What are the behaviors (and limitations) associated with protecting our egos through dissonance reduction?

With respect to the types of behaviors potentially induced by a state of cognitive dissonance, Aaronson (Chapter 3 Self-Justification) points out the following: People are capable of rational, adaptive behavior, as well as dissonance-reducing behavior. What are the behaviors (and limitations) associated with protecting our egos through dissonance reduction? Why might it be very important … Read more

Week 6: Protecting Information Using Cryptography and Encryption

Week 6: Protecting Information Using Cryptography and Encryption The use of encryption to protect systems and information is wide-spread within the IT industry. In NIST SP 800-53, security controls address the implementation of cryptographic protection mechanisms including the generation and management of cryptographic keys, the use of encryption to protect information at rest and in … Read more

View Human Subjects Research Training: ‘Protecting Human Subjects’ PDF titled PHRP. Reflect on History, Codes and Regulations, Respect for Persons, Beneficence

View Human Subjects Research Training: “Protecting Human Subjects” PDF titled PHRP. Reflect on History, Codes and Regulations, Respect for Persons, Beneficence and Justice. Explore the Research Clinic. Think of a vulnerable population as you complete the required components of the assignment. Be able to discuss and differentiate between legal and ethical considerations as it relates … Read more