نتایج جستجو برای: threat
تعداد نتایج: 52909 فیلتر نتایج به سال:
During the latter half of the 20 century American policing became more professional (Skogan & Frydl, 2004) and the rate of violent crime declined dramatically (Blumstein & Wallman, 2000). Yet public trust and confidence in the police increased at best marginally and there has been a large and continuing racial gap in police legitimacy. This article reviews changes in police policy and practice ...
This study aims to further investigate the Unconscious Thought Theory (UTT, Dijksterhuis & Nordgren, 2006), namely whether individual differences account for differences in choice made after either deliberation (conscious thought, CT) or distraction (unconscious thought, UT). Also, subjective weighting was considered and choice options were constructed following individual preferences, hence av...
A deep economic crisis started in Italy in 2008 leading to a reduction of general household consumptions, especially in the oral health care sector. The dental sector is characterized by the almost exclusively private nature of the services offered outside the INHS, thus taking the form of a demand-driven sector. The paper focuses on Italian dentists’ perception of the economic crisis. It prese...
Aguirre-Urreta and Marakas (A&M) suggest in their simulation “Revisiting Bias Due to Construct Misspecification: Different Results from Considering Coefficients in Standardized Form,” that, like Jarvis et al. (2003), MacKenzie et al. (2005), and Petter et al. (2007) before them, bias does occur when formative constructs are misspecified as reflective. But A&M argue that the level of bias in pri...
Analyzing historical cases of insider crimes to identify patterns or specific indicators of attack is a challenging task, particularly when using large volumes of free-text input sources, such as court documents and media reports. In this workshop paper, we offer a new process for processing, or coding, free-text descriptions of insider crimes for future analysis; specifically, we study cases o...
To evaluate the suitability of C++ for safety-critical applications [Bin95] and to formulate guidelines for its use in these, the concept of a safety-critical application must first be defined. A safety-critical application [HIS99, Saf00] is one where failure to stay within the bounds of safe operation leads to unacceptable results. Unacceptable results are those which pose a threat to human li...
Risk of a given threat is a function of the likelihood of exercising the threat and the severity of its impacts. This paper proposes incorporating attacker capabilities and motivations in estimating the likelihood of exercising threats. Attacker capability is the ability to use appropriate means (e.g., knowledge, time, expertise, and tools) and opportunity (e.g., enough time to perform the atta...
Can socioeconomic status in childhood influence desire for health coverage in adulthood? We develop and test a model that yielded two sets of findings across five experiments. First, people who grew up poor were generally less interested in health coverage compared to those who grew up wealthy. This effect was independent of people’s current level of socioeconomic status, emerged most strongly ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید