نتایج جستجو برای: emotional security

تعداد نتایج: 283587  

Journal: :practice in clinical psychology 0
بنفشه حسنوند banafsheh hasanvand university of social welfare & rehabilitation sciencesدانشگاه علوم بهزیستی و توانبخشی علیرضا محمدی آریا ali reza mohammadi arya university of social welfare & rehabilitation sciencesدانشگاه علوم بهزیستی و توانبخشی ابراهیم رضایی دوگاهه ebrahim rezaei dogaheh department of clinical psychology, university of social welfare and rehabilitation sciences, tehran, iran.دانشگاه علوم بهزیستی و توانبخشی

objective: psychological hardiness is a protective personality structure against life stresses that plays a major role in resisting stressful events. thus, the present research aimed to predict the psychological hardiness based on mental health and emotional intelligence in students. methods: the method applied in the research was a descriptive-correlation type. a total of 348 students of payam...

Journal: :E3S web of conferences 2023

In emergency situations, it is important to maintain the spiritual and mental integrity of population. To do this, create a sense safety security within population while also providing emotional support guidance. This can be done through access health services, guidance, offering activities, resources such as crisis hotlines.

2013
S. Elahi A. Shayan

According to the developments in the businesses, organizations are dependent to information technology more than ever. Such dependency is followed by its own information security risk. On the other hand, the dependency of such organizations with information is also followed with the increase in information exchanges and electronic interactions. Specialists in information security governance hav...

2011
Arnar Birgisson Frank McSherry Martı́n Abadi

We investigate the integration of two approaches to information security: information flow analysis, in which the dependence between secret inputs and public outputs is tracked through a program, and differential privacy, in which a weak dependence between input and output is permitted but provided only through a relatively small set of known differentially private primitives. We find that info...

2015
Katherine L. Rosenblum Ann Arbor Carolyn Joy Dayton Susan McDonough

In the present chapter we explore how mothers' internal working models of their seven-month-old infants organize emotions in the parenting context, and ultimately, influence infant emotion regulation. We propose that mothers' internal working models of their infants function as emotion regulators, and influence a variety of components of the affective organization of parenting, including a) mat...

Journal: :Inf. Manag. Comput. Security 2014
Iwan Gulenko

Purpose – This paper aims to study the influence of emotions on security behaviour by reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature. Researchers in ISS study how tomotivate people to adhere to security policies; theymainly focus on cognitive models such as the technology acceptance model (Davis, 1985), innovation diffusion theory (Brancheau and Wethe...

Journal: :Innovation: The European Journal Of Social Science Research 2021

The salience of security concerns has dramatically increased across Europe and a growing body research converges on their acknowledgement as contributing factors to populist success. As the empirical focus existing is right negative emotionality, this paper questions what extent populism-(in)security nexus indeed distinctive predominantly underpinned by fear-based appeals. By adopting novel typ...

2001
Sarah Brooks

This paper examines the political economy of structural social security reformthe shift from a publicly managed, pay-as-you-go, defined benefit system to one that includes a defined contribution, funded, privately managed pillar. We analyze the connection between the preexisting conditions in a country and the reforms that are likely to succeed and describe some of the strategies that policy-m...

2015
B. Chaitanya Krishna Tai-hoon Kim

Today major issue in IT Sector is security, now a day in every field software products are using at the same time users are struggles for their information and data security. Normally software engineers developed good software and test the all aspects and deliver to the user but they cannot bother about minuet problems because they think that those problems cannot impact the product output. But...

2013
Tomas ZELINKA Miroslav SVITEK Zdenek LOKAJ Martin SROTYR

Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data ser...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید