Refine
Has Fulltext
- yes (14)
Is part of the Bibliography
- yes (14) (remove)
Year of publication
Document Type
- Journal article (8)
- Doctoral Thesis (6)
Keywords
- evaluation (14) (remove)
Institute
- Institut für Psychologie (3)
- Klinik und Poliklinik für Anästhesiologie (ab 2004) (2)
- Institut für Geographie und Geologie (1)
- Institut für Informatik (1)
- Institut für Psychotherapie und Medizinische Psychologie (1)
- Institut für deutsche Philologie (1)
- Institut für diagnostische und interventionelle Radiologie (Institut für Röntgendiagnostik) (1)
- Klinik und Poliklinik für Nuklearmedizin (1)
- Universitätsbibliothek (1)
- Volkswirtschaftliches Institut (1)
When More Is Better – Consumption Priming Decreases Responders’ Rejections in the Ultimatum Game
(2017)
During the past decades, economic theories of rational choice have been exposed to outcomes that were severe challenges to their claim of universal validity. For example, traditional theories cannot account for refusals to cooperate if cooperation would result in higher payoffs. A prominent illustration are responders’ rejections of positive but unequal payoffs in the Ultimatum Game. To accommodate this anomaly in a rational framework one needs to assume both a preference for higher payoffs and a preference for equal payoffs. The current set of studies shows that the relative weight of these preference components depends on external conditions and that consumption priming may decrease responders’ rejections of unequal payoffs. Specifically, we demonstrate that increasing the accessibility of consumption-related information accentuates the preference for higher payoffs. Furthermore, consumption priming increased responders’ reaction times for unequal payoffs which suggests an increased conflict between both preference components. While these results may also be integrated into existing social preference models, we try to identify some basic psychological processes underlying economic decision making. Going beyond the Ultimatum Game, we propose that a distinction between comparative and deductive evaluations may provide a more general framework to account for various anomalies in behavioral economics.
Background:
Until now there has been a reported lack of systematic reports and scientific evaluations of rescue missions during terror attacks. This however is urgently required in order to improve the performance of emergency medical services and to be able to compare different missions with each other. Aim of the presented work was to report the systematic evaluation and the lessons learned from the response to a terror attack that happened in Wuerzburg, Germany in 2016.
Methods:
A team of 14 experts developed a template of quality indicators and operational characteristics, which allow for the description, assessment and comparison of civil emergency rescue missions during mass killing incidents. The entire systematic evaluation process consisted of three main steps. The first step was the systematic data collection according to the quality indicators and operational characteristics. Second was the systematic stratification and assessment of the data. The last step was the prioritisation of the identified weaknesses and the definition of the lessons learned.
Results:
Five important “lessons learned” have been defined. First of all, a comprehensive concept for rescue missions during terror attacks is essential. Furthermore, the establishment of a defined high priority communication infrastructure between the different dispatch centres (“red phone”) is vital. The goal is to secure the continuity of information between a few well-defined individuals. Thirdly, the organization of the incident scene needs to be commonly decided and communicated between police, medical services and fire services during the mission. A successful mission tactic requires continuous flux of reports to the on-site command post. Therefore, a predefined and common communication infrastructure for all operational forces is a crucial point. Finally, all strategies need to be extensively trained before the real life scenario hits.
Conclusion:
According to a systematic evaluation, we defined the lessons learned from a terror attack in 2016. Further systematic reports and academic work surrounding life threatening rescue missions and mass killing incidents are needed in order to ultimately improve such mission outcomes. In the future, a close international collaboration might help to find the best database to report and evaluate major incidents but also mass killing events.
This thesis analyzes the 2001-2006 labor market reforms in Germany. The aim of this work is twofold. First, an overview of the most important reform measures and the intended effects is given. Second, two specific and very fundamental amendments, namely the merging of unemployment assistance and social benefits, as well as changes in the duration of unemployment insurance benefits, are analyzed in detail to evaluate their effects on individuals and the entire economy. Using a matching model with optimal search intensity and Semi-Markov methods, the effects of these two amendments on the duration of unemployment, optimal search intensity and unemployment are analyzed.
Do people evaluate an open-minded midwife less positively than a caring midwife? Both open-minded and caring are generally seen as positive attributes. However, consistency varies—the attribute caring is consistent with the midwife stereotype while open-minded is not. In general, both stimulus valence and consistency can influence evaluations. Six experiments investigated the respective influence of valence and consistency on evaluative judgments in the domain of stereotyping. In an impression formation paradigm, valence and consistency of stereotypic information about target persons were manipulated orthogonally and spontaneous evaluations of these target persons were measured. Valence reliably influenced evaluations. However, for strongly valenced stereotypes, no effect of consistency was observed. Parameters possibly preventing the occurrence of consistency effects were ruled out, specifically, valence of inconsistent attributes, processing priority of category information, and impression formation instructions. However, consistency had subtle effects on evaluative judgments if the information about a target person was not strongly valenced and experimental conditions were optimal. Concluding, in principle, both stereotype valence and consistency can play a role in evaluative judgments of stereotypic target persons. However, the more subtle influence of consistency does not seem to substantially influence evaluations of stereotyped target persons. Implications for fluency research and stereotype disconfirmation are discussed.
PURPOSE
The threat of national and international terrorism remains high. Preparation is the key requirement for the resilience of hospitals and out-of-hospital rescue forces. The scientific evidence for defining medical and tactical strategies often feeds on the analysis of real incidents and the lessons learned derived from them. This systematic review of the literature aims to identify and systematically report lessons learned from terrorist attacks since 2001.
METHODS
PubMed was used as a database using predefined search strategies and eligibility criteria. All countries that are part of the Organization for Economic Cooperation and Development (OECD) were included. The time frame was set between 2001 and 2018.
RESULTS
Finally 68 articles were included in the review. From these, 616 lessons learned were extracted and summarized into 15 categories. The data shows that despite the difference in attacks, countries, and casualties involved, many of the lessons learned are similar. We also found that the pattern of lessons learned is repeated continuously over the time period studied.
CONCLUSIONS
The lessons from terrorist attacks since 2001 follow a certain pattern and remained constant over time. Therefore, it seems to be more accurate to talk about lessons identified rather than lessons learned. To save as many victims as possible, protect rescue forces from harm, and to prepare hospitals at the best possible level it is important to implement the lessons identified in training and preparation.
Es wird eine Methode der California Digital Library (CDL) zur Zeitschriftenevaluation beschrieben. Diese vergleicht die Aspekte Nützlichkeit, Qualität und Kosteneffizienz der untersuchten Titel. Es folgt der Bericht über eine Anwendung der Methode auf die elektronischen Zeitschriften der Teilbibliothek (TB) Biologie (118 Titel) und der TB Chemie (88 Titel) der Universitätsbibliothek Würzburg für das Jahr 2012. Auf ausgewählte Ergebnisse wird näher eingegangen. Diese werden mit den Ergebnissen einer Bewertung nach Kosten pro Nutzung verglichen.
Performance of a regional climate model with interactive vegetation (REMO-iMOVE) over Central Asia
(2022)
The current study evaluates the regional climate model REMO (v2015) and its new version REMO-iMOVE, including interactive vegetation and plant functional types (PFTs), over two Central Asian domains for the period of 2000–2015 at two different horizontal resolutions (0.44° and 0.11°). Various statistical metrices along with mean bias patterns for precipitation, temperature, and leaf area index have been used for the model evaluation. A better representation of the spatial pattern of precipitation is found at 0.11° resolution over most of Central Asia. Regarding the mean temperature, both model versions show a high level of agreement with the validation data, especially at the higher resolution. This also reduces the biases in maximum and minimum temperature. Generally, REMO-iMOVE shows an improvement regarding the temperature bias but produces a larger precipitation bias compared to the REMO conventional version with interannually static vegetation. Since the coupled version is capable to simulate the mean climate of Central Asia like its parent version, both can be used for impact studies and future projections. However, regarding the new vegetation scheme and its spatiotemporal representation exemplified by the leaf area index, REMO-iMOVE shows a clear advantage over REMO. This better simulation is caused by the implementation of more realistic and interactive vegetation and related atmospheric processes which consequently add value to the regional climate model.
Background
Fibromyalgia syndrome (FMS) is a complex chronic condition that makes high demands on patients’ self-management skills. Thus, patient education is considered an important component of multimodal therapy, although evidence regarding its effectiveness is scarce. The main objective of this study is to assess the effectiveness of an advanced self-management patient education program for patients with FMS as compared to usual care in the context of inpatient rehabilitation.
Methods/Design
We conducted a multicenter cluster randomized controlled trial in 3 rehabilitation clinics. Clusters are groups of patients with FMS consecutively recruited within one week after admission. Patients of the intervention group receive the advanced multidisciplinary self-management patient education program (considering new knowledge on FMS, with a focus on transfer into everyday life), whereas patients in the control group receive standard patient education programs including information on FMS and coping with pain. A total of 566 patients are assessed at admission, at discharge and after 6 and 12 months, using patient reported questionnaires. Primary outcomes are patients’ disease- and treatment-specific knowledge at discharge and self-management skills after 6 months. Secondary outcomes include satisfaction, attitudes and coping competences, health-promoting behavior, psychological distress, health impairment and participation. Treatment effects between groups are evaluated using multilevel regression analysis adjusting for baseline values.
Discussion
The study evaluates the effectiveness of a self-management patient education program for patients with FMS in the context of inpatient rehabilitation in a cluster randomized trial. Study results will show whether self-management patient education is beneficial for this group of patients.
Virtualization allows the creation of virtual instances of physical devices, such as network and processing units. In a virtualized system, governed by a hypervisor, resources are shared among virtual machines (VMs). Virtualization has been receiving increasing interest as away to reduce costs through server consolidation and to enhance the flexibility of physical infrastructures. Although virtualization provides many benefits, it introduces new security challenges; that is, the introduction of a hypervisor introduces threats since hypervisors expose new attack surfaces.
Intrusion detection is a common cyber security mechanism whose task is to detect malicious activities in host and/or network environments. This enables timely reaction in order to stop an on-going attack, or to mitigate the impact of a security breach. The wide adoption of virtualization has resulted in the increasingly common practice of deploying conventional intrusion detection systems (IDSs), for example, hardware IDS appliances or common software-based IDSs, in designated VMs as virtual network functions (VNFs). In addition, the research and industrial communities have developed IDSs specifically designed to operate in virtualized environments (i.e., hypervisorbased IDSs), with components both inside the hypervisor and in a designated VM. The latter are becoming increasingly common with the growing proliferation of virtualized data centers and the adoption of the cloud computing paradigm, for which virtualization is as a key enabling technology.
To minimize the risk of security breaches, methods and techniques for evaluating IDSs in an accurate manner are essential. For instance, one may compare different IDSs in terms of their attack detection accuracy in order to identify and deploy the IDS that operates optimally in a given environment, thereby reducing the risks of a security breach. However, methods and techniques for realistic and accurate evaluation of the attack detection accuracy of IDSs in virtualized environments (i.e., IDSs deployed as VNFs or hypervisor-based IDSs) are lacking. That is, workloads that exercise the sensors of an evaluated IDS and contain attacks targeting hypervisors are needed. Attacks targeting hypervisors are of high severity since they may result in, for example, altering the hypervisors’s memory and thus enabling the execution of malicious code with hypervisor privileges. In addition, there are no metrics and measurement methodologies
for accurately quantifying the attack detection accuracy of IDSs in virtualized environments with elastic resource provisioning (i.e., on-demand allocation or deallocation of virtualized hardware resources to VMs). Modern hypervisors allow for hotplugging virtual CPUs and memory on the designated VM where the intrusion detection engine of hypervisor-based IDSs, as well as of IDSs deployed as VNFs, typically operates. Resource hotplugging may have a significant impact on the attack detection accuracy of an evaluated IDS, which is not taken into account by existing metrics for quantifying IDS attack detection accuracy. This may lead to inaccurate measurements, which, in turn, may result in the deployment of misconfigured or ill-performing IDSs, increasing
the risk of security breaches.
This thesis presents contributions that span the standard components of any system
evaluation scenario: workloads, metrics, and measurement methodologies. The scientific contributions of this thesis are:
A comprehensive systematization of the common practices and the state-of-theart on IDS evaluation. This includes: (i) a definition of an IDS evaluation design space allowing to put existing practical and theoretical work into a common context in a systematic manner; (ii) an overview of common practices in IDS evaluation reviewing evaluation approaches and methods related to each part of the design space; (iii) and a set of case studies demonstrating how different IDS evaluation approaches are applied in practice. Given the significant amount of existing practical and theoretical work related to IDS evaluation, the presented systematization is beneficial for improving the general understanding of the topic by providing an overview of the current state of the field. In addition, it is beneficial for identifying and contrasting advantages and disadvantages of different IDS evaluation methods and practices, while also helping to identify specific requirements and best practices for evaluating current and future IDSs.
An in-depth analysis of common vulnerabilities of modern hypervisors as well as a set of attack models capturing the activities of attackers triggering these vulnerabilities. The analysis includes 35 representative vulnerabilities of hypercall handlers (i.e., hypercall vulnerabilities). Hypercalls are software traps from a kernel of a VM to the hypervisor. The hypercall interface of hypervisors, among device drivers and VM exit events, is one of the attack surfaces that hypervisors expose. Triggering a hypercall vulnerability may lead to a crash of the hypervisor or to altering the hypervisor’s memory. We analyze the origins
of the considered hypercall vulnerabilities, demonstrate and analyze possible attacks that trigger them (i.e., hypercall attacks), develop hypercall attack models(i.e., systematized activities of attackers targeting the hypercall interface), and discuss future research directions focusing on approaches for securing hypercall interfaces.
A novel approach for evaluating IDSs enabling the generation of workloads that contain attacks targeting hypervisors, that is, hypercall attacks. We propose an approach for evaluating IDSs using attack injection (i.e., controlled execution of attacks during regular operation of the environment where an IDS under test is deployed). The injection of attacks is performed based on attack models that capture realistic attack scenarios. We use the hypercall attack models developed as part of this thesis for injecting hypercall attacks.
A novel metric and measurement methodology for quantifying the attack detection accuracy of IDSs in virtualized environments that feature elastic resource provisioning. We demonstrate how the elasticity of resource allocations in such environments may impact the IDS attack detection accuracy and show that using existing metrics in such environments may lead to practically challenging and inaccurate measurements. We also demonstrate the practical use of the metric we propose through a set of case studies, where we evaluate common conventional IDSs deployed as VNFs.
In summary, this thesis presents the first systematization of the state-of-the-art on IDS evaluation, considering workloads, metrics and measurement methodologies as integral parts of every IDS evaluation approach. In addition, we are the first to examine the hypercall attack surface of hypervisors in detail and to propose an approach using attack injection for evaluating IDSs in virtualized environments. Finally, this thesis presents the first metric and measurement methodology for quantifying the attack detection accuracy of IDSs in virtualized environments that feature elastic resource provisioning.
From a technical perspective, as part of the proposed approach for evaluating IDSsthis thesis presents hInjector, a tool for injecting hypercall attacks. We designed hInjector to enable the rigorous, representative, and practically feasible evaluation of IDSs using attack injection. We demonstrate the application and practical usefulness of hInjector, as well as of the proposed approach, by evaluating a representative hypervisor-based IDS designed to detect hypercall attacks. While we focus on evaluating the capabilities of IDSs to detect hypercall attacks, the proposed IDS evaluation approach can be generalized and applied in a broader context. For example, it may be directly used to also evaluate security mechanisms of hypervisors, such as hypercall access control (AC) mechanisms. It may also be applied to evaluate the capabilities
of IDSs to detect attacks involving operations that are functionally similar to hypercalls,
for example, the input/output control (ioctl) calls that the Kernel-based Virtual Machine (KVM) hypervisor supports. For IDSs in virtualized environments featuring elastic resource provisioning, our approach for injecting hypercall attacks can be applied in combination with the attack detection accuracy metric and measurement methodology we propose. Our approach for injecting hypercall attacks, and our metric and measurement methodology, can also be applied independently beyond the scenarios considered in this thesis. The wide spectrum of security mechanisms in virtualized environments whose evaluation can directly benefit from the contributions of this thesis (e.g., hypervisor-based IDSs, IDSs deployed as VNFs, and AC mechanisms) reflects the practical implication of the thesis.
Die vorliegende Arbeit setzt sich zum Ziel, das Problem der sprachlichen Wertung in zeitgenössischen journalistischen Rezensionen literarischer Neuerscheinungen zu untersuchen. Im Mittelpunkt des Interesses stehen die Fragen: Nach welchen Wertkriterien wird Literatur bewertet und mit welchem Vokabular bzw. welchen Wörtern und Metaphern? Dabei soll innerhalb der Wertkriterien nicht nochmals nach Bewertungsaspekten der bewerteten Literatur, wie z.B. Aufbau, Inhalt, Darstellung, unterschieden werden. Das Textkorpus setzt sich zusammen aus 263 Rezensionen der FAZ, der SZ und der ZEIT aus dem Jahr 1988, einschließlich der Literaturbeilagen im Frühjahr, Herbst und Winter. 101 Rezensionen stammen aus der FAZ, 98 aus der SZ und 64 aus der ZEIT, darunter 95 Rezensionen zu Romanen, 117 zu Erzählungen, Kurzprosa, Novellen, Briefen, 30 zu Lyrikbänden, 14 zu Aphorismen und Fragmenten, drei zu Lyrik- bzw. Prosabänden mit Bildern, drei zu Parodien und Sprachspielereien und eine zu einem Drama.