首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
The idea of securitization holds that perceived threats and the ensuing need for security measures are mobilized in speech acts to legitimate bypassing of normal practices of democratic politics and justification. Citizens, as members of the political community, are thus effectively deprived of their agency. Attempts at securitization gain clout from the severity of the mobilized threat: the more convincingly a threat is argued to cause disruptions in the functioning of society and ultimately the loss of human life, the more acceptable it will become to bypass democratic governance in order to prevent the threat. Accordingly, security technologies can be conceived of as those technologies that are constructed and mobilized in such attempts at securitization and depoliticization. However, security technologies can also be thought of as technologies that are mobilized in face of existential threats more generally, regardless of whether their mobilization has a depoliticizing effect or not. Yet, as case studies on airport security scanners and security in smart grids show, not all implementations of security, even against existential threats, show this tendency of depoliticization as essential in securitization and in technologies of security. This article further demonstrates that the agency of citizens in the governance of these technologies importantly depends on whether or not the threat is perceived as internal or external to the referent object of the security programme.  相似文献   

2.
The COVID-19 pandemic has highlighted the need for further research evaluating the validity of conducting a battery of neuropsychological assessments virtually compared with face-to-face administration. Previous research has suggested that some neuropsychological assessments yield valid results when administered virtually, however, much of the previous research focused on older adults. To determine the validity of virtually administered neuropsychological tests, 28 healthy participants were assessed using a within-subjects, counter-balanced design. Participants completed a neuropsychological assessment battery covering tests of general intellectual functioning, memory and attention, executive functioning, language and information processing speed, as well as effort. There was no significant difference between face-to-face administration of the neuropsychological battery compared with virtual administration for the majority of the tests used. However, there were significant differences in the Colour Naming Task, with participants making fewer errors on the colour naming task and inhibition/switching task when administered virtually compared with face-to-face administration. There was also a significant age cohort effect in the inhibition/switching task. There was also a trending significant difference in mode of administration for the Verbal Fluency Task. Virtually administered neuropsychological assessments largely provide a valid alternative to face-to-face assessments; however, consideration must be given to test selection as well as the population of participants that are being assessed. Other important considerations must focus on preserving the security and integrity of test materials, as well as administration in a medico-legal setting. Future research should focus on validating assessments with specific patient populations and developing a neuropsychological assessment battery using information technology.  相似文献   

3.
As technology continues to evolve, organizations seek to use personal electronics like smartphones for selection and assessment. While this promises to increase access to a more diverse applicant pool, research is needed to examine whether commonly used assessments function similarly on these devices as on a conventional computer. Contrary to past research, we did not find meaningful differences in general mental ability (GMA) test scores between device groups. We also observed few differences in item functioning between devices. Screen size had a positive, but marginal effect on test scores. These results are optimistic for the use of mobile devices in GMA testing, but additional research is needed to examine the functioning of alternative GMA tests administered on mobile devices.  相似文献   

4.
Financial security (i.e., a person’s sense that they can afford the things they need now and in the foreseeable future) contributes to psychological health and well-being. In the present research, we explored the implications of financial security for perceptions of meaning in life. In Study 1, we found that perceptions of financial insecurity predicted perceptions of meaning in life above and beyond income. Further, income only predicted perceptions of meaning to the extent that it was associated with reduced financial insecurity. In Studies 2 and 3, we found that financial security threats undermined perceptions of meaning in life. Taken together, these studies suggest that maintaining financial security is important for a sense of meaning in life.  相似文献   

5.
Often, sentence completion tests are administered to clients without a clear sense of the clinical questions to be investigated, and, therefore, the appropriate sentence completion instrument to be used. The multitude of forms that have evolved in the last fifty years have made it difficult for clinicians to make informed decisions about which form to use and for what purpose. This article presents ten general guidelines or considerations for the effective use of this popular but sometimes misused psychological assessment method. Practitioners are urged to consider such issues as oral versus written presentation of items, item content in terms of positive or negative stimulus pull, the structure of sentence stems, the original purpose of a given test in regard to intended population and theoretical orientation of the author, and the empirical validity of tests.  相似文献   

6.
The Quality Control (QC) Guidelines are intended to increase the efficiency, precision, and accuracy of the scoring, analysis, and reporting process of testing. The QC Guidelines focus on large-scale testing operations where multiple forms of tests are created for use on set dates. However, they may also be used for a wide variety of other testing situations and assessment techniques and for almost any situation in which assessment occurs. The QC Guidelines are applicable in any form of test administration, including paper and pencil tests and the ever-increasing computerized assessments via the Internet or offline.  相似文献   

7.
In this study, we propose that the unique needs and characteristics of linguistic minorities should be considered throughout the test development process. Unlike most measurement invariance investigations in the assessment of linguistic minorities, which typically are conducted after test administration, we propose strategies that focus on the early stages of test development. Our approaches involve considering linguistic minorities in the selection of the test and sampling designs. We posit that joint consideration of these issues preemptively can strengthen the claims derived from tests used to assess linguistically diverse populations. This also will contribute to more psychometrically robust assessments, which can yield accurate and valid score-based inferences for linguistic minorities. To this end, we provide various examples and methodological approaches that can be used in the selection of the test and sampling designs that take these issues into consideration.  相似文献   

8.
With the advent of web-based technology, online testing is becoming a mainstream mode in large-scale educational assessments. Most online tests are administered continuously in a testing window, which may post test security problems because examinees who take the test earlier may share information with those who take the test later. Researchers have proposed various statistical indices to assess the test security, and one most often used index is the average test-overlap rate, which was further generalized to the item pooling index (Chang & Zhang, 2002, 2003). These indices, however, are all defined as the means (that is, the expected proportion of common items among examinees) and they were originally proposed for computerized adaptive testing (CAT). Recently, multistage testing (MST) has become a popular alternative to CAT. The unique features of MST make it important to report not only the mean, but also the standard deviation (SD) of test overlap rate, as we advocate in this paper. The standard deviation of test overlap rate adds important information to the test security profile, because for the same mean, a large SD reflects that certain groups of examinees share more common items than other groups. In this study, we analytically derived the lower bounds of the SD under MST, with the results under CAT as a benchmark. It is shown that when the mean overlap rate is the same between MST and CAT, the SD of test overlap tends to be larger in MST. A simulation study was conducted to provide empirical evidence. We also compared the security of MST under the single-pool versus the multiple-pool designs; both analytical and simulation studies show that the non-overlapping multiple-pool design will slightly increase the security risk.  相似文献   

9.
Due to the terrorist attacks of 9/11 and the anthrax letters of a few weeks later, the concept of dual use has spread widely in the life sciences during the past decade. This article is aimed at a clarification of the dual use concept and its scope of application for the life sciences. Such a clarification would greatly facilitate the work of policymakers seeking to ensure security while avoiding undesirable interventions of government in the conduct of science. The article starts with an overview of the main developments in life sciences in relation to dual use. This is illustrated by discussions on synthetic biology and dual use. The findings lead to a reconsideration of the dual use concept. An area in need of further attention is to what extent threats and intentions should have impact on the definition of dual use. Possible threats are analyzed against the background of the phenomenon of securitization of health care and life sciences: considering these sectors of society in security terms. Some caveats that should be taken into account in a dual use policy are described. An acceptable, adequate and applicable definition of the dual use concept could help researchers, universities, companies and policy makers. Such a definition should build upon, but go beyond, the view developed in the influential Fink-report, which concentrates on the so-called ??experiments of concern??, e.g. experiments that enhance the virulence of pathogens (National Research Council of the National Academies 2004) It will be argued that??in addition to these more technical aspects??a definition of dual use should include the aspect of threats and intentions.  相似文献   

10.
阈上或者阈下的安全依恋启动可以使个体获得暂时的依恋安全感,并对个体的社会行为产生显著的影响。这种影响主要表现在个体会表现出更多的亲社会行为、揭露行为以及更少的欺骗、歧视行为和道德脱离行为。这可能是因为启动激活的依恋安全感迁移至外显行为。脑神经活动是迁移顺利发生的生理基础。今后的研究可以设置更具生态效度的实验条件,以其它社会行为为研究对象,或者结合当前研究提出的迁移视角,进一步探索安全依恋启动对社会行为的影响。  相似文献   

11.
The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world’s population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.  相似文献   

12.
Although assessment use is a professional activity recognized by every major counseling organization, little is known about which assessments are used in counseling. In this study, 926 respondents from a random national sample of counselors reported their use of personality, projective, career, intelligence/cognitive, educational/achievement, clinical/behavioral, and environmental/interpersonal tests. Test rankings by frequency of use and comparisons by type of counselor and type of test are reported. Implications for policy and practice are discussed.  相似文献   

13.
Assessing effort level during neuropsychological evaluations is critical to support the accuracy of cognitive test scores. Many instruments are designed to measure effort, yet they are not routinely administered in neuropsychological assessments. The Test of Memory Malingering (TOMM) and the Word Memory Test (WMT) are commonly administered symptom validity tests with sound psychometric properties. This study examines the use of the TOMM Trial 1 and the WMT Immediate Recognition (IR) trial scores as brief screening tools for insufficient effort through an archival analysis of a combined sample of mild head-injury litigants ( N = 105) who were assessed in forensic private practices. Results show that both demonstrate impressive diagnostic accuracy and calculations of positive and negative predictive power are presented for a range of base rates. These results support the utility of Trial 1 of the TOMM and the WMT IR trial as screening methods for the assessment of insufficient effort in neuropsychological assessments.  相似文献   

14.
微生物威胁与人类安全   总被引:2,自引:0,他引:2  
传染病伴随人类而存在,是人类的天敌.科学的进步、时代的发展、全球政治经济一体化的进程,并未停止传染病行进的脚步,许多旧的和新发的传染病不断涌现,日益成为人类的疾病负担,人为的微生物恐怖主义危险日益增大,直接威胁人类的健康、安全和可持续性发展.  相似文献   

15.
This article summarizes evidence and issues associated with psychological assessment. Data from more than 125 meta-analyses on test validity and 800 samples examining multimethod assessment suggest 4 general conclusions: (a) Psychological test validity is strong and compelling, (b) psychological test validity is comparable to medical test validity, (c) distinct assessment methods provide unique sources of information, and (d) clinicians who rely exclusively on interviews are prone to incomplete understandings. Following principles for optimal nomothetic research, the authors suggest that a multimethod assessment battery provides a structured means for skilled clinicians to maximize the validity of individualized assessments. Future investigations should move beyond an examination of test scales to focus more on the role of psychologists who use tests as helpful tools to furnish patients and referral sources with professional consultation.  相似文献   

16.
This special issue aims to advance the integration of personality assessment across applied contexts. Personality assessment is an integral part of clinical and organizational case conceptualizations, intervention planning, and change efforts. Yet, as the present historical account will illustrate, the literatures in relation to personality assessment have developed rather independently. The articles in this special issue highlight the importance of organizational personality assessment as relates to how (a) academics vs. practitioners look at standards for test selection (Furnham), (b) the intended use of tests (selection vs. employee development) impacts the criteria used to establish assessment tool validity (Moyle & Hackston), (c) personality models developed in social and personality psychology can be applied in organizational contexts (Shorey & Chaffin), (d) assessments are modified to more accurately assess operational definitions of constructs (Belwalker & Tobacyk), (e) perception and knowledge about personality of others can be assessed as an ability (Mayer, Lortie, Panter & Caruso), and (f) performance-based techniques can be used in organizational personality assessment to curtail faking and socially desirable responding (Harms, Krasikova & Luthans). The present introduction highlights the important contributions of these articles, individually and as a body, in advancing the integration and application of personality assessment in organizational contexts.  相似文献   

17.
The widespread use of unproctored Internet-based testing (UIT) in employment-related assessments has resulted in a burgeoning use of mobile devices to complete these assessments. Coupled with this is a concomitant interest in UIT-device-type effects, specifically, differences or lack thereof between assessments completed on “mobile” versus “nonmobile” devices. However, there is limited theoretical or conceptual work that seeks to explain the observed effects of UIT device type on test scores. Consequently, this article first presents a review of the extant empirical literature and then, on the basis of that, presents a framework—the structural characteristics/information processing framework—for psychologically conceptualizing the effect of UIT device types on test and assessment scores. The framework is used to explain previous findings and advance testable propositions for future research.  相似文献   

18.
The use of computer-based assessments makes the collection of detailed data that capture examinees’ progress in the tests and time spent on individual actions possible. This article presents a study using process and timing data to aid understanding of an international language assessment and the examinees. Issues regarding test-taking strategies, test speededness, test design, and their relationship to examinees’ demographic backgrounds and performance are also discussed.  相似文献   

19.
Using language appropriately and effectively in social contexts requires pragmatic language competencies (PLCs). Increasingly, deficits in PLCs are linked to child and adolescent disorders, including autism spectrum, externalizing, and internalizing disorders. As the role of PLCs expands in diagnosis and treatment of developmental psychopathology, psychologists and educators will need to appraise and select clinical and research PLC instruments for use in assessments and/or studies. To assist in this appraisal, 24 PLC instruments, containing 1,082 items, are assessed by addressing four questions: (1) Can PLC domains targeted by assessment items be reliably identified?, (2) What are the core PLC domains that emerge across the 24 instruments?, (3) Do PLC questionnaires and tests assess similar PLC domains?, and (4) Do the instruments achieve content, structural, diagnostic, and ecological validity? Results indicate that test and questionnaire items can be reliably categorized into PLC domains, that PLC domains featured in questionnaires and tests significantly differ, and that PLC instruments need empirical confirmation of their dimensional structure, content validity across all developmental age bands, and ecological validity. Progress in building a better evidence base for PLC assessments should be a priority in future research.  相似文献   

20.
Connected and Autonomous Vehicles (CAVs) constitute an automotive development carrying paradigm-shifting potential that may soon be embedded into a dynamically changing urban mobility landscape. The complex machine-led dynamics of CAVs make them more prone to data exploitation and vulnerable to cyber attacks than any of their predecessors increasing the risks of privacy breaches and cyber security violations for their users. This can adversely affect the public acceptability of CAVs, give them a bad reputation at this embryonic stage of their development, create barriers to their adoption and increased use, and complicate the business models of their future operations. Therefore, it is vital to identify and create an in-depth understanding of the cyber security and privacy issues associated with CAVs, and of the way these can be prioritised and addressed. This work employs 36 semi-structured elite interviews to explore the diverse dimensions of user acceptance through the lens of the well-informed CAV experts that already anticipate problems and look for their solutions. Our international interviewee sample represents academia, industry and policy-making so that all the key stakeholder voices are heard. Thematic analysis was used to identify and contextualise the factors that reflect and affect CAV acceptance in relation to the privacy and cyber security agendas. Six core themes emerged: awareness, user and vendor education, safety, responsibility, legislation, and trust. Each of these themes has diverse and distinctive dimensions and are discussed as sub-themes. We recommend that mitigating the cyber security and privacy risks embedded in CAVs require inter-institutional cooperation, awareness campaigns and trials for trust-building purposes, mandatory educational training for manufacturers and perhaps more importantly for end-users, balanced and fair responsibility-sharing, two-way dynamic communication channels and a clear consensus on what constitutes threats and solutions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号