Showing 1 - 10 of 1,523
This paper proposes a method for empirically mapping psychological personality traits to economic preferences. Careful modelling of random components of decision making is crucial to establishing the long supposed but empirically elusive link between economic and psychological systems for...
Persistent link: https://www.econbiz.de/10012832591
Both economists and psychologists are interested in understanding decision making under uncertainty. Yet, they rely on different concepts to analyse human behaviour: Economists use economic preference parameters rooted in utility theory, while psychologists use personality traits to describe...
Persistent link: https://www.econbiz.de/10012851581
The mental models method is a mechanism for risk communication that was pioneered in environmental risk communication, and is being used to improve medical risk communication. This paper proposes that mental models as a method of risk communication can be used to improve communication to end...
Persistent link: https://www.econbiz.de/10014056604
Persistent link: https://www.econbiz.de/10013163635
I use a model of human causal learning, Causal Support (Tenenbaum & Griffiths, 2001), to derive a meaningful measure of Cognitive Distance – the degree to which two people differ in their opinions about the workings of the world. Next, I amend this measure to quantify the notion of Cognitive...
Persistent link: https://www.econbiz.de/10014143284
Persistent link: https://www.econbiz.de/10014316062
Hackers account for enormous costs associated with computer intrusion in a world increasingly reliant on computer and Internet-based technologies. Within the hacker community, there are “good” hackers called white hat hackers and “bad” hackers called black hat hackers. Essentially, one...
Persistent link: https://www.econbiz.de/10014153650
Persistent link: https://www.econbiz.de/10013547743
Persistent link: https://www.econbiz.de/10015338456
The extraction of cyber threat intelligence (CTI) from open sources is a rapidly expanding defensive strategy that enhances the resilience of both Information Technology (IT) and Operational Technology (OT) environments against large-scale cyber-attacks. However, for most organizations,...
Persistent link: https://www.econbiz.de/10015420144