Increasing data suggest that for medical school students the stress of academic and psychologicaldemands can impair social emotions that are a core aspect of compassion and ultimately physiciancompetence. Few interventions have proven successful for enhancing physician compassion inways that persist in the face of suffering and that enable sustained caretaker well-being. To addressthis issue, the current study was designed to (1) investigate the feasibility of cognitively-basedcompassion training (CBCT) for second-year medical students, and (2) test whether CBCT decreasesdepression, enhances compassion, and improves daily functioning in medical students. Comparedto the wait-list group, students randomized to CBCT reported increased compassion, and decreasedloneliness and depression. Changes in compassion were most robust in individuals reporting highlevels of depression at baseline, suggesting that CBCT may benefit those most in need by breakingthe link between personal suffering and a concomitant drop in compassion
CHAPTER 46DEVELOPING SECURITY POLICIES M. E. Kabay 46.1 INTRODUCTION. This chapter reviews methods for developing security policies. Some of the other chapters of this Handbook that bear on policy content, development, and implementation are as follows:Chapter 15 provides an extensive overview of physical security policies.Chapter 18 discusses local area network security issues and policies.Chapter 25 reviews software development policies and quality assurance policies.Chapter 28 presents principles, topics, and resources for creating effective security policy guidelines.Chapter 29 looks at methods for enhancing security awareness.Chapter 31 provides guidance on employment policies from a security standpoint.Chapter 32 makes explicit recommendations about operations management policies.Chapter 33 reviews specific recommendations for e-mail and Internet usage.Chapter 35 presents concepts and techniques from social psychology to make security policy implementation more effective.Chapter 39 discusses the policies that apply to application design.Chapter 51 looks at censorship and content filtering on the Internet.
COLLABORATING IN BUILDING SECURITY POLICIES.Policies are the foundation of effective information security, but the task of policy creation is complicated by human and organizational resistance. Technology alone does not work. In changing human behavior, rationality and substance are not enough: The process of development affects how people feel about policies and whether they see these rules as needless imposition of power or an expression of their own values.Security is always described as being everyone's business; however, in practice, security interferes with everyone's business. For example, network managers work hard to make networks user-friendly. They do everything they can to make life easier for users; they provide network access routines with a graphical user interface, client-server systems with hot links between local spreadsheets and corporate databases, and a gateway to the Internet for the engineering users. Superficially, one might think that implementing network security would Computer Security Handbook, 4th Edition
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.