نتایج جستجو برای: deterrence and securing social defense

تعداد نتایج: 16953888  

2005
S. J. Brams Alan D. Taylor

Applications of game theory—and an alternative strategic theory called “theory of moves”—as well as social-choice theory to a wide variety of strategic situations, principally but not exclusively in politics, will be examined. Uses of strategy in voting in committees and elections, in political campaigns, in the defense and deterrence policies of nations, and in bargaining and coalition-buildin...

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده ادبیات و زبانهای خارجی 1393

abstract this mixed method study examines whether there is any relationship among the variables of the study (job satisfaction, social capital and motivation). the researcher considered job satisfaction and social capital as independent variables; motivation is the dependent variable of the study. the researcher applied a questionnaire to assess each variable. to measure efl teachers’ job sati...

2009
Alvaro A. Cárdenas Saurabh Amin Bruno Sinopoli Annarita Giani Adrian Perrig Shankar Sastry

We discuss three key challenges for securing cyberphysical systems: (1) understanding the threats, and possible consequences of attacks, (2) identifying the unique properties of cyber-physical systems and their differences from traditional IT security, and (3) discussing security mechanisms applicable to cyber-physical systems. In particular, we analyze security mechanisms for: prevention, dete...

Journal: :Law and human behavior 2004
Michael Wenzel

In a survey of Australian citizens (valid N = 1,406), personal and social norms were found to moderate effects of deterrence on tax evasion. Personal, internalized norms of tax honesty were negatively related to tax evasion and moderated the effects of deterrence variables (i.e., sanction severity), suggesting deterrence effects only when individual ethics were weak. Perceived social norms, bey...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده زبانهای خارجی 1391

the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...

2010
Raymond Paternoster RAYMOND PATERNOSTER

This Article discusses the deterrence of crime through sanctions. It begins with a brief intellectual history of deterrence theory in the work of Cesare Beccaria and Jeremy Bentham, two Enlightenment philosophers who created the conceptual foundation for later deterrence and rational choice theory. Although a prominent intellectual current by the end of the 1700s, interest in deterrence and rat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1389

this study investigates the strategies native english and persian speakers employ for expressing gratitude in different situations. the strategies of persian efl learners are also compared with english strategies in order to find the differences that may exist between these two languages. social status and size of imposition of the favor are social variables which are investigated in detail for...

Journal: :Information & Management 2004
Sang M. Lee Sang-Gun Lee Sangjin Yoo

In spite of continuous organizational efforts and investments, computer abuse shows no sign of decline. According to social control theory (SCT), ‘‘organizational trust’’ can help prevent it by enhancing insiders’ involvement in computer abuse. The aim of our study was to develop a new integrative model for analyzing computer abuse through assessing the role of Self Defense Intention (SDI) and ...

Journal: :Ethics & International Affairs 2023

Abstract Any threat to use nuclear weapons inherently carries the possibility of escalation a level such that both parties in conflict, and likely many others, would be destroyed. Yet are also seen as necessary for securing very things destroyed if were ever used. The fix this dilemma relies on strategy deterrence. Deterrence provides rationale why necessary, even though they may seem dangerous...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید