1-10 of 16 results
-
The Rise and Fall of the Veterans' Airlines
PI Alan Bender
This is an investigation into a practically unknown chapter in U.S. airline history: the advent of a brand new breed of airlines in the aftermath of World War II, mom-and-pop discounters immensely popular with the general public but very threatening to the established airlines and to the federal regulatory system.
Postwar America was a land full of opportunity. Economically and socially, in both industry and education, it was the dawn of a new era. But such was not the case in the U.S. airline industry. New technology meant faster, bigger, safer, more comfortable aircraft, yet traveling by air remained unaffordable to the vast majority of Americans. This is the story of opportunity lost due to rampant government protectionism and powerful vested interests. Utilizing historical materials from the National Air and Space Museum, National Archives, Library of Congress, four presidential libraries, and various oral history collections, a book is being prepared and written that documents the history of these long forgotten - yet historically very significant - airline companies that truly pioneered affordable airline transportation in America.Categories: Faculty-Staff
-
The Development and Validation of the Game User Experience Satisfaction Scale (GUESS)
PI Barbara Chaparro
PI Joseph Keebler
CO-I Mikki Phan, User Experience Researcher, Google
The purpose of this research is to develop and psychometrically validate a new instrument that comprehensively measures video game satisfaction based on key factors. The video game industry often conducts playtesting sessions in order to provide insight into players’ attitudes and preferences. However, quality feedback is difficult to obtain from playtesting sessions without a quality gaming assessment tool.
A new instrument measuring video game satisfaction, called the Game User Experience Satisfaction Scale (GUESS), with nine subscales emerged. These scales included Usability/Playability, Narratives, Play Engrossment, Enjoyment, Creative Freedom, Audio Aesthetics, Personal Gratification, Social Connectivity, and Visual Aesthetics.
The GUESS was developed and validated based on the assessments of over 450 unique video game titles across many popular genres. Thus, it can be applied across many types of video games in the industry both as a way to assess what aspects of a game contribute to user satisfaction and as a tool to aid in debriefing users on their gaming experience. Based on current best practices of scale development and validation, the project used a mixed-method design that consisted of item pool generation, expert review, questionnaire pilot study, exploratory factor analysis (N = 629), and confirmatory factor analysis (N = 729).
Results from this multistage process demonstrate that the GUESS can be administered to video game players with various gaming experience (e.g., newbie/novice, hardcore/expert) playing a variety of game genres. Ratings of all the items per factor can be averaged to obtain a score of each subscale and average scores for each subscale can be added together in order to obtain a composite score of video game satisfaction. This can aid game designers in determining aspects of a game to improve as well as emphasize to target gaming markets.
Since its development and validation, the GUESS continues to be used to understand video game satisfaction across platforms and user groups by both the GEARS and User Experience Research labs at ERAU as well as gaming labs from other universities.
This was dissertation research by Dr. Mikki Phan supervised by Dr. Barbara Chaparro and Dr. Joseph Keebler. Mikki is now a User Experience Researcher at Google in Mountain View, CA. For more information, see Phan, M. H., Keebler, J. R., & Chaparro, B. S. (2016). The Development and Validation of the Game User Experience Satisfaction Scale (GUESS). Human Factors, 58(8), 1217-1247 and http://www.wired.co.uk/article/science-can-now-determine-how-good-any-video-game-is . Contact Barbara.Chaparro@erau.edu to obtain the GUESS instrument.
Mikki Phan, PhD
Categories: Graduate
-
A Review of Allelopathy of Schinus terebinthifolius: Using published data to inform future research
PI Emily Faulconer
CO-I Zachary Dixon
The Brazilian pepper plant (Schinus terebinthifolius) has been identified as an invasive species in multiple geographic regions around the globe. One characteristic that contributes to its invasiveness is allelopathy. This review provides a comprehensive look at the current research on phytotoxicity and cytotoxicity and presents the characterizations of the terpenoid and phenolic allelochemicals provided in previous works. Future areas of research are identified as a result of this review.
The Brazilian pepper plant (Schinus terebinthifolius) is an invasive species that displays multiple characteristics that allow for habitat invasion in many regions globally, including allelopathy. This review analyzes the existing literature that characterizes the Brazilian pepper’s extract and its allelopathic effects, established through bioassay and pot cultures. This review reveals that studies characterizing the extract should include specific information to include specific geographic region, plant part used (leaves versus fruit), and flowering state of the plant when collected. While this review does firmly establish the broad allelopathic effects of the plant, it reveals the need for pot culture and bioassay studies to perform a characterization of the extract in order to draw conclusions regarding the allelopathic effect and the extract composition. We also suggest field studies to firmly establish the broad allelopathic influence of the plant as well as to investigate persistence of Brazilian pepper’s allelopathic chemicals in their surrounding environment.
References:
Alves, L.A., Freires, I., de Souza, T.M.P.A., & de Castro, R.D. (2012). In vitro activity of schinus terebinthifolius (brazilian pepper tree) on candida tropicalis growth and cell wall formation. Aca Odontologica Latinoamercana 25, 287-292.
Australian Government Department of Environment and Energy. (2011). Schinus terebinthifolius. Retrieved from Australian Government website.
Bargeron, C.T., & Moorhead, D.J. (2017). EDDMapS - Early Detection & Distribution Mapping System. University of Georgia - Center for Invasive Species and Ecosystem Health .
de Assis, C.P.O., Gondim Jr., M.G.C., de Siqueira, H.A.A., & da Camara, C.A.G. (2011). Toxicity of essential oils from plants towards tyrophagus putrescentiae (schrank) and suidasia pontifica oudemans (acari: Astimgata). Journal of Stored Products Research 47, 311-315. https://doi.org/10.1016/j.jspr.2011.04.005
El-Massry, K.F., El-Ghorab, A.H., Shaaban, H.A., & Shibamoto, T. (2009). Chemical compositions and antioxidant/antimicrobial activities of various samples prepared from schinus terebinthifolius leaves cultivated in Egypt. Journal of Agricultural Food and Chemistry 57, 5265-5270. https://doi.org/10.1021/jf900638c
Gomes, F.S., Procopio, T.F., Napoleao, T.H., Coelho, L.C.B.B., & Paiva, P.M.G. (2012). Antimicrobial lectin from schinus terebinthifolius leaf. Journal of Applied Microbiology 114, 672-679. https://doi.org/10.1111/jam.12086
Kweka, E.J., Nyindo, M., Mosha, F., & Silva, A.G. (2011). Insecticidal activity of the essential oil from fruits and seeds of schinus terebinthifolia raddi against African malaria vectors. Parasite Vector 4,129. https://doi.org/10.1186/1756-3305-4-129
Silva, A.G., Almeida, D.L., Ronchi, S.N., Bento, A.C., Scherer, R., Ramos, A.C., & Cruz, Z.M.A. (2010). The essential oil of brazilian pepper, schinus terebinthifolia Raddi in larval control of stegomyia aegypti (linnaeus, 1762). Parasite Vector 3, 79. https://doi.org/10.1186/1756-3305-3-79
Categories: Faculty-Staff
-
Identifying Cost-Effective Security Barrier Technologies for K-12 Schools: An Interdisciplinary Evaluation
PI Thomas Foley
CO-I Reginald Parker
CO-I Michele Gazica
CO-I Brooke Shannon
CO-I Erin Bowen
CO-I Muna Slewa
CO-I Michael Brady
CO-I Richard Rodriguez
CO-I Perry Feder
This study proposes to test and collect data on the effectiveness of commonly used physical security systems in delaying intruders. The purpose of this study is to support the design of better physical security systems for schools. The study will also gather data on parent and teacher perceptions of the quality of security in schools.
We are all going to be okay, there are bad guys out there now, and now we have to wait for the good guys
~Kaitlin Roig, First Grade Teacher, Sandy Hook Elementary School[1]
Statement of the Problem
The tragic mass-murder at Sandy Hook Elementary School caused a massive increase in school security spending across the United States.[2] An unfortunate by-product of increased spending on security in schools has been an increase in poorly thought-out, and sometimes ridiculous,[3] physical security products being marketed to schools and school districts looking to improve security.[4] Too often school officials base security buying decisions on fear rather than sound security risk management principles and divert funds that could otherwise be spent on students.[5] School administrators, who lack knowledge of physical security design,[6] often rely on unqualified “security experts” or security product salespeople for guidance on which security products to use in their schools.[7] Previous studies of school security technologies have identified available school security products and ascertained school officials’ views of which technologies they need, but none have identified the most cost-effective and practical security technologies. [8] If school officials know the best security technologies to fix security vulnerabilities in their schools, they will be more receptive to adopting those security measures and earmarking funds for their purchase. They will also be less likely to make poor buying decisions based on emotion.[9]
In addition, there is a substantial lack of scholarly research into school security technologies that included experienced security practitioners on the research team. This research proposal will be unique and far more applicable to the current public school environment because it will have three security practitioners in the research team, working alongside behavioral scientists and engineers. This scientist-practitioner approach to school safety is the best way to comprehensively and efficiently address these costly and potentially high-risk scenarios.
After identifying the best technologies for each type of school, the research team will create a guidebook that educators, with little to no security knowledge, can reference before buying security products. This research will be brand neutral and will make no specific manufacturer recommendations, rather it will evaluate the best technologies for improving school security at the lowest cost.
Review of Relevant Literature
After the mass shooting at Sandy Elementary School, the State of Connecticut created two commissions to examine ways to improve school security. In June 2014, the School Safety Infrastructure Council issued its report, which recommends schools use an emergency response time analysis to guide physical security design in schools.[10] In March 2015, the Sandy Hook Advisory Commission issued its final report supporting the recommendations of the School Safety Infrastructure Council.[11] In April 2015, the Rand Corporation surveyed school safety experts and discovered:
…a key distinction in thinking about safety is police response times—roughly under five minutes (i.e., urban districts) and over five minutes (i.e., suburban/rural districts)—since response times dictate how self-sufficient schools need to be in response to crisis situations such as cases of active shooters.
Combining penetration time analysis with emergency response time analysis is a fundamental principle of physical security design—delaying an attacker long enough for a response force to arrive and stop the attack.[12] Although both reports recommend using an emergency response time analysis to guide school physical security design, neither report gives a practical model for performing this analysis nor offers delay time data for physical security barriers. Without knowing how long various security devices will delay an intruder, there is no easy way for school administrators to use emergency response time analysis data to pick the best products. Schools with long emergency response times need more robust physical security measures than schools with much shorter response times; and the present research proposes to address this issue.
In A Comprehensive Report on School Safety Technology, researchers from Johns Hopkins University cataloged available physical security products for schools. Unfortunately, it did not show which products are the most feasible, affordable, and effective for K-12 schools throughout the United States. Our research team believes that a key problem with the Hopkins report is the lack of security practitioners on the research team to help filter-out security technologies that are inappropriate, impractical, or infeasible. For example, the Hopkins report discussed pneumatic vehicle barriers, which are an effective solution to protect high-risk terror targets from suicide vehicle attacks, but are expensive and unnecessary for schools.[13] The Hopkins report also discussed bullet resistant doors and door coverings, citing the death of a professor at Virginia Tech as an example of someone being shot and killed through a door.[14] We think this misses the key take-away of that incident. The professor was blocking the door with his body because he could not lock the classroom door, which is the primary reason he was shot.[15] In another classroom, students laid on the floor and blocked the door with their feet, the shooter fired several rounds through the door but no one was injured and the shooter never entered the room.[16] This report also addressed lock and window technologies, but it did not assess penetration delay. School safety research that takes into account both the science of security as well as the practical, day-to-day cost-benefit considerations of real schools, such as we propose, is essential and not yet conducted.
In 1978, Sandia National Labs published a report titled, Barrier Technology Handbook, with penetration time test results against various barrier technologies used in nuclear facilities as guidance for physical security managers.[17] The Nuclear Regulatory Commission shared this report with all nuclear reactor operators as a reference to the latest available security technologies.[18] Later, in 1999, Sandia published another report, The Appropriate and Effective Use of Security Technologies in U.S. Schools: A Guide for Schools and Law Enforcement Agencies, which provided information on various security technologies and the suitable use of those technologies to counter specific security threats. The guide included information on the limits of each technology. This report mostly focused on video surveillance and metal detection technologies. It also briefly discussed access control approaches and duress alarms, but did not address doors, windows, or locks. Embry-Riddle Aeronautical University – Prescott is proposing research that will result in similar handbooks for K-12 schools but focusing on emergency response and penetration times in the school setting, taking into account cost considerations and emergency response times in real-world security technology application. Currently, school administrators have no guidance on which technologies are most cost-effective and practical for use in schools. Identifying Cost-Effective Security Barrier Technologies for K-12 Schools: An Interdisciplinary Evaluation will fill this void using a team of security practitioners, mechanical engineers, and industrial psychologists to identify the most feasible, cost-effective, and practical security technologies to delay intruders in K-12 schools. In addition, we have not found any scholarly research into school security technologies that included experienced security practitioners in the research team. Having three security practitioners on the research team will make this study unique.
Another important aspect of our research is understanding various stakeholders’ perceptions of school safety, especially in regards to various technology. Many surveys have assessed actual school violence or school safety. In 2015, The National Center for Education Statistics identified Twenty-three indicators of school crime and safety.[19] Their only measure of students’ perceptions of safety was asking if students were afraid of being attacked at school. We feel that this measure can be expanded to capture more about their fear, including type of attack and responder times. In another study, researchers looked at how the intersection of school violence and school climate affect student, staff, and parental perceptions of safety.[20] Interestingly, this study showed that perceptions of safety were likely more related to school climate than actual violence. Several studies cover stakeholders’ perceptions of Safety Resource Officers (SROs), and findings suggest that SROs fail to make people feel safer.[21] In another study, researchers found that metal detectors, the only technology measured, did not affect risk perception but did lower fear of serious violence.[22] Our study will cover a broader range of perception variables and focus specifically on the types of technologies that not only increase actual safety but increase perceptions of safety.
Another unique aspect of this research study is that researchers will not look at K-12 schools as a uniform group. The research will examine the appropriateness of security technologies based on the age ranges of students served by the school. In most school districts, schools are organized by the ages and developmental levels of students. Most school districts organize schools into elementary (K-6), junior high (7-9), and high schools (10-12), or elementary (k-5), middle schools (6-9), and high schools (10-12). Some early childhood education centers provide preschool through second grade education.[23]
The students in each type of school differ in intellectual development, how they are taught, student behavior, and student dependence on adults. Because younger children cannot communicate “stranger danger”[24], schools with younger children face different security challenges than schools with older students. Jean Piaget, a pioneer of childhood development, developed a four-stage theory to describe cognitive growth through the lifespan: (1) sensorimotor (ages 0 to 2); (2) preoperations (ages 2 to 7); (3) concrete operations (ages 8 to 12); and (4) formal operations (ages 12 and over).[25] For K-12 schools, students will be in stages 2 to 4. Preoperational children (Stage 2) cannot grasp that a person’s core-self stays the same despite changes in external appearance, they believe everything is alive, and human beings make everything in nature.[26] Further, understanding and applying rules is difficult at this age because it requires abstract conceptualization, a skill that preoperational children do not have. In addition, information-processing functions evolve as children grow. Executive functions, inhibition, working memory, cognitive flexibility, and planning ability all develop as a child ages—all of which have implications for a child’s self-preservation responses during an emergency.[27] For example, young students are less able to assess a situation and make sound survival decisions, and they are physically less able to flee or defend themselves during an active-shooter event than older students. The implications of these differences for physical security design are that barriers and delay time become more important the younger the students.
In elementary schools, students stay in one classroom most of the day only leaving the room for recess, lunch, physical education, and sometimes music class. This contrasts significantly with high schools where students are mobile, moving autonomously between classrooms every hour, driving themselves to and from school, and maybe free to leave campus during the lunch hour.
Between elementary schools and high schools are junior high and middle schools. These schools serve as a transition from elementary school to high school. Students move between classrooms but several core classes may be held in the same classroom so they do not move often as high school students. These students eat lunch at school and are too young to drive so they are less mobile and independent than high school students. They are however, more mobile and independent than elementary school students. These differences matter for physical security design since security should provide protection while minimally interfering with peoples’ ability to go about their daily business. In addition, differences in students’ social, emotional, and intellectual development influences the origin of threats to schools. Threats to elementary schools are mostly external while they are mostly internal in junior high and high schools. Problems with interpersonal violence and drug use increase as students move on to junior high and high school.
For these reasons, the research team will view the research results from three different perspectives: the needs of early childhood education schools, the needs of schools with early-adolescent students, and schools with mid- to late- adolescent students. The tested technologies may be useful in all schools, but the research team will discover the best technologies for each type of school. The team also recognizes the differences among rural, suburban, and urban schools as well as differences between schools in wealthy and low-income communities. Therefore, the team will also develop recommendations based on school location (e.g., rural versus urban) and cost (low-cost/high value versus high cost/high value).
The results of this research will serve as the basis for the security buying guidebook mentioned earlier. This research will be brand neutral and will make no specific manufacturer recommendations, rather it will evaluate the best technologies for improving school security at the lowest cost.
Purpose and Objectives
Access control, such as locked or monitored doors, is the most common security measure used in American schools. During the 2013-2014 school year 95% of elementary schools, 95% of middle schools, and 89% of high schools report controlling access during the school day.[28] The percentage of schools using access control increased 18% percent over the 14-year period between 2000 and 2014.[29] This research will focus on doors, locks, and windows because access control is most common security measure used in K-12 schools.
This study will be the first large interdisciplinary applied study of school security technologies to look at physical security barrier delay-times for use in schools. The study will be unique in that it will have three board certified security practitioners on a research team that also includes industrial psychologists and mechanical engineers.
The research objectives are:
· Conduct penetration testing to gather delay time data for commonly used doors in schools;
· Penetration testing of common window glazing materials and smash resistant films for use in schools;
· Test the effectiveness of door blocking devices marketed to schools;
· Collect data on the type, condition, appropriateness and cost-effectiveness of security devices currently used in schools;
· Examine teacher, staff, and parents’ (school populations) perceptions of security in their schools as well as perceived needs for additional security technologies.
· Create a guidebook for school officials and law enforcement that will simplify using emergency response times to guide school security design
· Disseminate the research findings to school administrators, security practitioners, and researchers through target audience appropriate means such as peer reviewed journals, trade magazines, guidebooks, and presentations to professional and academic conferences
· Archive data for use by the research community
The ultimate goal of this research is to create guidelines school administrators, law enforcement, and security practitioners can use when designing or upgrading security measures in schools. This guidebook will be key to adopting an approach to school security design that uses emergency response time analysis because it will provide data on how long these barrier devices will delay an intruder. The guidebook will also provide information on cost-effectiveness that will help school administrators determine security spending priorities and avoid wasteful spending.
Project Design and Implementation
Researchers from Embry-Riddle Aeronautical University – Prescott’s College of Security and Intelligence, College of Engineering, and Behavioral & Safety Sciences Department will evaluate security technologies for: feasibility, durability, effectiveness, practicality, and cost-effectiveness, and will assess how well students and staff can use or interact with those technologies. For example, during laboratory testing a particular door material may prove to be resilient against a forced entry attack, but because of the material’s mass, small children would not be able to open the doors making them impractical for use in elementary schools.
The research team will test technologies based on the fundamental security principles of delay and mitigation. A good physical security design will delay an attacker long enough for a response force to arrive and neutralize the threat–mitigating loss during an attack. Delay is achieved by using physical barriers such as doors, windows, and locks. In this study, the research team will assess how long those technologies will delay an attacker from accessing a protected space rather than whether the device can stop bullets and prevent any injuries. Attack resilient materials can prevent, discourage, or delay burglars or vandals trying to enter a school building after hours—mitigating the risk of loss from theft or destruction. These materials can provide schools with security against multiple threats beyond that of an armed intruder.
The research team has identified 23 school districts within the State of Arizona to study as part of this research. These 23 school districts have 447 schools, serve 299,295 K-12 students, and employ 32,107 faculty and staff. To ensure the study has broad scalability to schools nationwide the school districts are diverse in location, student demographics, and financial resources. The districts range from large urban school districts to small rural districts to schools on Native American reservations. We identified these school districts by considering several variables: number of students, location, racial and ethnic diversity, community size, and annual budget. For example, we chose school districts on Native American chosen based on distance from large urban areas, sources of income (i.e., casinos, mining, power generation etc.), and geographic size.
This research will consist of four parts:
1. surveying teachers, staff, and parents' perceptions of security;
2. physically touring schools identify which security technologies are in use;
3. comparing parent and staff perceptions of security with those of security experts; and,
4. penetration testing of commonly used security barriers.
Part I will survey teachers, staff, and administrators (school populations) to discover how they perceive security in their schools. The surveys will gather data about how school populations perceive threats and the need for security technologies to mitigate those threats in their schools. Researchers will analyze the collected data to see if there are differences in perceptions among various groupings such as rural versus urban, students versus staff, poorer districts versus wealthy districts, etc. Researchers will also use this data to determine school populations’ perceptions are in line with actual risks, and whether perceived need for security matches the capabilities of those security technologies. To evaluate security perceptions effectively, this study will use a multimodal research design to gather converging evidence in support of the school security guidebook design. This will include risk perception assessments; overall attitudes toward safety and security; and perceived and actual security vulnerabilities.
Researchers will collect data using online or written surveys (for lower income areas that may lack Internet access) and the surveys will be available in the Spanish and Diné (Navajo) languages. Participation is voluntary and the surveys will not collect personally identifiable information as part of the research. Research survey forms will use unique identifier numbers to distinguish individual survey responses; however, the identifier numbers will not connect to participant’s identities. Participants will receive informed consent forms before engaging in the study.
Part II of the research will involve having board certified security experts touring schools and conducting physical security surveys to inventory existing security technologies. During the physical security surveys, the security experts will identify threats and vulnerabilities at each school as well as what security technologies are best suited to mitigate any identified threats or vulnerabilities. Data gathered in Parts I and II of the project will be analyzed and compared to identify security issues at participating schools, perceptual disconnects between laypersons and security experts, and which security technologies will have the broadest application to most schools.
Part III of the project will involve testing security barrier products. This part will involve, designing product testing protocols, buying materials, product testing, and analysis of test data. The research team will test: classroom doors, sidelight glazing materials, smash resistant window films, and aftermarket door blocking technologies. Researchers will test commonly used classroom doors (solid birch, 16-gauge and 18-gauge steel clad) against 5.56 mm, 9 mm, 357 Magnum munitions, and 12 gauge 00 Buckshot combined with brute-force entry to discover the assailant delay time of each door. The assailant delay time will be determined using the U.S. Army definition of “the time it takes to make a 96-square-inch (man-sized) opening with the least dimension greater than 6 inches in a construction assembly using a given set of tools.”[30] Researchers will also assess how door materials react to ballistic impacts to assess indirect safety issues such as material spalling that could cause injuries to room occupants. Data gathered during this testing will be used to identify the most cost-effective security barrier technologies for use in K-12 schools.
Researchers will also test window glazing materials to discover the penetration delay times of those glazing materials both without and with smash resistant films applied to the glazing. The research team will use two criteria for penetration time. The first being the time needed to create a hole large enough to allow passage of a person’s arm. Many classrooms have sidelights or doors with windows making this test protocol necessary since an attacker could reach inside the classroom and unlock the door during an attack. The second penetration time criteria will be the same U.S. Army criteria used for the door testing: the time necessary to create a 96 square inch hole in the material. Video of all penetration tests will be recorded from two angles for later review and analysis.
We understand these materials will not stop bullets and will not be testing for bullet resistance. Rather, we will test the resilience of these barrier technologies against ballistic and brute force to determine how long they will keep an intruder out of a protected area. This delay may reduce the number of casualties during a school shooting event.
Capabilities and Competencies
The research team is ideally positioned to conduct the research proposal outlined above. Professor Tom Foley is a faculty member in the College of Security & Intelligence, the first such College within the United States. He holds a Doctor of Jurisprudence and is board certified in security management (Certified Protection Professional) and physical security (Physical Security Professional). He has consulted for numerous schools in the Prescott and Phoenix areas, conducting physical security assessments, helping to create emergency response plans, and suggesting low- or no- cost methods to improve school safety. Professor Foley is widely recognized as a school security expert and has been interviewed by ABC15, CBS5, NBC, NPR, KTAR radio, and various print media. He organized a symposium on school shootings attended by school administrators, emergency planners, law enforcement officers, and private security professionals from throughout Arizona. He is a member of ASIS International, the Association of Threat Assessment Professionals, and the National Domestic Preparedness Coalition. He is a past member of the ASIS International School Safety and Security Council and a current member of the ASIS International/National Fire Protection Association Active Shooter Initiative. Professor Foley is also a member of Embry-Riddle’s Behavioral Intervention Team and Emergency Response Team.
Dr. Erin Bowen is Director of the Robertson Safety Institute as well as Chair of the Behavioral & Safety Sciences Department at Embry-Riddle. She holds a Ph.D. in Industrial/Organizational Psychology, a doctoral minor in Research Methodology, and focuses her research on the cognitive/behavioral components of safety and evidence-based approaches to safety training. She also has extensive experience in human subjects research protection and Institutional Research Board protocols, and served as a member on the University IRB. In addition, Dr. Bowen has expertise in the design, implementation, and assessment of organizational training programs as well as the development and validation of survey and assessment instruments. Her expertise in aviation safety and psychology has been featured nationally on NBC’s “Meet the Press”, other local and national television and print media, as well as internationally on BBC Radio, CBC, and CTV, and other venues.
Dr. Michele Gazica is an Assistant Professor in the Behavioral and Safety Sciences Department at Embry-Riddle Aeronautical University. She has extensive research experience in the areas of occupational health and safety as well as survey development and validation. Dr. Gazica has additional expertise in legal analysis, sophisticated data analysis, and test and measurement theory. Dr. Gazica received her PhD in Industrial/Organizational Psychology from the University of South Florida and her Juris Doctor from the University of Florida. Before choosing to pursue her PhD, she practiced law for seven years.
Professor Reginald Parker is an assistant professor in the College of Security and Intelligence at Embry-Riddle Aeronautical University in Prescott, Arizona. Professor Parker has extensive security experience and is board certified in security management as a Certified Protection Professional (CPP). Professor Parker is also a certified Professional Project Manager (PMP) by the Project Management Institute and specializes in project scheduling and cost control to maintain budget and on time completion metrics of multimillion dollar programs. He teaches project management methods class at ERAU and prepares students for the PMP professional exam. He is a member of ASIS International, the Project Management Institute, FBI Infragard Program, and the Homeland Security Trusted Partners program.
Brooke Shannon is an Assistant Professor of Intelligence and Security and Intelligence at Embry-Riddle Aeronautical University in Prescott, Arizona. She has a PhD in Information Science and Learning Technologies with a doctoral minor in Educational Leadership and Policy Analysis with research interests in content analysis and phenomenology. She has a Masters in Applied Behavioral Science and served as in the United States Air Force as a Behavioral Influences Analyst at the National Air and Space Intelligence Center.
Michael Brady, MA, CPP, is the Director of Campus Safety & Security at Embry-Riddle Aeronautical University – Prescott. As a Certified Protection Professional (CPP) he is Board Certified in Security Management by ASIS International. Across his nearly 40 years in the protection field, Director Brady has served as an in-house security and safety professional, as a consultant, and as an executive in the contract guarding industry. He has been applying workplace violence prevention, mitigation, and response strategies since the late 1980s. Trained by both the Center for Personal Protection and Safety and the ALICE Institute, he has made many presentations on how to detect, prevent, and mitigate targeted violence in schools and the workplace. Director Brady has taught security management courses as an adjunct instructor for Saint Mary’s University of Minnesota and University of South California – Santa Cruz. He is a member of ASIS International and the International Association of Campus Law Enforcement Administrators (IACLEA). Director Brady is also a member of Embry-Riddle – Prescott’s Behavioral Intervention Team and Emergency Operations Team.
Dr. Muna Slewa is an assistant professor in the Mechanical Engineering Department at Embry-Riddle Aeronautical University – Prescott. Dr. Slewa holds two Ph.D. degrees and has over 10-years of university teaching experience. She has conducted research in large laboratories, including the Los Alamos National Lab. Dr. Slewa’s research expertise includes: microscopic analysis using Scanning Electron Microscopes, EBSD microscopes, and XRD refraction. Her research includes investigating phase change in A36 steel as a result of high-speed impact loading, plastic deformation of steel plates under high-impact loading, and she was a researcher on the Fischer Space Pen. Dr. Slewa is a member of the National Society of Leadership and Success.
Kusay Rafo is the Owner and CEO of Rafail CAD & Engineering in Ontario, Canada. Mr. Rafo holds a master’s degree in mechanical engineering/welding/manufacturing engineering, and explosive welding. He is a licensed professional engineer and he serves as an executive member of the Canadian Welding Association. Mr. Rafo has experience in industrial structural engineering, custom machinery design failure analysis, high impact/explosive welding, and mechanical failure analysis. He is also experienced in welding metallurgy, metallography, and microstructure analysis using optical and scanning electron microscopes, as well as welding inspection non-destructive testing. Mr. Rafo has more than 10-years’ of experience teaching university level courses.
Embry-Riddle Aeronautical University is a historic leader in aviation education that has evolved into a leader in engineering, security, and safety. Resources available at the Prescott, AZ campus include space and skill for test bed design, data analysis software, and security knowledge and expertise not typically available to public school systems interested in performing similar research.
Management Plan and Organization
This project has been funded by a grant from the National Institute of Justice (NIJ) in the amount of $770,000 and began on January 15, 2018 and will be completed on December 31, 2019. The research team consists of one principal investigator, seven co-investigators, three graduate research assistants, and three undergraduate assistants. Tom Foley is the principal investigator and Reg Parker will serve as the project manager. The behavioral science portion of the research will be conducted by Dr. Erin Bowen and Dr. Michelle Gazica with two graduate research assistants. Dr. Muna Slewa and Kusay Rafo will conduct the material testing and analysis portion of the project with help from the rest of the research team as needed. Kusay Rafo will create CAD drawings of testing layouts and testbeds in addition to providing his materials testing and failure analysis expertise to the team. The physical inspection and inventory of security devices currently in use will be conducted by Tom Foley, Reg Parker, Michael Brady, and one graduate research assistant with help from other members of the team. Dr. Brooke Shannon will code and archive data, assist in statistical analysis, and oversee the dissemination of the research results. The risk of project delay because of loss of a team member is mitigated by skill redundancies among the researchers.
Potential Impact
The potential impact of the proposed research is high. Not only is the project filling a significant gap in the research and practice literature for school safety and security, but it is doing so in a way that integrates scientific rigor with real-world practicality. The project design takes advantage of the significant resources of the College of Security & Intelligence, College of Engineering, and the Robertson Safety Institute at Embry-Riddle as leaders in the science and practice of security and safety.
This research will provide a basis for emergency response time based on the physical security design in schools, which has the potential to create a more structured and rational approach to school security technology spending. Such an approach could lead to selecting more cost-effective security technologies and physical security designs that best meet the unique needs of each school regardless of location. This research will help rural schools to layer security barrier technologies to increase delay and compensate for longer police response times. It will also help urban schools avoid buying too many security barrier technologies relative to police response times. As a matter of public policy, creating better guidance on the proper application of security barrier technologies will reduce wasteful spending and increase security value per dollar spent and make for a safe environment for our nation’s school-going population.
Physical security is an under researched area of school security. As described earlier in this proposal, the nature of attacks and victim population characteristics (ability to respond and avoid harm during an attack) differs significantly among elementary school, middle school, and high school students. This research is essential to give school administrators, teachers, and parents useful knowledge to retrofit existing school buildings with security features that will protect occupants until responders can arrive and stop the threat.
This research project has substantial implications for current criminal justice policy and practice. It will change the current “one-size-fits-all” approach to K-12 physical security to a risk-based approach that considers the developmental levels of students, police response times, and most likely origin of threat (insider versus outsider). Current discussions and research regarding school security categorize schools into preschool, K-12, and college without considering that the educational system consists of preschools, elementary, middle, and high schools because of the intrinsically different developmental levels, capabilities, and behaviors of students. This research will challenge existing assumptions and create a framework for physical security design in rural and urban elementary, middle, and high schools. This research will also build on previous research by Sandia National Laboratories in 1999, which resulted in the first of what was hoped to be several guidebooks for use by schools and law enforcement.[31] This guidebook series was never completed because of funding issues but its continuation, as we propose here, is essential.
Dissemination Strategy
The scientist-practitioner approach employed by the research team will not only create a practical guidebook for broad distribution to school administrators, but the results will also be disseminated to the broader scholarly and security practitioner communities. The research team will share results through a combination of industry-based safety and security conferences and trade publications to invite open discussion on the results of the durability testing of the security products. The researcher will also present key findings at each phase of the research to relevant safety and security conferences and submit articles to leading education and security research journals. The practical guidebook in combination with the new systems-based models (tested using CFA and SEM) of stakeholder perception encompass a major addition to the school safety field.
In addition, researchers will present to school districts throughout Arizona (where the research will be conducted) and beyond based on the level of interest. It is the research team’s primary goal to disseminate this knowledge as widely as possible and make freely available to school administrators. The guidebook will be available to schools for free download from the College of Security and Intelligence website. The guidebook will also be provided at no charge to various nonprofit school safety organizations such as Sandy Hook Promise and Coyote Crisis Cooperative, to distribute freely to their audiences as well.
Results of this research will also be disseminated to the scholarly community through publication in scholarly journals and presentations at academic conferences. The results will also be communicated to security practitioners through articles in trade publications, white papers, and presentations to professional conferences such as the ASIS International Annual Seminar.
Summary
Embry-Riddle’s College of Security and Intelligence, Robertson Safety Institute, and College of Engineering are uniquely qualified to develop a revolutionary framework for school security that moves away from a one-size-fits-all approach to school security to a risk based approach that considers student ages and abilities, school location, local emergency response times, the time-delay created by various physical security barriers, and cost-effectiveness. Its research team consists of an impressive group of security practitioners, industrial psychologists, and engineering researchers. In partnership with rural, suburban, urban, and tribal schools throughout Arizona, Embry-Riddle will develop a guidebook of school security barriers for use by schools nationwide.
[1] Lysiak, Matthew, Newtown: An American Tragedy.
[2] Linskey, Annie, “Newtown Rampage Spurs $5 Billion School Security Spending.”
[3] Halloran, Liz, “Bulletproof Whiteboards And The Marketing Of School Safety.”
[4] “The School-Security Industry Is Cashing In Big on Public Fears of Mass Shootings | The Nation.”
[5] Ibid.
[6] Green, “The Appropriate and Effective Use of Security Technologies in US Schools. A Guide for Schools and Law Enforcement Agencies.,” 3.
[7] Ibid.
[8] Schwartz, Heather L. et al., “The Role of Technology in Improving K-12 School Safety”; Johns Hopkins University Applied Physics Laboratory, “A Comprehensive Report on School Safety Technology.”
[9] Green, “The Appropriate and Effective Use of Security Technologies in US Schools. A Guide for Schools and Law Enforcement Agencies.,” 5–7.
[10] Connecticut School Safety Infrastructure Council, “Report of the School Safety Infrastructure Council.”
[11] Sandy Hook Advisory Commission, “Final Report of the Sandy Hook Advisory Commission.”
[12] The American Institute of Architects, Security Planning and Design: A Guide for Architects and Building Design Professionals, 84.
[13] Johns Hopkins University Applied Physics Laboratory, “A Comprehensive Report on School Safety Technology,” 3–25.
[14] Ibid., 3–35.
[15] “Report of the Virginia Tech Review Panel - Fullreport.pdf,” 91.
[16] Ibid.
[17] Not Available. 1978. “Barrier Technology Handbook”. United States.
[18] Miller, James R., “NRC: The Barrier Technology Handbook - (Generic Letter 78-19).”
[19] Zhang, Anlan, Musu-Gillette, Lauren, and Oudekerk, Barbara, “Indicators of School Crime and Safety: 2015.”
[20] Skiba, Russell et al., “Beyond Guns, Drugs, and Gangs.”
[21] Chrusciel, Margaret M. et al., “Law Enforcement Executive and Principal Perspectives on School Safety Measures: School Resource Officers.”
[22] Skubak Tillyer, Marie, Fisher, Bonnie S., and Wilcox, Pamela, “The Effects of School Crime Prevention on Students’ Violent Victimization, Risk Perception, and Fear of Crime: A Multilevel Opportunity Prespective.”
[23] Cox, Brandy, Territorial Early Childhood Education Center.
[24] Ibid.
[25] Belsky, Janet, Experiencing the Lifespan, 93.
[26] Ibid.
[27] Best, Miller, and Jones, “Executive Functions after Age 5”; Best, John R. and Miller, Patricia H., “A Developmental Perspective on Executive Function”; Downes, Michelle, Bathelt, Joe, and De Haan, Michelle, “Event-Related Potential Measures of Executive Functioning from Preschool to Adolescence”; Gathercole, Susan E. et al., “The Structure of Working Memory From 4 to 15 Years of Age”; Huizinga, Mariette, Dolan, Conor V., and van der Molen, Maurits W., “Age-Related Change in Executive Function: Developmental Trends and a Latent Variable Analysis.”
[28] Ibid., at 103.
[29] Ibid., at 104.
[30] The American Institute of Architects, Security Planning and Design: A Guide for Architects and Building Design Professionals, 84.
[31] Green, “The Appropriate and Effective Use of Security Technologies in US Schools. A Guide for Schools and Law Enforcement Agencies.,” v.
Categories: Faculty-Staff
-
Representations of the Military in 20th Century Ethnic American Literature
PI Kara Fontenot
Building on existing literary and ethnic studies scholarship with respect to the construction of American identity, I am considering the political work of representations of the U.S military in ethnic American literature. Ethnic American texts that contain representations of the U.S. military are an essential yet understudied part of a politicized, nation-centered critical discourse that examines strategies for constructing and negotiating national identity, practices of inclusion and exclusion with regard to citizenship and relationships between individual, racial group, ethnic group and nation.
The U.S. military has long been vital to the ways in which individuals’ and groups’ relationships to the U.S. nation-state have been imagined. For example, in his now tirelessly cited study of nationalism, Imagined Communities (1983), Benedict Anderson emphasizes the significance of military service for constructing an imagined affiliation for a diverse citizenry.He reminds us that wars fought for the nation provide a shared experience for citizens, whether they are wars against foreign enemies or even a domestic civil war.Anderson also asserts that memorials to soldiers killed in the service of the nation link the dead and the yet unborn in a shared collective, which secularizes a role religion played in the past, substituting the nation-state for the church. His history affirms that militarism has long been a tool of official nationalism and a venue for visual pageantry that reaffirms the power and glory of the nation-state. Anderson even figures “willingness to die for one’s country” as the traditional measure of one’s commitment to a nation, and, indeed, historically military service has been one of the paths to legal citizenship in the United States.In addition to considering the enormous weight of military service in the national imagination, we should consider the ways experiences of military force and military service have long characterized racial and ethnic minority life in the United States. U.S. military force has been deployed against every major ethnic minority group in the nation.In various, complex, historically specific situations, the U.S. military has served as a tool to kill, terrorize, oppress, imprison and seize land and/or property from Native Americans, Mexican Americans, African Americans and Asian Americans. Many literary representations of military service by ethnic Americans may be read as critiques of ideology in which ethnic minorities are nationalized yet simultaneously excluded from full citizenship in the nation.
However, members of ethnic American groups historically excluded from full citizenship have proudly served in the U.S. military since the American Revolution, earlier in small numbers within integrated enlisted ranks, then in large segregated units during World War II, and last in disproportionately large numbers during the Vietnam War and other wars fought primarily by soldiers drafted or recruited from the American working-class. For many members of ethnic minority groups, U.S. military service has become an avenue for socio-economic mobility and a path to legal citizenship in the U.S. nation-state.Many literary representations of military service by ethnic Americans may be read as attempts to expand existing constructions of American identity by writing previously excluded groups into the national body.
Literary representations of the U.S. military in Ethnic American literature are also part of an ongoing national discourse on whiteness, white privilege, citizenship and national identity. For example, in The Possessive Investment in Whiteness (2006) George Lipsitz argues that in the United States white privilege has been constructed and preserved legally, institutionally and socially, which has resulted in a conflation of American identity and white identity that historically has excluded ethnic minorities from full, equal citizenship in the U.S. nation-state. Certainly, in ethnic American literature, representations of soldiers nationalized by service in the U.S. military yet simultaneously excluded on the basis of ethnic or racial identity contribute to the national discourse on whiteness, white privilege, citizenship and national identity.
These representations of military service are also part of an ongoing national discourse about class struggle. Anderson, Lipsitz and other scholars of nationalism, such as Etienne Balibar and Immanuel Wallerstein, agree that the exclusion of ethnic minorities from national identity on the basis of race is simultaneously a reflection of class struggle. In Race, Nation, Class: Ambiguous Identities (1988), Balibar and Wallerstein in suggest that imagination of a national community is constructed through both language and race, resulting in a notion of kinship that Balibar coins “fictive ethnicity.” Balibar and Wallerstein point out that through this conception of shared identity, the “nation” as a historical construct is used to project present institutions and antagonisms into the past (often a mythical past). For example, Wallerstein observes that the inclusiveness of national identity often expands and contracts according to the present need for labor for the lowest paid, least rewarding jobs. Certainly, in ethnic American literature, literary representations of disproportionately large numbers of ethnic soldiers drafted and recruited into the enlisted ranks of the U.S. military and their often racially-inflected experience of service contribute to the national discourse on the relationship between race and class struggle.
It is no wonder, considering the complex history of ethnic Americans’ service in the U.S. military that representations of the U.S. military in ethnic American literature are also complex and embark on a wide variety of political projects. What is surprising is that no book-length examination of representations of the U.S. military in ethnic American literature has yet been published.
An extensive search of the MLA Bibliography’s database of peer-reviewed journal articles, covering over 600 sources, produced only six articles giving critical attention to representations of the U.S. military in Ethnic American texts. Four of these were close readings of a single text, one was a thematic exploration of Black Rough Riders, and the most comprehensive was an article by Perry D. Luckett, “The Black Soldier in Vietnam War Literature and Film” (1990). Similarly, a search of book listings in the WorldCat database produced many historical descriptions of experiences of ethnic soldiers serving in the U.S. military, collections of oral narratives of ethnic soldiers, memoirs of ethnic experiences of war, an anthology of war-themed writings related to Chicano/a experiences of Vietnam, Aztlan and Vietnam, by George Mariscal, and novels and short-stories that feature the theme of war. However, the search uncovered no book-length critical study of representations of the U.S. military in Ethnic American literature.
The multiple ethnic literary traditions represented in this project emerge out of incommensurable histories of different US ethnic groups, yet they are all characterized by attempts to grapple with constructions of US national identity through representations of the U.S. military. The comparative methodology of this project allows me to consider the complexity and variety of ways in which literary representations perform political work as the texts articulate individual and group relations to American identity and the US nation-state through representations of the US military, both as a national institution and as a site of individual identity construction.
In the course of my research, I will attempt to answer the following questions: How do these texts represent U.S. military service as a performance of American-ness (national identity) that fails to mitigate the legal exclusion and social stigmatization of racial and ethnic identity? Conversely, how do these texts represent U.S. military service as a performance of Americanness (national identity) that does mitigate the legal exclusion and social stigmatization of racial and ethnic identity? What is the relationship between genre and politics in first-person narratives of ethnic American U.S. military service? How do representations of the U.S. military in ethnic American literature rewrite national histories and contest existing representations of the nation?
Categories: Faculty-Staff
-
Effects of Institutional Responses to the COVID-19 Pandemic on Undergraduate Faculty and Students Across STEM Disciplines
PI Chelsea LeNoble
CO-I Allison Kwesell
The project's specific aims are to: (1) examine teaching and learning experiences of undergraduate faculty and students in response to the COVID-19 pandemic; (2) examine the effects of faculty and student reactions on undergraduate STEM teaching and learning; and (3) leverage findings to develop actionable recommendations for colleges and universities to best prepare and protect their faculty, staff, and students and the integrity of undergraduate STEM education.
Categories: Faculty-Staff
-
Eco-Dolphin
PI Hong Liu
CO-I Zakaria Daud
CO-I Ci Wen
CO-I Dynamite Obinna
Eco-Dolphin is the name of a fleet of adaptive and cooperative automated underwater vehicles (AUVs) that a team of students at ERAU have been working on since January 2012.
By 2015, the platforms of the AUVs and basic navigation programs were tested. One of the major success is the demonstration of the Yellow Dolphin where four NASA astronauts participated in the NASA Extreme Environmental Mission Operation (NEEMO) during an event in the summer of 2014. Since 2015, the team started developing and testing the autonomous mission control programs based on the MOOS-IvP middleware developed by MIT and Oxford. Two peer reviewed conference proceedings with student coauthors were published. Students gave two to three presentations each year, including
- FURC, Florida Undergraduate Research Conferences 2012, 2013 and 2014
- SIAM SEA conference in FIT Melbourne, FL 2014
- CASE 2014 Creativity in the Arts and Sciences Event
- A3I Conference at Prescott Campus, 2014
- Discovery Day at Daytona Beach Campus, 2014
- Embry-Riddle Undergraduate Math Conference
- SIAM National Annual Conference
Categories: Undergraduate
-
Measuring Interstellar Temperature and Ionization Variations Using Observations of Faint Diffuse [OII] Emission
PI Edwin Mierkiewicz
The interstellar medium (ISM) plays a vital role in the ongoing cycle of stellar birth and death as well as galactic evolution. However the role of interstellar matter, from how its properties are influenced by stars to how, in turn, its properties influence star formation is poorly understood.
Within the past decade substantial strides have been made towards unraveling the mysteries of a major ISM component, the widespread warm ionized medium (WIM). The advances were enabled by innovative spectroscopic techniques to detect and study extremely faint interstellar emission lines in the visible spectral region. With such observations it is possible to explore the connection between the Galactic disk and halo as energy and gas are transferred away from massive star-forming regions to large distances from the midplane. An especially exciting development in this area is the evidence for temperature variations and the existence of a previously unrecognized source of heating within the WIM. The emission line of ionized oxygen in the near ultraviolet spectral region (372.7 nm) is key to exploring variations in temperature and ionization state within the gas, and for investigating the role of this additional heating. Our [OII] observations will (1) provide the only opportunity to separate unambiguously variations in temperature from variations in ionization conditions in the warm ionized medium of our Galaxy and (2) confirm whether H-alpha, [NII], and [SII] data can provide reliable temperature information about diffuse ionized gas in our own and other galaxies.Categories: Faculty-Staff
-
High Spectral Resolution Observations of Lunar Exospheric Emissions
PI Edwin Mierkiewicz
We are employing high-resolution Fabry-Perot spectroscopy of neutral sodium and potassium emission to investigate the morphology and dynamics of the lunar sodium exosphere. Likely atmosphere source mechanisms are thermal desorption, photo-desorption, ion sputtering, and meteoric impact ablation.
Their relative importance remains uncertain, both with regard to spatial and to temporal trends. Once released, sputtered gases in the lunar atmosphere can be pulled back to the regolith by gravity, escape to space, get pushed away by solar radiation pressure, or become photoionized and swept away by the solar wind. To test hypotheses about the sources, sinks, and escape of the lunar atmosphere, velocity-resolved observations under different lunar phases, altitudes, latitudes, and time histories are being made to help understand factors that link resultant morphologies to sources and solar radiation effects. These observations will help constrain atmospheric and surface-process modeling, and help quantify the source and escape mechanisms.
Categories: Faculty-Staff
-
Collaborative Research: Wideband Multi-Beam Antenna Arrays: Low-Complexity Algorithms and Analog-CMOS Implementations
PI Sirani Mututhanthrige Perera
PI Arjuna Habarakada Madanayake
PI Soumyajit Mandal
Explosion of millimeter-wave (mm-wave) bandwidth opens up applications in 5G wireless systems spanning communications, localization, imaging, and radar. This project addresses challenges in mathematics, engineering, and science in developing efficient wideband beamformers based on sparse factorizations of the matrix called-delay Vandermonde matrices (DVM). The proposed highly integrated approach is attractive for mobile applications including 5G smart devices, the internet of things, mobile robotics, unmanned aerial vehicles, and other emerging applications focused on mm-waves.
A multi-beam array receiver is deeply difficult to realize in integrated circuit (IC) form due to the underlying complexity of its signal flow graph. Through the proposed work, mathematical methods based on the theories of i) sparse factorization and complexity of the structured complex DVM with the introduction of a super class for the discrete Fourier transform(which is DVM), and ii) approximation transforms are proved to solve this problem.
The resulting matrices are realized with multi-GHz bandwidths using analog ICs. The novel DVM algorithm solves the longstanding "beam squint" problem, i.e., the fact that the beam direction changes with input frequency, making true wideband operation impossible. Moreover, the proposed multi-beamforming networks in analog IC form will be realized efficiently while addressing precision circuit design, digital calibration, built-in self-test, etc. Besides scientific merits, both minority students and female students will be mentored to pursue careers in the STEM disciplines through the proposed project.
This project was funded by the National Science Foundation (the division of Electrical, Communications, and Cyber Systems) with award numbers 1711625 and 1711395.
Categories: Faculty-Staff
1-10 of 16 results