scispace - formally typeset
Search or ask a question

Showing papers by "Paul J. Taylor published in 2018"


01 Mar 2018
TL;DR: This report examines the policy challenges for the Internet of Things (IoT), and raises a broad range of issues that need to be considered if policy is to be effective and the potential economic value of IoT is harnessed.

27 citations


Journal ArticleDOI
TL;DR: In this paper, participants reported their recall of an event witnessed under full or divided attention using a timeline reporting format, and compared the efficacy of Self-Generated Cues (SGC), OGC, and No Cues.
Abstract: Obtaining detailed accounts from individuals who have witnessed complex events under challenging encoding conditions presents a difficulty for investigators. In the present research, participants (N = 132) reported their recall of an event witnessed under full or divided attention using a timeline reporting format. Extending the Timeline Technique to assess the relative performance of two additional mnemonics, Self-Generated Cues (SGC) and Other-Generated Cues (OGC), participants provided an account across three Timeline reporting conditions comparing the efficacy of SGC, OGC, and No Cues (control). Mock-witnesses using SGC provided more correct details than mock-witnesses in the OGC or No Cues conditions, under full but not under divided attention conditions. There was no difference between cue conditions with respect to the number of errors reported across attention conditions. Findings show SGC to be a promising addition to interviewing techniques as a retrieval support mnemonic with implications for applied contexts.

15 citations


Journal ArticleDOI
TL;DR: This article conducted 11 semi-structured interviews with police crisis negotiators in the Netherlands and found that negotiators made errors of three types: factual, judgment, or contextual, and they also reported making use of four types of response strategy: accept, apologize, attribute, and contradict.
Abstract: A range of studies have examined what should be said and done in crisis negotiations. Yet, no study to date has considered what happens when an error is made, how to respond to an error, and what the consequences of errors and responses might be on the negotiation process itself. To develop our understanding of errors, we conducted 11 semi-structured interviews with police crisis negotiators in the Netherlands. Negotiators reported making errors of three types: factual, judgment, or contextual. They also reported making use of four types of response strategy: accept, apologize, attribute, and contradict. Critically, the negotiators did not perceive errors as solely detrimental, but as an opportunity for feedback. They advocated for an error management approach, which focused on what could be learned from another person’s errors when looking back at them. Suggestions for improvement of the communication error management experience in crisis negotiations are discussed.

12 citations


Journal ArticleDOI
TL;DR: Results show that ROS-induced oxidation of PTPN12 accounts for ABL1 phosphorylation in HLRCC-associated PRCC, revealing a novel mechanism for inactivating a tumor suppressor gene product and establishing a direct link between pathologic PTP oxidation and neoplastic disease.
Abstract: Hereditary leiomyomatosis and renal cell carcinoma (HLRCC) is an inherited cancer syndrome associated with a highly aggressive form of type 2 papillary renal cell carcinoma (PRCC). Germline inactivating alterations in fumarate hydratase (FH) cause HLRCC and result in elevated levels of reactive oxygen species (ROS). Recent work indicates that FH-/- PRCC cells have increased activation of ABL1, which promotes tumor growth, but how ABL1 is activated remains unclear. Given that oxidation can regulate protein-tyrosine phosphatase (PTP) catalytic activity, inactivation of an ABL-directed PTP by ROS might account for ABL1 activation in this malignancy. Our group previously developed "q-oxPTPome," a method that globally monitors the oxidation of classical PTPs. In this study, we present a refined q-oxPTPome, increasing its sensitivity by >10×. Applying q-oxPTPome to FH-deficient cell models showed that multiple PTPs were either highly oxidized (including PTPN12) or overexpressed. Highly oxidized PTPs were those with relatively high sensitivity to exogenous H2O2. Most PTP oxidation in FH-deficient cells was reversible, although nearly 40% of PTPN13 was irreversibly oxidized to the sulfonic acid state. Using substrate-trapping mutants, we mapped PTPs to their putative substrates and found that only PTPN12 could target ABL1. Furthermore, knockdown experiments identified PTPN12 as the major ABL1 phosphatase, and overexpression of PTPN12 inhibited ABL1 phosphorylation and HLRCC cell growth. These results show that ROS-induced oxidation of PTPN12 accounts for ABL1 phosphorylation in HLRCC-associated PRCC, revealing a novel mechanism for inactivating a tumor suppressor gene product and establishing a direct link between pathologic PTP oxidation and neoplastic disease. SIGNIFICANCE: This work identifies a novel mechanism of activation of the oncogenic kinase ABL1 via ROS-induced, oxidation-mediated inactivation of cognate protein tyrosine phosphatases.

11 citations


Journal ArticleDOI
TL;DR: The authors explored the effect of law enforcement officers' communication errors and their response strategies on a suspect's trust in the officer; established rapport and hostility; and, the amount and quality of information shared.
Abstract: Two experiments explore the effect of law enforcement officers’ communication errors and their response strategies on a suspect’s trust in the officer; established rapport and hostility; and, the amount and quality of information shared. Students were questioned online by an exam board member about exam fraud (Nstudy1 = 188) or by a police negotiator after they had stolen money and barricaded themselves (Nstudy2 = 184). Unknown to participants, the online utterances of the law enforcement officer were pre-programmed to randomly assign them to a condition in a 2(Error: factual, judgment) × 3(Response: contradict, apologize, accept) factorial design, or to control where no error was made. Our findings show that making (judgment) errors seem more detrimental for affective trust and rapport in a suspect interview, while no such effects appeared in a crisis negotiation. Notably, we found a positive effect of errors, as more information was being shared. The ultimate effect of the error was dependent on the response: accept was effective in re-establishing rapport and decreasing hostility, while contradict threatens it. Accept seems more effective for the willingness to provide information in a suspect interview, while apologize seems more effective for affective trust and rapport in a crisis negotiation.

5 citations


Journal ArticleDOI
TL;DR: The 2012 winner of the IACM's Theory-to-Practice Award, Ellen Giebels as discussed by the authors, highlighted her groundbreaking research on influence tactics in crisis negotiations and other high-stakes conflict situations, showing how her focus on theoretical foundations and careful design has delivered contributions of practical relevance.
Abstract: In this tribute to the 2012 recipient of the IACM's Jeffrey Rubin's Theory‐to‐Practice Award, we celebrate the work of Ellen Giebels. We highlight her groundbreaking research on influence tactics in crisis negotiations and other high‐stakes conflict situations, showing how her focus on theoretical foundations and careful design has delivered contributions of practical relevance. We then hear from two early career researchers who share how Ellen's research and mentorship fostered their own desire to deliver impactful research. We conclude by inviting Ellen to reflect on future research questions and to underscore her vision on the use of technology in conflict and negotiations research.

4 citations


Journal ArticleDOI
TL;DR: In this article, a scoping paper explores the issues involved in the application of a number of technologies to the legal service sector in the UK, with a particular focus on the implications for the sector itself.
Abstract: A scoping paper exploring the issues involved in the application of a number of technologies to the legal service sector in the UK, with a particular focus on the implications for the sector itself.

2 citations


Journal ArticleDOI
TL;DR: The role of information context, judgment perspective and cue type on the "accuracy" of first impressions of another's Big5 personality was studied in three phases of data collection (n = 173).
Abstract: The role of information context, judgment perspective and cue type on the “accuracy” of first impressions of another’s Big5 personality was studied in three phases of data collection (n = 173). Accurate judgments were defined as the level of agreement between a target person’s aggregated personality score (i.e., average of self and informant ratings of personality) and a personality judgement about the target, indexed using item correlations. Results for Phase 1 found that completing a different task with the same partner improved accuracy for conscientiousness. Phase 2 investigated the relationship between a person’s role (judgment perspective) within an interaction (interactants, observers) and showed that Observers were better at judging the less interpersonal traits of conscientiousness and openness relative to Interactants. Finally, Phase 3 examined the types of cues that people used when rating another’s personality. Although Observers and Interactants had access to the same interaction, analyses revealed that they employed different types of cues when judging others. Findings are discussed in terms of Funder’s Realistic Accuracy Model (1995, 1999) along with practical implications, limitations and suggestions for future research.

2 citations


Book ChapterDOI
09 Mar 2018
TL;DR: In this article, the authors provide an overview of current understandings of online terrorist behavior, coupled with an outline of the qualitative and quantitative approaches that can and have been adopted to research this phenomenon.
Abstract: It has long been recognised that terrorists make use of the internet as one of many means through which to further their cause. This use of the internet has fuelled a large number of studies seeking to understand terrorists' use of online environments. This chapter provides an overview of current understandings of online terrorist behavior, coupled with an outline of the qualitative and quantitative approaches that can and have been adopted to research this phenomenon. The chapter closes with a discussion of the contentious issue of ethics in online terrorism research. The aim of the chapter is to equip readers with the necessary knowledge and skills to conduct their own research into terrorists' online behavior, taking best ethical practices into consideration when doing so.

2 citations