The purpose of this study was to investigate the effectiveness of virtual mentoring for enhancing the persistence of secondary and postsecondary students with disabilities engaged in science, technology, engineering, and mathematics (STEM) learning. The student participants ( N = 189) were all engaged in STEM coursework and enrolled in a virtual-mentoring program for a span of 4 years. Persistence was measured with an online survey designed to evaluate growth across self-determination, self-advocacy, STEM aspirations, and self-efficacy (math and science). After participating in virtual-mentoring practices, the most significant improvement was demonstrated in students’ perception of self-determination and self-advocacy. Growth differences were identified across type of disability and race/ethnicity populations. Implications pertaining to STEM aspirations and self-efficacy were addressed.
This paper explores how the current paradigm of vulnerability management might adapt to include machine learning systems through a thought experiment: what if flaws in machine learning (ML) were assigned Common Vulnerabilities and Exposures (CVE) identifiers (CVE-IDs)? We consider both ML algorithms and model objects. The hypothetical scenario is structured around exploring the changes to the six areas of vulnerability management: discovery, report intake, analysis, coordination, disclosure, and response. While algorithm flaws are well-known in the academic research community, there is no apparent clear line of communication between this research community and the operational communities that deploy and manage systems that use ML. The thought experiments identify some ways in which CVE-IDs may establish some useful lines of communication between these two communities. In particular, it would start to introduce the research community to operational security concepts, which appears to be a gap left by existing efforts.
CCS CONCEPTS• Computing methodologies → Machine learning algorithms; • Software and its engineering → Maintaining software; • Security and privacy → Vulnerability management.
Efforts are needed to enhance the culture of worksite health and encourage communication and support among workers. Practitioners should consider connecting different settings to enhance reach and accessibility, and applying multiple delivery strategies to increase employee interest and engagement.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.