NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 124 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Baldassari, Mario J.; Moore, Kara N.; Hyman, Ira E., Jr.; Hope, Lorraine; Mah, Eric Y.; Lindsay, D. Stephen; Mansour, Jamal; Saraiva, Renan; Horry, Ruth; Rath, Hannah; Kelly, Lauren; Jones, Rosie; Vale, Shannan; Lawson, Bethany; Pedretti, Josh; Palma, Tomás A.; Cruz, Francisco; Quarenta, Joana; Van der Cruyssen, Ine; Mileva, Mila; Allen, Jessica; Jeye, Brittany; Wiechert, Sara – Cognitive Research: Principles and Implications, 2023
Research on eyewitness identification often involves exposing participants to a simulated crime and later testing memory using a lineup. We conducted a systematic review showing that pre-event instructions, instructions given before event exposure, are rarely reported and those that are reported vary in the extent to which they warn participants…
Descriptors: Memory, Audiences, Attention, Observation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Teague R. Henry; Zachary F. Fisher; Kenneth A. Bollen – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Model-Implied Instrumental Variable Two-Stage Least Squares (MIIV-2SLS) is a limited information, equation-by-equation, noniterative estimator for latent variable models. Associated with this estimator are equation-specific tests of model misspecification. One issue with equation-specific tests is that they lack specificity, in that they indicate…
Descriptors: Bayesian Statistics, Least Squares Statistics, Structural Equation Models, Equations (Mathematics)
Peer reviewed Peer reviewed
Direct linkDirect link
Zsuzsa Bakk – Structural Equation Modeling: A Multidisciplinary Journal, 2024
A standard assumption of latent class (LC) analysis is conditional independence, that is the items of the LC are independent of the covariates given the LCs. Several approaches have been proposed for identifying violations of this assumption. The recently proposed likelihood ratio approach is compared to residual statistics (bivariate residuals…
Descriptors: Goodness of Fit, Error of Measurement, Comparative Analysis, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Grantee Submission, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Carly Oddleifson; Ishan N. Vengurlekar; Chloe Hendrix; Temma Levis; Ellen Anderson; Katie Eklund; Stephen Kilgus – School Mental Health, 2025
Schools have become a primary context for assessing and addressing social, emotional, and behavioral difficulties in response to the youth mental health crisis. However, traditional paper-based assessments are often hindered by time constraints and rater bias, limiting their effectiveness for early identification and intervention.…
Descriptors: Technology Uses in Education, Assistive Technology, Computer Simulation, Motion
Peer reviewed Peer reviewed
Direct linkDirect link
Lim, Hwanggyu; Choe, Edison M.; Han, Kyung T. – Journal of Educational Measurement, 2022
Differential item functioning (DIF) of test items should be evaluated using practical methods that can produce accurate and useful results. Among a plethora of DIF detection techniques, we introduce the new "Residual DIF" (RDIF) framework, which stands out for its accessibility without sacrificing efficacy. This framework consists of…
Descriptors: Test Items, Item Response Theory, Identification, Robustness (Statistics)
Peer reviewed Peer reviewed
Direct linkDirect link
Kellen, David; McAdoo, Ryan M. – Cognitive Research: Principles and Implications, 2022
Sequential lineups are one of the most commonly used procedures in police departments across the USA. Although this procedure has been the target of much experimental research, there has been comparatively little work formally modeling it, especially the sequential nature of the judgments that it elicits. There are also important gaps in our…
Descriptors: Guidelines, Comparative Analysis, Police, Law Enforcement
Peer reviewed Peer reviewed
Direct linkDirect link
Aaron Y. Zhao; Joseph Collins; Joel B. Floyd Jr.; Xianming Tan; David S. Lawrence – Journal of Chemical Education, 2023
A variety of strategies have been introduced to tackle the issue of laboratory safety in academic settings. These strategies include innovative educational tools as students transition from the classroom into the laboratory, the introduction of policies designed to protect the researchers in the laboratory environment, and the creation of teams of…
Descriptors: Teamwork, Cooperative Learning, Chemistry, Science Laboratories
Peer reviewed Peer reviewed
Direct linkDirect link
Max Kailler Smith; Amelia R. Kracinovich; Brandon J. Schrom; Timothy L. Dunn – Cognitive Research: Principles and Implications, 2025
As automation becomes increasingly integrated into complex military tasks, its role in supporting human performance under fatigue warrants careful evaluation. A specific military use case in which automatic target cuing (ATC) is integrated is undersea threat detection (UTD). These types of tasks demand sustained vigilance, accurate classification,…
Descriptors: Fatigue (Biology), Performance, Metacognition, Cues
Peer reviewed Peer reviewed
Direct linkDirect link
Kucina, Talira; Sauer, James D.; Holt, Glenys A.; Brewer, Neil; Palmer, Matthew A. – Applied Cognitive Psychology, 2020
Presenting a blank line-up--containing only fillers--to witnesses prior to showing a real line-up might be useful for screening out those who pick from the blank line-up as unreliable witnesses. We show that the effectiveness of this procedure varies depending on instructions given to witnesses. Participants (N = 462) viewed a simulated crime and…
Descriptors: Recognition (Psychology), Simulation, Crime, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Hyönä, Jukka; Oksama, Lauri; Rantanen, Esa – Applied Cognitive Psychology, 2020
In two experiments, participants tracked the identity and location of moving words. The task bears resemblance to one performed by air traffic controllers who track multiple moving aircraft, where they are identified with relatively complex alphanumeric call signs. In Experiment 1, stimulus familiarity was manipulated by comparing the tracking of…
Descriptors: Identification, Word Recognition, Eye Movements, Air Transportation
Peer reviewed Peer reviewed
Direct linkDirect link
Cheng, Ying; Shao, Can – Educational and Psychological Measurement, 2022
Computer-based and web-based testing have become increasingly popular in recent years. Their popularity has dramatically expanded the availability of response time data. Compared to the conventional item response data that are often dichotomous or polytomous, response time has the advantage of being continuous and can be collected in an…
Descriptors: Reaction Time, Test Wiseness, Computer Assisted Testing, Simulation
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9