Results for 'psychological security'

978 found
Order:
  1.  48
    Philosophical and sociocultural dimensions of personality psychological security.O. Y. Blynova, L. S. Holovkova & O. V. Sheviakov - 2018 - Anthropological Measurements of Philosophical Research 14:73-83.
    Purpose. The dynamics and pace of social and economic transformations that are characteristic of modern society, lead to an increase in tension and the destruction of habitual stereotypes – ideals, values, norms, patterns of behaviour that unite people. These moments encourage us to rethink the understanding of "security" essence, in particular, psychological, which emphasizes the urgency of its study in the philosophical and sociocultural coordinates. Theoretical basis of the research is based on the philosophical methodology of K. Jaspers, (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  2.  20
    Multiple Roles of Grit in the Relationship Between Interpersonal Stress and Psychological Security of College Freshmen.Qingsong Yang, Mengxi Shi, Dandan Tang, Hai Zhu & Ke Xiong - 2022 - Frontiers in Psychology 13.
    Grit, as an important positive psychological quality, has rarely been studied for its role involved in the mechanism between stress and psychological security. This article explores the moderating and mediating role of grit in the relationship between interpersonal stress and psychological security of freshmen through two studies. In study 1, freshmen from several Chinese universities were recruited to complete a battery of questionnaire, including assessments about interpersonal stress, grit, and psychological security. The moderating (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  20
    Measuring the Psychological Security of Urban Residents: Construction and Validation of a New Scale.Jiaqi Wang, Ruyin Long, Hong Chen & Qianwen Li - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  15
    Job Security and Organizational Citizenship Behaviors in Chinese Hybrid Employment Context: Organizational Identification Versus Psychological Contract Breach Perspective Differences Across Employment Status.Wenzhu Lu, Xiaolang Liu, Shanshi Liu & Chuanyan Qin - 2021 - Frontiers in Psychology 12.
    The goal of the present research was to identify the mechanism through which job security exerts its different effects on organizational citizenship behaviors among contract and permanent employees from social identity and social exchange perspectives. Our research suggests two distinct, yet related explanatory mechanisms: organizational identification and psychological contract breach, to extend the job security literature by examining whether psychological contract breach and organization identity complement each other and explaining the mechanism of different behaviors response to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  21
    The Phenomenon of Security Within the Socio-Psychological Knowledge in the Era of Postmodernism.Olha Lazorko, Hryhorii Dzhahupov, Rafal Abramciow, Svitlana Symonenko, Olena Hrek & Tetiana Kostieva - 2022 - Postmodern Openings 13 (3):180-200.
    The relevance of the study of the socio-psychological phenomenon of personal security in the era of post-modernism is due to the real problems of today's society, which at the present stage of state development are characterized by acute interrelationships between the requirements of social security as a factor of socio-political and national security and the real state of mental existence. associated with indicators of social well-being of the individual. The aim of the article is to prove (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  16
    Situational and Psychological Approach to the Personal Security of Endangered Judges, Prosecutors, and Investigators.Svetoslav Hadzhiyski - 2022 - Diogenes 30 (1):154-158.
    This article focuses on the situational and psychological approach that can enhance the effectiveness of the protection of endangered judges, prosecutors, and investigators. The idea was raised that risk assessment and the implementation of security would be more effective if the situation is viewed in a different way from the ordinary approach. The phenomenological view allows for a larger interpretation, which includes personal and external factors.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  25
    Teaching Strategies and Psychological Effects of Entrepreneurship Education for College Students Majoring in Social Security Law Based on Deep Learning and Artificial Intelligence.Qinlei Zhu & Hao Zhang - 2022 - Frontiers in Psychology 13.
    This study aims to achieve the goal of cultivating and reserving emerging professional talents in social security law, improve the curriculum and mechanism of entrepreneurship education, and improve students’ entrepreneurial willingness and entrepreneurial ability. Deep learning technology is used to study the psychological effects of entrepreneurship education for college students majoring in social security law. Firstly, the concept of entrepreneurial psychology is elaborated and summarized. A related model is designed using the theory of proactive personality and planned (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  64
    The Importance of Securing the Psychologically Impalpable: The Vicissitudes of the Perception of Expressiveness.Amedeo Giorgi - 2011 - Journal of Phenomenological Psychology 42 (1):26-45.
    Historically, when psychology broke away from a philosophical mode of scholarship it strove to become a natural science. This meant that it largely imitated the concepts and practices of the natural sciences which included the use of abstract terms to designate many of its phenomena with the consequence that psychology is often more abstract and generic than it ought to be. Husserl has emphasized the role of the life-world as the ultimate basis of all knowledge and a serious consideration of (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  9.  2
    Family Security is a Legitimate Purpose to Achieve Human Security Spoken Legal Texts and Witnessing Human Studies- A Legal Scientific Study in the Light of the Purposes of Islamic Law.Abdulmalek Hussein Ali Altaj - forthcoming - Evolutionary Studies in Imaginative Culture:453-469.
    Praise be to Allah and peace and blessings be upon the Messenger of Allah and his family and companions, and after: This research tagged with: "Family security is a legitimate purpose to achieve human security" aims to show the importance of family security, and how the Sharia paid great attention to it, and stressed the need to maintain it in all psychological, health, physical, economic and moral fields as the family is the first basic social unit (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  25
    Secure attachment and autonomy orientation may foster mindfulness.Janis Leigh & Veanne N. Anderson - 2013 - Contemporary Buddhism 14 (2):265-283.
    Although mindfulness research has burgeoned, questions regarding the development of mindfulness remain largely unanswered. Mindfulness correlates negatively with the anxiety and avoidance dimensions of adult attachment and positively with autonomy, competence, and relatedness, the three primary psychological needs postulated by self-determination theory. It was hypothesized that secure attachment style and autonomy orientation would predict higher levels of self-reported mindfulness. After accounting for age, state self-esteem, and meditation practice, autonomy orientation predicted higher levels of self-reported mindfulness whereas secure attachment was (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  73
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   71 citations  
  12. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker, Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  13.  24
    Security as Completeness.Matteo Santarelli - 2017 - European Journal of Pragmatism and American Philosophy 9 (1).
    Peirce’s anti-psychologism hinges on two main assumptions. First, logic and psychology belong to two separate disciplines – respectively, the normative sciences and the experimental sciences. Second, externalism must be understood as a crucial and inescapable epistemological criterion. The introspectionist illusion, according to which individuals have direct and epistemologically flawless access to their own internal states, should be dismissed. As Colapietro (2003) and Calcaterra (2006) observe, Peirce’s standpoint is far different from the Kantian classical account of anti-psychologism. This original take on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  51
    Strategic games with security and potential level players.Alexander Zimper - 2007 - Theory and Decision 63 (1):53-78.
    This paper examines the existence of strategic solutions to finite normal form games under the assumption that strategy choices can be described as choices among lotteries where players have security- and potential level preferences over lotteries (e.g., Cohen, Theory and Decision, 33, 101–104, 1992, Gilboa, Journal of Mathematical Psychology, 32, 405–420, 1988, Jaffray, Theory and Decision, 24, 169–200, 1988). Since security- and potential level preferences require discontinuous utility representations, standard existence results for Nash equilibria in mixed strategies (Nash, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  16
    Psychological Factors Underlying Attitudes toward War: A Theoretical Review.Olga Gulevich & Evgeny Osin - 2023 - Sociology of Power 35 (1):31-50.
    People have different attitudes toward military action as a way of resolving international conflicts. In this article we will examine the psychological approach to the study of these attitudes: (a) the levels of attitudes toward war (attitudes toward specific military campaigns vs. general attitude toward war as a way of resolving international conflicts); (b) psychological (individual, social-psychological, and situational) factors predicting these attitudes; (c) limitations of the existing research and directions for future research. We will focus on (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  53
    Human Security and Citizenship in Finnish Religious Education: Rethinking Security Within the Human Rights Horizon.Gabriel O. Adebayo & Jan-Erik Mansikka - 2018 - Human Rights Review 19 (4):447-469.
    This paper discusses citizenship in Finnish religious education in relation to human security. It traces the characteristics of human security that connect citizenship, religion, and education in Finnish policy documents. The article focuses on basic education. Its data were analyzed employing qualitative content analysis. The findings indicate that citizenship in Finnish RE entails personal security concerns dealing with psychological and human rights issues. These are found to be essentially human security as conceptualized by the United (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  22
    Security and Citizenship: Security, Im/migration and Shrinking Citizenship Regimes.Alexandra Dobrowolsky - 2007 - Theoretical Inquiries in Law 8 (2):629-662.
    This Article points to a widening gap between citizenship theories and practices. Although discourses of citizenship resonate widely and are used extensively by scholars and policy makers, the author argues that the social, economic, political and even psychological processes of citizenship are shrinking in a contemporary context of global insecurity where im/migration and ever more restrictive national security concerns have become enmeshed in law, as well as in the public consciousness. As a result, this Article explores new trends (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  2
    The Psychology of a Social Justice Movement: Social Justice Feminism as a Case Study.John McGuire - 2024 - Studies in Social Justice 18 (3):589-606.
    This article undertakes a case study of social justice feminism through four criteria that influence the psyches of social movement participants: grievance, ideology, efficacy, and social embeddedness. The grievance lay with the Second Industrial Revolution. Social justice feminists used an “entering wedge” strategy to promote and pass women’s labor legislation to eventually secure state protection of all workers in the United States. The ideology of social justice feminism came from a combination of socialist-influenced thought and the promotion of social justice. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  51
    Worldwide Testing and Test Security Issues: Ethical Challenges and Solutions.David F. Foster - 2010 - Ethics and Behavior 20 (3-4):207-228.
    As psychology ethics begins to become more standardized and formalized globally (e.g., Gauthier, 2007) there are still educational, political, and psychological areas that require significant discussion. For example, test security has become a global issue, as psychological tests and even college entrance and graduate school admission tests have found their way online.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21.  21
    Aviation Security and the TSA's Behavior Detection: Why Effective Academic and Practitioner Dialogue Is Vital.Vincent Denault & Louise M. Jupe - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  22.  46
    Social Security Satisfaction and People’s Subjective Wellbeing in China: The Serial Mediation Effect of Social Fairness and Social Trust.Na Li & Mang He - 2022 - Frontiers in Psychology 13.
    ObjectiveTo test the relationship between social security satisfaction, social fairness, social trust, and people’s subjective wellbeing in China and the serial mediation effect in this study.MethodsWe utilized the data from Chinese Social Survey in 2017 and 2019, involving 31 provinces across the country. There were 5,398 samples in 2017CSS and 2,580 samples in 2019CSS selected by the research objectives. There were 4,269 women and 3,709 men with the average age of participants being 43.ResultsThe results showed that the actual status (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  60
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  29
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  25.  25
    Beyond torture: Knowledge and power at the nexus of social science and national security.Joy Rohde - 2022 - History of the Human Sciences 35 (5):7-26.
    In the wake of revelations about the American Psychological Association's complicity in the military's enhanced interrogation program, some psychologists have called upon the association to sever its ties to national security agencies. But psychology's relationship to the military is no short-term fling born of the War on Terror. This article demonstrates that psychology's close relationship to national security agencies and interests has long been a visible and consequential feature of the discipline. Drawing on social scientific debates about (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  1
    Demographic security of Ukraine as a result of understanding and overcoming the demographic crisis: an integrative methodological approach.Adrian Bukovynskyy - 2025 - Filosofiya osvity Philosophy of Education 30 (2):71-82.
    The article «Demographic crisis in Ukraine: an integrative methodological ap­proach to analysis and overcoming» examines one of the biggest social problems of modern Ukraine – the demographic crisis, which is intensifying in the condi­tions of war and socio-economic changes. The author uses an integrative meth­odological approach, which includes analysis from the standpoint of humanistic personalism, psychoanalysis, logotherapy, futurology, androgynous analysis, and a systemic approach, for a comprehensive understanding of the problem and find­ing effective ways to overcome it. The study emphasizes (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  29
    Privacy and Security Issues with Mobile Health Research Applications.Stacey A. Tovino - 2020 - Journal of Law, Medicine and Ethics 48 (S1):154-158.
    This article examines the privacy and security issues associated with mobile application-mediated health research, concentrating in particular on research conducted or participated in by independent scientists, citizen scientists, and patient researchers. Building on other articles in this issue that examine state research laws and state data protection laws as possible sources of privacy and security protections for mobile research participants, this article focuses on the lack of application of federal standards to mobile application-mediated health research. As discussed in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes, Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  29.  37
    Beyond food security: women’s experiences of urban agriculture in Cape Town.David W. Olivier & Lindy Heinecken - 2017 - Agriculture and Human Values 34 (3):743-755.
    Urban agriculture is an important source of food and income throughout Africa. The majority of cultivators on the continent are women who use urban agriculture to provide for their family. Much research on urban agriculture in Africa focuses on the material benefits of urban agriculture for women, but a smaller body of literature considers its social and psychological empowering effects. The present study seeks to contribute to this debate by looking at the ways in which urban agriculture empowers women (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  19
    Justice and Security-based Attachment.Stephanie Collins & Liam Shields - 2025 - Journal of Moral Philosophy:1-35.
    Attachment is deeply important to human life. When one person becomes ‘attached’ to another, their sense of security turns on their emotional, social, and physical engagement with that person. This kind of security-based attachment has been extensively studied in psychology. Yet attachment theory (in the specific sense studied by psychologists) has not received adequate attention in analytic theories of social justice. In this paper, we conceptualize attachment’s nature and value, addressing when and why attachments place justice-based claims on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31. #HerStory: The Psychological Well-Being, Lived Experiences, and Challenges Faced by Female Police Officers.Jayra Blanco, Ella Marie Doloque, Shelwina Ruth Bonifacio, Galilee Jordan Ancheta, Charles Brixter Sotto Evangelista, Janelle Jose, Jericho Balading, Andrea Mae Santiago, Liezl Fulgencio, Christian Dave Francisco & Jhoselle Tus - 2023 - Psychology and Education: A Multidisciplinary Journal 7 (1):20-32.
    Police officers are vital to maintaining security and the continuity of national functions. Thus, Police officers are more exposed to different kinds of psychological concerns. However, a female in this kind of profession, based on various studies, experienced higher levels of stress because of other factors. Further, the primary goal of this study is to investigate the psychological well-being, lived experiences, challenges, and coping mechanisms of female police officers. Employing the Interpretative Phenomenological Analysis, the findings of this (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  30
    Torture Pornopticon: security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes, Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films. Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities, the panopticon remains a dominant paradigm within surveillance studies because it captures essential truths about (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  57
    Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures.John D’Arcy & Anat Hovav - 2008 - Journal of Business Ethics 89 (S1):59-71.
    Research from the fields of criminology and social psychology suggests that the deterrent effect of security countermeasures is not uniform across individuals. In this study, we examine whether certain individual characteristics (i. e., computer self-efficacy) or work arrangement (i. e., virtual status) moderate the influence of security policies, security education, training, and awareness (SETA) program, and computer monitoring on information systems misuse. The results suggest that computer savvy individuals are less deterred by SETA programs and computer monitoring, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  34.  4
    Psychological Perspectives on Pro-environmental Behaviour.Radina Stoyanova, Maria Rartz & Jonko Bushnyashki - 2024 - Filosofiya-Philosophy 33 (4s):168-185.
    Values serve as guiding principles and are typically viewed as determinants of beliefs and behaviour. In the current study we explored the relationships between basic human values, ecological beliefs, and pro-environmental behavior. The present study is oriented towards investigating the connections between basic human values, ecological beliefs and pro-ecological behaviour. The study was conducted on a sample of 551 respondents – Bulgarians, between 13 and 90 years old (X=27.38; SD=13.34). For the purpose of the study, questionnaires were used to measure (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  21
    Torture, Truth and National Security in seneca's Troades.Matthew F. Payne - 2022 - Classical Quarterly 72 (2):719-738.
    This article argues that the encounter between Andromache and Ulysses in Seneca's Troades engages with the genre of declamation to juxtapose two different discourses surrounding torture: one focussed on torture's connection to truth, the other on its connection to tyranny. It describes how the Greek general Ulysses, convinced of the danger of letting the Trojan prince Astyanax live, threatens his mother Andromache with physical torture in order to ascertain the truth of Astyanax's whereabouts. However, Ulysses is countered by Andromache's rhetoric, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. Security with self-reliance: The argument for the Singapore model.X. Lim - 2007 - Ethos: Journal of the Society for Psychological Anthropology 3:35-39.
     
    Export citation  
     
    Bookmark  
  37.  21
    Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.Zahid Maqbool, Palvi Aggarwal, V. S. Chandrasekhar Pammi & Varun Dutt - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  20
    Postscript: Problems With the Security Motivation Model Remain Largely Unresolved: Response to Woody and Szechtman (2005).Steven Taylor, Dean McKay & Jonathan S. Abramowitz - 2005 - Psychological Review 112 (3):656-657.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  23
    The security-seeking impulse and the unification of attachment and culture.Paul S. Strand - 2020 - Psychological Review 127 (5):778-791.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  25
    Use of Official Data of State Institutions in the Scientific Research of the Population Security.Vidmantas Egidijus Kurapka & Viktoras Justickis - 2010 - Jurisprudencija: Mokslo darbu žurnalas 121 (3):283-294.
    The paper discusses the problems in the detection of security information in legal and other administrative data. The authors analyse the prospects of the use of datamining in the solution of two key problems: abundance and indirectness of these data. Security research uses two kinds of data. The first one is scientific data, designed and gathered specially for the verification of certain security theories. They are the data of criminological, sociological, psychological surveys, experimental data, etc. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41. Autonomous Weapons Systems, the Frame Problem and Computer Security.Michał Klincewicz - 2015 - Journal of Military Ethics 14 (2):162-176.
    Unlike human soldiers, autonomous weapons systems are unaffected by psychological factors that would cause them to act outside the chain of command. This is a compelling moral justification for their development and eventual deployment in war. To achieve this level of sophistication, the software that runs AWS will have to first solve two problems: the frame problem and the representation problem. Solutions to these problems will inevitably involve complex software. Complex software will create security risks and will make (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  42.  16
    Attachment Security in Infancy: A Preliminary Study of Prospective Links to Brain Morphometry in Late Childhood.Élizabel Leblanc, Fanny Dégeilh, Véronique Daneault, Miriam H. Beauchamp & Annie Bernier - 2017 - Frontiers in Psychology 8.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43.  30
    Computer Security Incident Response Team Effectiveness: A Needs Assessment.Rick Van der Kleij, Geert Kleinhuis & Heather Young - 2017 - Frontiers in Psychology 8.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  44.  26
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  9
    Well-Designed Food Governance as Psychological Mechanism of Consumer Perceptions in the Context of Tourism Poverty Alleviation.Guo-Qing Huang & Kuen-Lin Lin - 2021 - Frontiers in Psychology 11.
    Poverty is a challenge leading to food insecurity in people's minds. This article discusses food governance as a psychological mechanism to facilitate the sense of wellness in people's minds in the context of tourism poverty alleviation. Mainly, we argue that, when a government is implementing tourism poverty alleviation, not only are economic efforts, but also positive psychological feelings are required. We, thus, argue that sound food governance may increase the sense of wellness in the minds of people as (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  51
    Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model.Sophie Baeriswyl, Andreas Krause & Adrian Schwaninger - 2016 - Frontiers in Psychology 7:191272.
    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  47.  6
    Imperceptibility of children’s war trauma: analysing attachment, loss, and security in The Journey.Ramya Jayaram Paleri & Vinata Sai - forthcoming - Journal for Cultural Research:1-11.
    This research applies John Bowlby’s (1958–63) attachment theory to analyse child–parent relationships associated with loss and security in the children’s picture book, The Journey (2016) by Francesca Sanna, to examine children’s war trauma through attachment styles. Furthermore, Hong et al.’s (2013) cultural attachment theory is employed to explore the story representation of the children’s relationship with their culture. Amnesty International UK endorses the picture book to teach children about the hardships of refugees and asylum seekers. However, children’s literature often (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  11
    The Psychology of Strategic Terrorism: Public and Government Responses to Attack.Ben Sheppard - 2008 - Routledge.
    This new volume explores terrorism and strategic terror, examining how the public responds to terrorist attacks, and what authorities can do in such situations. The book uses a unique interdisciplinary approach, which combines the behavioural sciences and international relations, in order to further the understanding of the 'terror' generated by strategic terror. The work examines five contemporary case studies of the psychological and behavioural effects of strategic terror, from either terrorist attacks or aerial bombardment. It also looks at how (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  49.  20
    Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI.C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle & Jeffrey L. Jenkins - 2020 - Frontiers in Psychology 11.
    Computer users are often the last line of defense in computer security. However, with repeated exposures to system messages and computer security warnings, neural and behavioral responses show evidence of habituation. Habituation has been demonstrated at a neural level as repetition suppression where responses are attenuated with subsequent repetitions. In the brain, repetition suppression to visual stimuli has been demonstrated in multiple cortical areas, including the occipital lobe and medial temporal lobe. Prior research into the repetition suppression effect (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  59
    Multiple methods in psychology: Epistemological grounding and the possibility of unity.Frederick J. Wertz - 1999 - Journal of Theoretical and Philosophical Psychology 19 (2):131-166.
    The problem of methodological pluralism in psychology is addressed. The dominant paradigm, in which experimental methods are assigned top priority and quantification is preferred over qualitative methods, is no longer tenable in light of criticisms by philosophers of science and psychologists. The emergence of a panoply of alternative methods is reviewed and the problems of constructionism, eclecticism, and fragmentation are delineated. Solutions based on an indigenous epistemological foundation for psychology are sought in Continental philosophy. The commensurability of experimental, psychoanalytic, and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 978