NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20251
Since 20249
Since 2021 (last 5 years)22
Since 2016 (last 10 years)50
Since 2006 (last 20 years)112
Audience
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 112 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Baldassari, Mario J.; Moore, Kara N.; Hyman, Ira E., Jr.; Hope, Lorraine; Mah, Eric Y.; Lindsay, D. Stephen; Mansour, Jamal; Saraiva, Renan; Horry, Ruth; Rath, Hannah; Kelly, Lauren; Jones, Rosie; Vale, Shannan; Lawson, Bethany; Pedretti, Josh; Palma, Tomás A.; Cruz, Francisco; Quarenta, Joana; Van der Cruyssen, Ine; Mileva, Mila; Allen, Jessica; Jeye, Brittany; Wiechert, Sara – Cognitive Research: Principles and Implications, 2023
Research on eyewitness identification often involves exposing participants to a simulated crime and later testing memory using a lineup. We conducted a systematic review showing that pre-event instructions, instructions given before event exposure, are rarely reported and those that are reported vary in the extent to which they warn participants…
Descriptors: Memory, Audiences, Attention, Observation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Sarker Monojit Asish – ProQuest LLC, 2023
Virtual Reality (VR) has been found useful to improve engagement and retention level of students, for some topics, compared to traditional learning tools such as books, and videos. However, a student could still get distracted and disengaged due to a variety of factors including stress, mind-wandering, unwanted noise, external alerts, and internal…
Descriptors: Students, Attention Control, Computer Simulation, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Teague R. Henry; Zachary F. Fisher; Kenneth A. Bollen – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Model-Implied Instrumental Variable Two-Stage Least Squares (MIIV-2SLS) is a limited information, equation-by-equation, noniterative estimator for latent variable models. Associated with this estimator are equation-specific tests of model misspecification. One issue with equation-specific tests is that they lack specificity, in that they indicate…
Descriptors: Bayesian Statistics, Least Squares Statistics, Structural Equation Models, Equations (Mathematics)
Peer reviewed Peer reviewed
Direct linkDirect link
Zsuzsa Bakk – Structural Equation Modeling: A Multidisciplinary Journal, 2024
A standard assumption of latent class (LC) analysis is conditional independence, that is the items of the LC are independent of the covariates given the LCs. Several approaches have been proposed for identifying violations of this assumption. The recently proposed likelihood ratio approach is compared to residual statistics (bivariate residuals…
Descriptors: Goodness of Fit, Error of Measurement, Comparative Analysis, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Grantee Submission, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Lim, Hwanggyu; Choe, Edison M.; Han, Kyung T. – Journal of Educational Measurement, 2022
Differential item functioning (DIF) of test items should be evaluated using practical methods that can produce accurate and useful results. Among a plethora of DIF detection techniques, we introduce the new "Residual DIF" (RDIF) framework, which stands out for its accessibility without sacrificing efficacy. This framework consists of…
Descriptors: Test Items, Item Response Theory, Identification, Robustness (Statistics)
Peer reviewed Peer reviewed
Direct linkDirect link
Ruoxuan Li; Lijuan Wang – Grantee Submission, 2024
Causal-formative indicators are often used in social science research. To achieve identification in causal-formative indicator modeling, constraints need to be applied. A conventional method is to constrain the weight of a formative indicator to be 1. The selection of which indicator to have the fixed weight, however, may influence statistical…
Descriptors: Social Science Research, Causal Models, Formative Evaluation, Measurement
Peer reviewed Peer reviewed
Direct linkDirect link
Kellen, David; McAdoo, Ryan M. – Cognitive Research: Principles and Implications, 2022
Sequential lineups are one of the most commonly used procedures in police departments across the USA. Although this procedure has been the target of much experimental research, there has been comparatively little work formally modeling it, especially the sequential nature of the judgments that it elicits. There are also important gaps in our…
Descriptors: Guidelines, Comparative Analysis, Police, Law Enforcement
Peer reviewed Peer reviewed
Direct linkDirect link
Aaron Y. Zhao; Joseph Collins; Joel B. Floyd Jr.; Xianming Tan; David S. Lawrence – Journal of Chemical Education, 2023
A variety of strategies have been introduced to tackle the issue of laboratory safety in academic settings. These strategies include innovative educational tools as students transition from the classroom into the laboratory, the introduction of policies designed to protect the researchers in the laboratory environment, and the creation of teams of…
Descriptors: Teamwork, Cooperative Learning, Chemistry, Science Laboratories
Peer reviewed Peer reviewed
Direct linkDirect link
Max Kailler Smith; Amelia R. Kracinovich; Brandon J. Schrom; Timothy L. Dunn – Cognitive Research: Principles and Implications, 2025
As automation becomes increasingly integrated into complex military tasks, its role in supporting human performance under fatigue warrants careful evaluation. A specific military use case in which automatic target cuing (ATC) is integrated is undersea threat detection (UTD). These types of tasks demand sustained vigilance, accurate classification,…
Descriptors: Fatigue (Biology), Performance, Metacognition, Cues
Peer reviewed Peer reviewed
Direct linkDirect link
Kucina, Talira; Sauer, James D.; Holt, Glenys A.; Brewer, Neil; Palmer, Matthew A. – Applied Cognitive Psychology, 2020
Presenting a blank line-up--containing only fillers--to witnesses prior to showing a real line-up might be useful for screening out those who pick from the blank line-up as unreliable witnesses. We show that the effectiveness of this procedure varies depending on instructions given to witnesses. Participants (N = 462) viewed a simulated crime and…
Descriptors: Recognition (Psychology), Simulation, Crime, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Hyönä, Jukka; Oksama, Lauri; Rantanen, Esa – Applied Cognitive Psychology, 2020
In two experiments, participants tracked the identity and location of moving words. The task bears resemblance to one performed by air traffic controllers who track multiple moving aircraft, where they are identified with relatively complex alphanumeric call signs. In Experiment 1, stimulus familiarity was manipulated by comparing the tracking of…
Descriptors: Identification, Word Recognition, Eye Movements, Air Transportation
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8