نتایج جستجو برای: tendency to trust

تعداد نتایج: 10629200  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1393

امروزه مسئله ی اساسی در رویکرد های جدید زبانشناسی، ابعاد اجتماعی و ایدئولوژیک زبان تلقی می شود. گروه های مختلف اجتماعی، سیاسی و یا مذهبی از زبان به عنوان ابزاری برای دستیابی به اهداف درون گروهی خود استفاده می کنند (ون دایک، 2003). آنها معولا ایدئولوژی خود را صریحا ابراز نمی کنند بلکه آن را در غالب کلمات و ساختارهای زبانی پنهان نگه می دارند. تشخیص ایدئولوژی های پنهان در گفتمان نیازمند این موضوع ...

Journal: :health, spirituality and medical ethics journal 0
fatemeh sharif mousavi islamic azad university, neyshabur bagher ghobari bonab islamic azad university, neyshabur javad pour karimi islamic azad university, neyshabur mahsa rashidi islamic azad university, neyshabur

introduction: in light of the importance of mental health in today life, attending to mental health of the youth to pave the way for a better future is of paramount importance. various factors can influence mental health, one of which is the quality of attachment to and trust in god. the aim of this paper was to examine the capability of this quality so as to predict the mental health of tehran...

Journal: :Journal of Behavioral and Experimental Economics 2016

Journal: :Social cognitive and affective neuroscience 2014
Anne-Kathrin J Fett Paula M Gromann Vincent Giampietro Sukhi S Shergill Lydia Krabbendam

The tendency to trust and to cooperate increases from adolescence to adulthood. This social development has been associated with improved mentalizing and age-related changes in brain function. Thus far, there is limited imaging data investigating these associations. We used two trust games with a trustworthy and an unfair partner to explore the brain mechanisms underlying trust and cooperation ...

Journal: :Social security bulletin 1997
J C Hennessey

Congress is currently placing considerable emphasis on returning disabled-worker beneficiaries to work. However, going back to work is only the first step in the complex process of program termination due to work and trust fund savings. Not only must the beneficiary get a job, but also the work effort must be sustained at what is considered a substantial gainful activity (SGA) level by the disa...

Journal: :Current Biology 2016
Jan M. Engelmann Esther Herrmann

The identification and recruitment of trustworthy partners represents an important adaptive challenge for any species that relies heavily on cooperation [1, 2]. From an evolutionary perspective, trust is difficult to account for as it involves, by definition, a risk of non-reciprocation and defection by cheaters [3, 4]. One solution for this problem is to form close emotional bonds, i.e., frien...

2016
Xin Wang Ying Wang Hongbin Sun

In social media, trust and distrust among users are important factors in helping users make decisions, dissect information, and receive recommendations. However, the sparsity and imbalance of social relations bring great difficulties and challenges in predicting trust and distrust. Meanwhile, there are numerous inducing factors to determine trust and distrust relations. The relationship among i...

Journal: :international journal of agricultural management and development 2012
mohammad kavoosi kalashami morteza heydari houman kazerani

health and safety are important factors in today’s life. most of studies show that consuming the chicken that has anti biotic caused different diseases like digestive vessel cancer. attention to controlled use of antibiotics can play a key role in society health which considered in the production of green chicken. planning for increasing the production of mentioned chicken needs the investigati...

2009
Martin Serrano Sven van der Meer John Strassner Stefano De Paoli Aphra Kerr Cristiano Storni

Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید