scholarly journals Adapting psychophysiological data collection for COVID‐19: The “Virtual Assessment” model

Author(s):  
Alexandra R. Tabachnick ◽  
Tabitha Sellers ◽  
Emma Margolis ◽  
Madelyn Labella ◽  
Dylan Neff ◽  
...  
2016 ◽  
Vol 224 (4) ◽  
pp. 294-296 ◽  
Author(s):  
Patrick Charland ◽  
Pierre-Majorique Léger ◽  
Julien Mercier ◽  
Yannick Skelling ◽  
Hugo G. Lapierre

Abstract. Novel data collection methods and analysis algorithms developed in the field of neuroergonomics have opened new possibilities for research in education. Psychophysiological data can characterize the cognitive and emotional dimensions of engagement. This paper aims to describe the application of this research methodology to synchronously measure emotional and cognitive engagement during learning tasks.


2021 ◽  
Vol 3 (2) ◽  
pp. 101-106
Author(s):  
Muhammad Kamal Sani Firdaus

Kemungkinan adanya ancaman dan risiko TI (Teknologi Informasi) yang muncul seiring dengan penerapan IT Governance dapat menganggu proses bisnis yang berjalan. Hal ini penting bagi suatu perusahaan untuk menerapkan manajemen risiko TI. Dalam penerapannya, PLN P2B  didukung oleh Divisi Teknologi Informasi dan Telekomunikasi sebagai penyedia layanan TI. Diketahui permasalahan yang sedang dialami PLN P2B adalah insiden kehilangan data yang diakibatkan adanya kegagalan dalam migrasi data ketika PLN P2B mengupgrade server dari 3-node clusters menjadi 6-node clusters. Oleh karena itu, diperlukan adanya evaluasi terhadap manajemen risiko TI sesuai dengan standar yang ada. Penelitian ini bertujuan untuk mengetahui tingkat kapabilitas manajemen risiko TI menggunakan metodologi Process Assessment Model (PAM) COBIT 5 yang terdiri dari tahapan Initiation, Planning the Assesment, Briefing, Data Collection, Data Validation, Process Attribute Level dan Reporting the Result. Hasil dari penelitian ini menunjukan tingkat pengelolaan risiko dan pengoptimalan risiko saat ini berada pada level 3 (Established Process) dan berdasarkan hasil penilaian risiko terdapat 6 risk issue yang tingkat risikonya di atas batas risk appetite. Sehingga PLN P2B direkomendasikan untuk menerapkan dan mengemb    angkan DRP (Disaster Recovery Plan) berdasarkan kerangka kerja yang didesain untuk mengurangi dampak terhadap fungsi dan proses bisnis utamanya. Selain itu PLN P2B direkomendasikan menentukan dan mengimplementasikan langkah pengamanan fisik sesuai dengan persyaratan. Salah satunya dengan menempatkan database server di tempat yang aman. Dengan demikian diharapkan hasil penelitian ini dapat dijadikan bahan pertimbangan PLN P2B dalam melakukan perbaikan tata kelola TI agar dapat berjalan lebih optimal.


Author(s):  
Aurélie Vasseur ◽  
Pierre-Majorique Léger ◽  
François Courtemanche ◽  
Elise Labonte-Lemoyne ◽  
Vanessa Georges ◽  
...  

Pathogens ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 62 ◽  
Author(s):  
Ihab Habib ◽  
Ali Harb ◽  
Ingrid Hansson ◽  
Ivar Vågsholm ◽  
Walaa Osama ◽  
...  

In many low- and middle-income countries, data limitations are a major challenge facing the development of food safety risk assessment. In the present study, a questionnaire data collection tool was designed with an emphasis on gathering specific data points required by a risk modeller for simulating a scenario of Campylobacter cross-contamination during handling of raw chicken meat at the consumer phase. The tool was tested in practice to support its value and applicability in settings where data limitations are a challenge. The study subjects were 450 consumers in two Middle Eastern settings: Alexandria in Egypt (n = 200) and Thi-Qar in Iraq (n = 250). The majority (78.5%) of respondents in Egypt opted for wet markets/live bird shops as their preferred source of chicken meat. In contrast, 59.6% of Iraqi respondents preferred to buy chicken meat from supermarkets. Added to that, 73.0% of consumers in Egypt and 56.8% of consumers in Iraq viewed the quality of frozen chicken as “inferior” to that of chicken from wet markets. Almost all respondents in both Egypt and Iraq shared the practice of washing chicken in water before cooking. The percentage of consumers who ‘very frequently’ or ‘frequently’ prepare chicken prior to making the salad was 32.5% and 55.2% in Egypt and Iraq, respectively. A sizeable proportion of respondents in Iraq (40.8%) reported that they did not consider washing their hands with soapy water after touching raw chicken and preparing a salad in their home kitchen. Finally, 28.8% and 6.5% of respondents in Iraq and Egypt, respectively, indicated that they would not consider using a separate cutting board to avoid cross-contamination between raw chicken and salad. The data collection tool used in this study was designed in the first instance to match a conceptualised risk assessment framework, and that enabled the simultaneous collection of data points on consumption frequency, serving sizes, purchasing patterns, retail chain diversity and food handling practices. Results from such study design could be used for future development of a quantitative risk assessment model and to support food safety promotion efforts for domestic consumers in two of the most populated Middle Eastern countries.


2021 ◽  
Author(s):  
Andrej Veľas ◽  
Martin Halaj ◽  
Ladislav Hofreiter ◽  
Katarína Kampová ◽  
Zuzana Zvaková ◽  
...  

AbstractSecurity and safety culture is an increasingly important term in assessing the security and safety of organizations. It is an internal security and safety factor of an organization that can directly influence its overall security and safety. In many cases, however, organizations do not know, nor do they have a way of assessing the level of their security and safety culture. It is therefore necessary to know the content, elements, and sectors in which it can be identified in order to gain a deeper knowledge of security and safety culture in more detail and be able to examine it. Firstly, we focused on creating a model for evaluating the safety and safety culture and its application in selected organizations. Secondly, we devoted to the description and design of an organization’s security and safety culture assessment model. The proposed model is based on the identification of subsectors and indicators of security and safety culture that will gain their value by using information obtained from combining the four proposed methods. Accordingly, six security and safety culture sectors were defined for the purposes of security and safety culture assessment in selected organizations. These were compared to each other to determine their mutual weight. Finally, using these research methods, security and safety culture indicators were also identified and included in the defined security and safety culture sectors. The research needed to design a security and safety culture assessment model was realized in six selected organizations, which wanted to participate in the research. These were divided according to the size of the organization into two small, two medium, and two large organizations. Crucial element in our research was data collection conducted by means of controlled interviews and questionnaire surveys in these organizations. Based on this survey, indicators of security and safety culture could be identified. As a result of this, security and safety culture values are determined for all analyzed organizations. The conclusions will point up the possible way of evaluating security and safety culture in organizations and it also contains a specific example of their usage in the practice. Thus, by using the resulting values, it is possible to decide the further direction for the organizations, focusing on the sectors of the security and safety culture, which yielded unsatisfactory results.


Author(s):  
S.W. Hui ◽  
D.F. Parsons

The development of the hydration stages for electron microscopes has opened up the application of electron diffraction in the study of biological membranes. Membrane specimen can now be observed without the artifacts introduced during drying, fixation and staining. The advantages of the electron diffraction technique, such as the abilities to observe small areas and thin specimens, to image and to screen impurities, to vary the camera length, and to reduce data collection time are fully utilized. Here we report our pioneering work in this area.


Author(s):  
Weiping Liu ◽  
Jennifer Fung ◽  
W.J. de Ruijter ◽  
Hans Chen ◽  
John W. Sedat ◽  
...  

Electron tomography is a technique where many projections of an object are collected from the transmission electron microscope (TEM), and are then used to reconstruct the object in its entirety, allowing internal structure to be viewed. As vital as is the 3-D structural information and with no other 3-D imaging technique to compete in its resolution range, electron tomography of amorphous structures has been exercised only sporadically over the last ten years. Its general lack of popularity can be attributed to the tediousness of the entire process starting from the data collection, image processing for reconstruction, and extending to the 3-D image analysis. We have been investing effort to automate all aspects of electron tomography. Our systems of data collection and tomographic image processing will be briefly described.To date, we have developed a second generation automated data collection system based on an SGI workstation (Fig. 1) (The previous version used a micro VAX). The computer takes full control of the microscope operations with its graphical menu driven environment. This is made possible by the direct digital recording of images using the CCD camera.


1997 ◽  
Vol 6 (4) ◽  
pp. 34-47 ◽  
Author(s):  
Steven H. Long ◽  
Lesley B. Olswang ◽  
Julianne Brian ◽  
Philip S. Dale

This study investigated whether young children with specific expressive language impairment (SELI) learn to combine words according to general positional rules or specific, grammatic relation rules. The language of 20 children with SELI (4 females, 16 males, mean age of 33 months, mean MLU of 1.34) was sampled weekly for 9 weeks. Sixteen of these children also received treatment for two-word combinations (agent+action or possessor+possession). Two different metrics were used to determine the productivity of combinatorial utterances. One metric assessed productivity based on positional consistency alone; another assessed productivity based on positional and semantic consistency. Data were analyzed session-by-session as well as cumulatively. The results suggest that these children learned to combine words according to grammatic relation rules. Results of the session-by-session analysis were less informative than those of the cumulative analysis. For children with SELI ready to make the transition to multiword utterances, these findings support a cumulative method of data collection and a treatment approach that targets specific grammatic relation rules rather than general word combinations.


2019 ◽  
Vol 4 (2) ◽  
pp. 356-362
Author(s):  
Jennifer W. Means ◽  
Casey McCaffrey

Purpose The use of real-time recording technology for clinical instruction allows student clinicians to more easily collect data, self-reflect, and move toward independence as supervisors continue to provide continuation of supportive methods. This article discusses how the use of high-definition real-time recording, Bluetooth technology, and embedded annotation may enhance the supervisory process. It also reports results of graduate students' perception of the benefits and satisfaction with the types of technology used. Method Survey data were collected from graduate students about their use and perceived benefits of advanced technology to support supervision during their 1st clinical experience. Results Survey results indicate that students found the use of their video recordings useful for self-evaluation, data collection, and therapy preparation. The students also perceived an increase in self-confidence through the use of the Bluetooth headsets as their supervisors could provide guidance and encouragement without interrupting the flow of their therapy sessions by entering the room to redirect them. Conclusions The use of video recording technology can provide opportunities for students to review: videos of prospective clients they will be treating, their treatment videos for self-assessment purposes, and for additional data collection. Bluetooth technology provides immediate communication between the clinical educator and the student. Students reported that the result of that communication can improve their self-confidence, perceived performance, and subsequent shift toward independence.


Sign in / Sign up

Export Citation Format

Share Document