En este estudio se investigaron los rasgos de personalidad relacionados con la conducción de riesgo y los accidentes en estudiantes universitarios. El primer estudio (N=132) evaluó la relación entre los comportamientos de riesgo y la personalidad (16PF-5 dimensiones de segundo orden). Tres factores fueron extraídos en relación con la conducción de riesgo: cometer errores de conducción, distracción, errores de omisión en la conducción. Los individuos con bajo autocontrol y altos niveles de ansiedad eran más propensos a tener comportamientos distractores y cometer errores de omisión en la conducción. Mientras que sujetos con bajo autocontrol y altos niveles de independencia se asociaron con el factor cometer errores de conducción. En el segundo estudio (N=540) evaluamos si el número de accidentes de tráfico, de los que una persona ha sido responsable, está relacionado con el comportamiento de riesgo en la conducción. Los resultados muestran que los conductores que cometen más accidentes presentan puntuaciones superiores en tres nuevos factores de riesgo en la conducción: conducción temeraria, concentración afectada y división de la atención.Palabras clave: Conducción, personalidad, accidentes, comportamiento.
Among the service models provided by the cloud, the software as a service (SaaS) model has had the greatest growth. This service model is an attractive option for organizations, as they can transfer part or all of their IT functions to a cloud service provider. However, there is still some uncertainty about deciding to carry out a migration of all data to the cloud, mainly due to security concerns. The SaaS model not only inherits the security problems of a traditional application, but there are unique attacks and vulnerabilities for a SaaS architecture. Additionally, some of the attacks in this environment are more devastating due to nature of shared resources in the SaaS model. Some of these attacks and vulnerabilities are not yet well known to software designers and developers. This lack of knowledge has negative consequences as it can expose sensitive data of users and organizations. This paper presents a rigorous systematic review using the SALSA framework to know the threats, attacks and countermeasures to mitigate the security problems that occur in a SaaS environment. As part of the results of this review, a classification of threats, attacks and countermeasures in the SaaS environment is presented.
Augmented reality is a technology that opens doors to experience interactions with virtual and real-world elements. It provides an opportunity to acquire knowledge and practical skills through software. However, it is not an easy task to determine the qualities and features that an augmented reality framework must possess to lay the foundations to build a structure focused on augmented reality. Therefore, in this work, we propose a framework focused on augmented reality applications without a specific domain area. We conduct a review of different frameworks for augmented reality. In order to define the characteristics, components, and the overall structure of our framework, a review of the most relevant literature in the field was carried out. As a result, we designed a framework focused on augmented reality without a specific domain area. Finally, we conclude that the structures, components, and features for an augmented reality framework vary greatly depending on the requirements or characteristics used for each approach.
Electronic voting systems are prone to faults, errors and intentional attacks. One risk is the addition of fake votes (stuffing) that can be carried out by an external or internal entity. There are several audit mechanisms intended to prevent, detect and / or mitigate any threats that could undermine the election results. This paper presents a review and evaluation of the different mechanisms used to conduct an election audit for electronic voting systems. Also, an audit mechanism to detect ballot stuffing or any other manipulation on votes is presented.
Los procesos electorales, históricamente, han sido susceptibles de fraude. Las legislaciones electorales de los países tratan, en mayor o menor grado, de proteger los procesos electorales de acciones fraudulentas, a través de procedimientos e incluso de mecanismos tecnológicos. En algunos casos, la implementación de tecnologías de la información y de la comunicación ha jugado un papel importante en ese sentido y, en algunos países, se ha logrado disminuir el nivel de fraude. En este trabajo se propone identificar los factores que influyen en el cometimiento de un fraude electoral, a partir de la teoría clásica del triángulo del fraude. El enfoque principal es identificar las oportunidades percibidas (uno de los elementos del triángulo del fraude). Se conceptualiza el proceso electoral y se presenta el modelo de una instancia particular. A partir de ese modelo conceptual se propone un marco de referencia que ayudará a identificar las oportunidades percibidas de cometer fraude.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.