Academic literature on the topic 'Threat Value'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat Value.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threat Value"
Rowley, Liv. "The value of threat intelligence." Computer Fraud & Security 2019, no. 10 (October 2019): 20. http://dx.doi.org/10.1016/s1361-3723(19)30109-5.
Full textPalmer, T. E. A. "Electronic Publishing: Value or Threat?" Anaesthesia and Intensive Care 28, no. 4 (August 2000): 361. http://dx.doi.org/10.1177/0310057x0002800402.
Full textDjupe, Paul A., and Brian R. Calfano. "Religious Value Priming, Threat, and Political Tolerance." Political Research Quarterly 66, no. 4 (December 26, 2012): 768–80. http://dx.doi.org/10.1177/1065912912471203.
Full textStephan, Cookie White, Walter G. Stephan, Katherine M. Demitrakis, Ann Marie Yamada, and Dennis L. Clason. "Women's Attitudes Toward Men: an Integrated Threat Theory Approach." Psychology of Women Quarterly 24, no. 1 (March 2000): 63–73. http://dx.doi.org/10.1111/j.1471-6402.2000.tb01022.x.
Full textKim, Andy, and Brian Anderson. "Value-Driven Attentional Capture Under Threat of Shock." Journal of Vision 18, no. 10 (September 1, 2018): 1252. http://dx.doi.org/10.1167/18.10.1252.
Full textRoy, Yanina, Nataliia Mazur, and Olena Riabchun. "STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY." Cybersecurity: Education, Science, Technique, no. 3 (2019): 97–103. http://dx.doi.org/10.28925/2663-4023.2019.3.97103.
Full textHolmes IV, Oscar, Marilyn V. Whitman, Kim S. Campbell, and Diane E. Johnson. "Exploring the social identity threat response framework." Equality, Diversity and Inclusion: An International Journal 35, no. 3 (April 18, 2016): 205–20. http://dx.doi.org/10.1108/edi-08-2015-0068.
Full textBender, Jens, Tobias Rothmund, Peter Nauroth, and Mario Gollwitzer. "How Moral Threat Shapes Laypersons’ Engagement With Science." Personality and Social Psychology Bulletin 42, no. 12 (November 17, 2016): 1723–35. http://dx.doi.org/10.1177/0146167216671518.
Full textZhong, Ming, RenNong Yang, Jun Wu, and Huan Zhang. "Multi-Target Strike Path Planning Based on Improved Decomposition Evolutionary Algorithm." Mathematical Problems in Engineering 2019 (January 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/7205154.
Full textMayton, Daniel. "Value Priority Differences across Levels of Nuclear Threat Concern." Journal of Social Psychology 132, no. 4 (August 1, 1992): 539–41. http://dx.doi.org/10.1080/00224545.1992.9924733.
Full textDissertations / Theses on the topic "Threat Value"
Noseworthy, Elizabeth Jessie Carleton University Dissertation Linguistics and Applied Language Studies. "English in Mexico: EFL teachers' perceptions of the value, the threat and ELT." Ottawa, 1995.
Find full textAkst, Lesley M. "Perceived value threat as a predictor of discrimination toward homosexuals within the legal context." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0014/MQ42118.pdf.
Full textGrigoropoulou, Nikolitsa. "Our Own and the Others: What Happens to Perceptions of Immigrant Threat when Value Priorities Collide?" Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609152/.
Full textSitniece, Katrīna Marija. "The Power of Values in Determining Interstate Threat Perception." Thesis, Uppsala universitet, Institutionen för freds- och konfliktforskning, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-445527.
Full textBeauchamp, Alexandra L. "The Value in Science: Perceptions of Religiosity Influence Trust of Scientists." Ohio University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1530543806752117.
Full textLindersson, Carl. "Threatening Measures, at Face Value : Electrophysiology Indicating Confounds of the Facial Width-to-Height Ratio." Thesis, Högskolan i Skövde, Institutionen för biovetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17350.
Full textSyed, Romilla. "DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3906.
Full textLeite, Juliana Valeria 1977. "Prognostic value of the blinking reflex to visual threat in comatous patients = Valor prognóstico do reflexo de piscar à ameaça visual em pacientes comatosos." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/313507.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Ciências Médicas
Made available in DSpace on 2018-08-23T19:15:40Z (GMT). No. of bitstreams: 1 Leite_JulianaValeria_M.pdf: 641050 bytes, checksum: b62398f140661279efb6ea212dc9afcf (MD5) Previous issue date: 2013
Resumo: A avaliação do nível de consciência faz parte da rotina da equipe multiprofissional que conduz pacientes em coma. Sinais que possam representar a melhora do nível de consciência destes pacientes são constantemente buscados. Atualmente sabe-se que alguns fatores, como por exemplo, a resposta motora na escala de coma de Glasgow (ECG) e a apresentação do reflexo fotomotor apresentam valor prognóstico, porém nenhum deles é relacionado diretamente ao despertar destes pacientes. O objetivo deste estudo foi o de relacionar a presença do reflexo de piscar à ameaça visual (RPAV), com o despertar de pacientes comatosos e evidenciar o seu valor prognóstico. Para tanto foi feito um estudo retrospectivo com os dados obtidos em prontuários do serviço de arquivos médicos do Hospital das Clínicas da Universidade Estadual de Campinas (HC-UNICAMP) de pacientes internados nas enfermarias de neurologia clinica e neurocirurgia entre os períodos de abril de 2005 a abril de 2010. Foram selecionados 975 prontuários correspondentes ao diagnóstico de traumatismo cranioencefálico e acidente vascular encefálico. Destes, foram selecionados 119 prontuários de pacientes que se enquadraram nos critérios de inclusão representados pela resposta motora menor ou igual a quatro na ECG na admissão hospitalar e a descrição do RPAV durante o período de internação sendo excluídos os pacientes com resposta motora na admissão hospitalar superior a quatro, que não apresentassem a descrição da avaliação do RPAV ou que tivessem patologias neurológicas associadas às mencionadas como fator de seleção para os prontuários. Foram analisados os dados relativos ao sexo, diagnóstico clínico, resposta motora isolada e ao Glasgow total na admissão e alta hospitalar, a apresentação do RPAV durante o período de internação e a evolução clínica do paciente que foi representada pelo despertar, traduzido pela resposta motora seis ou cinco na ECG, evolução ao estado vegetativo persistente e óbito. A análise estatística demonstrou através da análise de regressão logística univariada e multivariada com critério Stepwise de seleção de variáveis uma associação entre a apresentação positiva do RPAV durante o período de internação e o despertar dos pacientes estudados (p<0.001). Todos os 51 pacientes que apresentaram o reflexo despertaram enquanto os pacientes que não apresentaram o reflexo não despertaram, evoluindo ao estado vegetativo persistente (24 pacientes) ou ao óbito (44 pacientes). Os pacientes que apresentaram o reflexo positivo durante o período de internação apresentaram uma maior possibilidade de despertar (11.685.00 vezes maior) dos que não o apresentaram adotando-se o nível de significância para os testes estatísticos de 5%, ou seja, p<0.05. O presente estudo demonstrou que o RPAV apresenta valor prognostico, estando sua apresentação positiva diretamente associada ao despertar destes pacientes
Abstract: The level of consciousness assessment is part of the hospital routine in comatose patients. Signs that may indicate cognitive improvement in these patients are constantly searched. Nowadays it is kwon that some features represent prognostic value, however, none relates directly with awakening in coma patients. The main purpose of this study was to associate the presence of the blinking reflex as a response to a visual threat with awakening in coma patients. We reviewed medical records from University of Campinas Clinical Hospital from patients diagnosed with stroke and traumatic brain injury (TBI) who stayed in the hospital neurological ward from April 2005 to April 2010. We reviewed 975 medical records. 119 patients were included; on admission they presented a score four or less for motor response in Glasgow Coma Scale (GCS) and description RPVA during hospitalization, being excluded patients with diagnoses other than those cited and motor response at admission more than four, which did not present the description of the assessment the blinking reflex or had neurological pathologies associated with those mentioned as selection factor for records. We gathered information from the charts regarding sex, disease, GCS total score, GCS motor score on admission and discharge, the presence or absence of the blinking reflex and level of consciousness on discharge, characterized as awakening, persistent vegetative state or death. Statistical analysis demonstrated through the analysis of univariate and multivariate logistic regression with stepwise selection criterion variables of a direct association between a positive blinking reflex of to visual threat during the period of hospitalization awakening in our cohort (p<0.001) . All the 51 patients with a positive reflex awoke, while patients with a negative reflex don't awakening evolved to persistent vegetative state (24) or death (44). A positive blinking reflex to visual threat during hospitalization increases the chance of awakening by 11.685.00 times when compared with patients with a negative reflex. The blinking reflex as a response to a threat has great prognostic value while its positivity is directly associated with awakening in coma patients
Mestrado
Ciencias Biomedicas
Mestra em Ciências Médicas
Shabir, Asim. "Supersizing : a financial saving or threat to consumer health : the moderating role of nutritional labels." Electronic Thesis or Diss., Aix-Marseille, 2019. http://theses.univ-amu.fr.lama.univ-amu.fr/191125_SHABIR_168p658wo433wo325yrsqlh_TH.pdf.
Full textThis dissertation adopted a mixed-method approach based on qualitative and quantitative studies. The qualitative exploratory research examined the antecedents and consequences behind the purchase of supersized food products. Our findings from the qualitative study suggest that consumers’ choice of upsized food is inspired by several antecedents such as price quantity trade-off, hunger, likeness, and social influence. Besides, the acquisition of a larger food container also results in some inevitable consequences, which appear in the form of financial saving, health concerns, food waste, guilt, and satisfaction. Our qualitative study led the foundation for quantitative research to further examine the role of supersized pricing.The quantitative study demonstrated that such pricing strategies not only cause consumers to purchase and consume more but at the same time influence their crucial goals in distinct domains, expressly, by diminishing the importance of health goals and decreasing the anticipated consumption guilt which is often associated with hedonic foods. The supersized pricing is influential in affecting the buying behavior of consumers; however, the carefully designed nutritional labels containing the nutritional information related to the whole portion can refrain them from diminished health focus and increase their feelings of guilt for hedonic food. Moreover, supersized pricing can also be used to enhance the size choice of healthy food.This dissertation contributes to the existing literature on supersizing, consumption guilt, and nutritional labeling in light of the Means-End theory and TCR. It also discusses the marketing and public policy implications
Webber, David. "The motivating influence of death are individual differences in death-thought accessibility and defensive behavior related? /." Laramie, Wyo. : University of Wyoming, 2009. http://proquest.umi.com/pqdweb?did=1939351871&sid=1&Fmt=2&clientId=18949&RQT=309&VName=PQD.
Full textBooks on the topic "Threat Value"
Bellow, Adam. New threats to freedom. West Conshohocken, PA: Templeton Press, 2010.
Find full textBok, Sissela. A strategy for peace: Human values and the threat of war. New York: Pantheon Books, 1989.
Find full textA strategy for peace: Human values and the threat of war. New York: Pantheon Books, 1989.
Find full textBok, Sissela. A strategy for peace: Human values and the threat of war. New York: Vintage Books, 1990.
Find full textRisk monetization: Converting threats and opportunities into impact on project value. Boca Raton, FL: CRC Press, 2012.
Find full textKoller, Glenn R. Risk monetization: Converting threats and opportunities into impact on project value. Boca Raton, FL: CRC Press, 2012.
Find full textValues and stakeholders in an era of social responsibility: Cut-throat competition? Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2011.
Find full textComputer-generated 3D-visualisations in archaeology: Between added value and deception. Oxford: Archaeopress, 2013.
Find full text1955-, Thompson Dougal, ed. Values at work: The invisible threads between people, performance and profit. Auckland, N.Z: HarperBusiness, 2003.
Find full textKukukina, Irina, and Irina Astrahanceva. Accounting and analysis of bankruptcies. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/949490.
Full textBook chapters on the topic "Threat Value"
Owusu Yeboah, Adwoa Yeboaa, Michael Adu Kwarteng, and Petr Novak. "Value Creation Through Social Media Marketing: A Threat to Sustainability Performance?" In Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation, 475–86. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64861-9_42.
Full textBerndt, Anzel, and Jacques Ophoff. "Exploring the Value of a Cyber Threat Intelligence Function in an Organization." In Information Security Education. Information Security in Action, 96–109. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2_7.
Full textLiu, Yan, Hao Li, and Zhi Liu. "Real-Time Coverage Path Planning of a UAV with Threat and Value Zone Constraints." In Lecture Notes in Electrical Engineering, 840–48. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8450-3_87.
Full textGuha Roy, S. "Phytophthora: A Member of the Sixth Kingdom Revisited as a Threat to Food Security in the Twenty-First Century." In Value Addition of Horticultural Crops: Recent Trends and Future Directions, 325–37. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2262-0_19.
Full textWang, Wen-Fang. "Three-Valued Plurivaluationism of Vague Predicates." In Logic, Rationality, and Interaction, 379–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48561-3_31.
Full textBlanco, Gerardo L. "Higher Education and the Enduring Value of Hospitality: Reflections for the 21st Century." In The Promise of Higher Education, 175–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67245-4_27.
Full textClark, Mark E. "The Future: A Search for Values." In Ariadne’s Thread, 3–27. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-20077-1_1.
Full textSubramanian, S. "Three themes in economics." In Present Values, 13–20. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge India, 2020. http://dx.doi.org/10.4324/9781003050322-5.
Full textMorgan, Charles G. "Two Values, Three Values, Many Values, No Values." In Beyond Two: Theory and Applications of Multiple-Valued Logic, 349–74. Heidelberg: Physica-Verlag HD, 2003. http://dx.doi.org/10.1007/978-3-7908-1769-0_16.
Full textMcNair, Brian. "From Deep Throat to Don Jon: The Pornographication of Cinematic Entertainment." In Entertainment Values, 251–67. London: Palgrave Macmillan UK, 2017. http://dx.doi.org/10.1057/978-1-137-47290-8_16.
Full textConference papers on the topic "Threat Value"
Chen, Yue, Barry Boehm, and Luke Sheppard. "Value Driven Security Threat Modeling Based on Attack Path Analysis." In Proceedings of the 40th Annual Hawaii International Conference on System Sciences. IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.601.
Full textChen, Yue. "Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems." In 29th International Conference on Software Engineering. IEEE, 2007. http://dx.doi.org/10.1109/icsecompanion.2007.69.
Full textFranqueira, Virginia N. L., Roel Wieringa, and Pascal van Eck. "External Insider Threat: A Real Security Challenge in Enterprise Value Webs." In Fifth International Conference on Availability, Reliability, and Security (ARES 2010). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.40.
Full textGreitzer, Frank, Justin Purl, D. E. (Sunny) Becker, Paul Sticha, and Yung Mei Leong. "Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2019. http://dx.doi.org/10.24251/hicss.2019.387.
Full textXie, Weiqiang, Xiao Yu, Yuqing Zhang, and He Wang. "An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020. http://dx.doi.org/10.1109/infocomwkshps50562.2020.9162739.
Full textPeterlin, Judita, and Vlado Dimovski. "Are Meetings Our Collective Value: Multiple Intelligent Approach to Leading Meetings: Matter od Strategy, Not Only Operation?" In Values, Competencies and Changes in Organizations. University of Maribor Press, 2021. http://dx.doi.org/10.18690/978-961-286-442-2.50.
Full textRobinson, Clive G., Zoë E. Wattis, Colin Dooley, and Sladjana Popovic. "Assessment of the Threat From Wildfires on Above Ground Natural Gas Facilities." In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78059.
Full textUdović, Ugo. "Application of Business Intelligence in the Post-Industrial Period." In Values, Competencies and Changes in Organizations. University of Maribor Press, 2021. http://dx.doi.org/10.18690/978-961-286-442-2.70.
Full textHaskett, William. "Four Simple Questions: Decision-Centered Risk and Project Management." In SPE Annual Technical Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/205848-ms.
Full textLiu, Guanlan, Francois Ayello, Jiana Zhang, and Peter Stephens. "The Application of Bayesian Network Threat Model for Corrosion Assessment of Pipeline in Design Stage." In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78388.
Full textReports on the topic "Threat Value"
Dahl, Gordon, and Matthew Knepper. Why is Workplace Sexual Harassment Underreported? The Value of Outside Options Amid the Threat of Retaliation. Cambridge, MA: National Bureau of Economic Research, September 2021. http://dx.doi.org/10.3386/w29248.
Full textStacey, Marcela R., James G. Arendts, Ray A. Berry, Gary E. Korth, and Paul R. Schwieder. Eaton Throat-Valve Element Modifications Preliminary Report. Fort Belvoir, VA: Defense Technical Information Center, July 1995. http://dx.doi.org/10.21236/ada299173.
Full textStacey, M. R., J. G. Arendts, R. A. Berry, G. E. Korth, P. R. Schwieder, J. P. Sekot, and S. D. Snow. Eaton Throat-Valve Element prototype concept. Phase 1. Office of Scientific and Technical Information (OSTI), December 1993. http://dx.doi.org/10.2172/10167496.
Full textSteele, R. Jr, J. C. Watkins, and K. G. DeWall. Methods for determining atypical gate valve thrust requirements. Office of Scientific and Technical Information (OSTI), April 1995. http://dx.doi.org/10.2172/93882.
Full textOsuka, Kennedy, Melita Samoilys, James Mbugua, Jan de Leeuw, and David Obura. Marine habitats of the Lamu-Kiunga coast: an assessment of biodiversity value, threats and opportunities. World Agroforestry Centre, 2016. http://dx.doi.org/10.5716/wp16167.pdf.
Full textHwang, Chanmi, Whitney Rorah, Kathie Thompson, Ling Zhang, and Eulanda Sanders. Examining the Value of Three Critique Methods in an Introductory Apparel Design Studio. Ames: Iowa State University, Digital Repository, November 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1131.
Full textSmith, Ernest R., and Jeffrey A. Melby. Three-Dimensional Breakwater Stability Tests at Vale de Cavaleiros, Cape Verde. Fort Belvoir, VA: Defense Technical Information Center, July 1998. http://dx.doi.org/10.21236/ada351944.
Full textBacher-Hicks, Andrew, Mark Chin, Thomas Kane, and Douglas Staiger. An Evaluation of Bias in Three Measures of Teacher Quality: Value-Added, Classroom Observations, and Student Surveys. Cambridge, MA: National Bureau of Economic Research, June 2017. http://dx.doi.org/10.3386/w23478.
Full textBertoni, Eleonora, Gregory Elacqua, Carolina Méndez, and Humberto Santos. Teacher Hiring Instruments and Teacher Value Added: Evidence from Peru. Inter-American Development Bank, December 2020. http://dx.doi.org/10.18235/0003123.
Full textKim, Joseph J., Samuel Dominguez, and Luis Diaz. Freight Demand Model for Southern California Freeways with Owner–Operator Truck Drivers. Mineta Transportation Institute, October 2020. http://dx.doi.org/10.31979/mti.2020.1931.
Full text