Identity-Goal Threats

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-Goal Threats: Engaging in Distinct Compensatory Efforts

We hypothesized that threatening self-aspects that pertain to an identity specified in a binding identity goal leads to distinct compensation (i.e., self-symbolizing), whereas threatening self-aspects not specified in a binding identity goal leads to general selfworth restoration. To test this hypothesis, participants with either weak or strong commitments to becoming lawyers were subjected to ...

متن کامل

Goal threats, temperature and Monte-Carlo Go

Keeping the initiative, i.e. playing sente moves, is important in the game of Go. This paper presents a search algorithm for verifying that reaching a goal is sente on another goal. It also presents how goals are evaluated. The evaluations of the goals are based on statistics performed on almost random games. Related goals, such as goals and associated threatened goals, are linked together to f...

متن کامل

Threats to Feminist Identity and Reactions to Gender Discrimination

The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was con...

متن کامل

Addressing Threats to Real-World Identity Management Systems

Recent practical studies have revealed that, in practice, widely used identity management schemes such as OAuth 2.0 and OpenID Connect are often poorly implemented by relying parties, and as a result very serious vulnerabilities can result. In any event, any system relying on browser redirections, as is the case for OAuth 2.0 and OpenID Connect, is vulnerable to web-spoofing and phishing attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Social Psychological and Personality Science

سال: 2013

ISSN: 1948-5506,1948-5514

DOI: 10.1177/1948550612471143