نتایج جستجو برای: horneyan defensive strategies
تعداد نتایج: 395881 فیلتر نتایج به سال:
OBJECTIVE There has been little research on the prevalence of defensive practice within hospital settings. The aim of this report was to examine the extent of defensiveness among psychiatrists and to examine the relationship between defensiveness and seniority, as well as the effect of previous experiences on the level of defensiveness. DESIGN A postal questionnaire survey on defensive practi...
Background. To cope with their natural enemies, plants rely on resistance and tolerance as defensive strategies. Evolution of these strategies among natural population can be constrained by the absence of genetic variation or because of the antagonistic genetic correlation (trade-off) between them. Also, since plant defenses are integrated by several traits, it has been suggested that trade-off...
During the 2017 NBA playoffs, Celtics coach Brad Stevens was faced with a difficult decision when defending against the Cavaliers: ``Do you double and risk giving up easy shots, or stay at home and do the best you can?"1 It's a tough call, but finding a good defensive strategy that effectively incorporates doubling can make all the difference in the NBA. In this paper, we analyze double teaming...
This study established the psychometric properties of a child and adolescent version of the Horney-Coolidge Tridimensional Inventory (HCTI), which assesses psychoanalyst Karen Horney's theory of neurotic types. Parents of 302 children (ages 5 to 17 years; median age = 12.0 years) completed the new 45-item version of the HCTI and the Coolidge Personality and Neuropsychological Inventory (CPNI) a...
Allocation of construction risks between clients and their contractors has a significant impact on the total construction costs. This paper presents a system dynamics (SD)-based approach for quantitative risk allocation. Using the proposed SD based approach, all the factors affecting the risk allocation process are modeled. The contractor’s defensive strategies against the one-sided risk alloca...
We need to change our approach to cyber defense if we are to succeed. We must deeply understand our adversaries, develop effective defensive strategies that will stand the test of time and evolution, and create a new discipline to make this happen. Here is how we start.
By predisposing to ego-defensive strategies in social situations, a negative attachment history may promote embitterment. The present study identified attachment anxiety - more than attachment avoidance - as a possible vulnerability factor for the development and maintenance of embitterment. This factor should be considered in theories and in interventions of embitterment.
The past literature indicates that performance is disrupted for defensive pessimists by encouragement. The goals of this research were to replicate this phenomenon, and then examine the mechanisms underlying it. Specifically, does the encouragement alleviate the anxiety defensive pessimists harness, and thus leave them unmotivated, or does it increase the pressure to perform well and make them ...
We review the current strategies to counter Internet threats under the light of the classic strategy literature. The literature often advocates proactive action, and dominance of the (virtual, in our case) battlefield, which is the opposite from what we see defenders deploy today. Their actions are instead reactive and exclusively defensive. We propose strategies for defenders to regain the ini...
A defensive alliance in a graph is a set $S$ of vertices with the property that every vertex in $S$ has at most one moreneighbor outside of $S$ than it has inside of $S$. A defensive alliance $S$ is called global if it forms a dominating set. The global defensive alliance number of a graph $G$ is the minimum cardinality of a global defensive alliance in $G$. In this article we study the global ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید