environmental anthropology is considered by some to be the applied dimension of ecological anthropology, which encompasses the broad topics of primate ecology, paleoecology, cultural ecology, ethnoecology, historical ecology, political ecology, spiritual ecology, and human behavioral and evolutionary ecology. However, according to Townsend (2009: 104), “ecological anthropology will refer to one particular type of research in environmental anthropology—field studies that describe a single ecosystem including a human population and frequently deal with a small population of only a few hundred people such as a village or neighborhood.” Kottak states that the new ecological anthropology mirrors more general changes in the discipline: the shift from research focusing on a single community or unique culture “to recognizing pervasive linkages and concomitant flows of people, technology, images, and information, and to acknowledging the impact of differential power and status in the postmodern world on local entities. In the new ecological anthropology, everything is on a larger scale” (Kottak 1999:25). Environmental anthropology, like all other anthropological subdisciplines, addresses both the similarities and differences between human cultures; but unlike other subdisciplines (or more in line with applied anthropology), it has an end goal—it seeks to find solutions to environmental damage. While in our first volume (Shoreman-Ouimet and Kopnina 2011) we criticized Kottak’s anthropocentric bias prioritizing environmental anthropology's role as a supporter of primarily people's (and particularly indigenous) interests rather than ecological evidence. In his newer 2 publication, Kottak (2010:579) states: “Today’s ecological anthropology, aka environmental anthropology, attempts not only to understand but also to find solutions to environmental problems.” And because this is a global cause with all cultures, peoples, creeds, and nationalities at stake, the contributors to this volume demonstrate that the future of environmental anthropology may be more focused on finding the universals that underlie human differences and understanding how these universals can best be put to use to end environmental damage. This is an Accepted Manuscript of a book chapter published by Routledge/CRC Press in "Environmental Anthropology: Future Directions" on 7/18/13 available online: https://doi.org/10.4324/9780203403341 LinkedIn: https://www.linkedin.com/in/helenkopnina/
MULTIFILE