Academic literature on the topic 'Threat Value'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat Value.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threat Value"

1

Rowley, Liv. "The value of threat intelligence." Computer Fraud & Security 2019, no. 10 (October 2019): 20. http://dx.doi.org/10.1016/s1361-3723(19)30109-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palmer, T. E. A. "Electronic Publishing: Value or Threat?" Anaesthesia and Intensive Care 28, no. 4 (August 2000): 361. http://dx.doi.org/10.1177/0310057x0002800402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Djupe, Paul A., and Brian R. Calfano. "Religious Value Priming, Threat, and Political Tolerance." Political Research Quarterly 66, no. 4 (December 26, 2012): 768–80. http://dx.doi.org/10.1177/1065912912471203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stephan, Cookie White, Walter G. Stephan, Katherine M. Demitrakis, Ann Marie Yamada, and Dennis L. Clason. "Women's Attitudes Toward Men: an Integrated Threat Theory Approach." Psychology of Women Quarterly 24, no. 1 (March 2000): 63–73. http://dx.doi.org/10.1111/j.1471-6402.2000.tb01022.x.

Full text
Abstract:
Three studies were conducted to measure the antecedents of women's attitudes toward men using the integrated threat model. Four types of threats were hypothesized to produce negative attitudes toward men: (1) realistic threat based on threats to women's political and economic power, (2) symbolic threat based on value differences, (3) intergroup anxiety experienced during social interaction with outgroup members, and (4) negative stereotypes of men. Negative contact was hypothesized to increase the perception of all four threats as well as to affect attitudes directly. The findings suggest that symbolic threat, intergroup anxiety, and negative contact are the strongest predictors of negative attitudes toward men. Contrary to expectation, realistic threat may not be important to women's attitudes toward men.
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Andy, and Brian Anderson. "Value-Driven Attentional Capture Under Threat of Shock." Journal of Vision 18, no. 10 (September 1, 2018): 1252. http://dx.doi.org/10.1167/18.10.1252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roy, Yanina, Nataliia Mazur, and Olena Riabchun. "STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY." Cybersecurity: Education, Science, Technique, no. 3 (2019): 97–103. http://dx.doi.org/10.28925/2663-4023.2019.3.97103.

Full text
Abstract:
In this article, a mathematical apparatus for comparative analysis of the set of threats of state information resources (DIR) is proposed for consideration, which combines methods and approaches to assess their qualitative and quantitative indicators. The main feature of the study is that the proposed approach to solving the problem of choice does not require a complete restoration of the principle of optimality, but allows to limit only information that will be sufficient to select the "reference sample". The essence of the ranking procedure lies in the fact that the expert poses the threat of an IP in the order that, in his opinion, is the most rational. For each of them the expert assigns specific numbers from a natural series - ranks. In this case, the highest rank receives the threat that has the highest priority. The order scale to be obtained as a result of ranking should satisfy the condition of equality of the number of ranks of the number of ranked threats. In this case, the less complex value of the numerical value will correspond to the least dangerous threat. The essence of the method lies in the fact that the expert must put each threat considered in a certain place in accordance with the degree of availability of one or another property, or in accordance with the proposed by the same expert, the coefficient of significance. In this case, the larger value of a complex assessment corresponds to the least dangerous threat. The basic mathematical method for assessing the threat of threats from the "general population" of the IB classes of threats is the method of formation and research of generalized indicators (criteria), the results of complex combination of which determine the trends of qualitative growth of their significance. Methods of expert assessments are used to increase the reliability of the results of assessing the levels of potential hazards of each threat from the "general population" of IB threat classes. The application of the proposed method will reduce the time to assess the state of the security of information resources and will allow, firstly, to identify the most significant threats that could inflict the greatest damage to information security and, secondly, to direct them the necessary means and safeguards.
APA, Harvard, Vancouver, ISO, and other styles
7

Holmes IV, Oscar, Marilyn V. Whitman, Kim S. Campbell, and Diane E. Johnson. "Exploring the social identity threat response framework." Equality, Diversity and Inclusion: An International Journal 35, no. 3 (April 18, 2016): 205–20. http://dx.doi.org/10.1108/edi-08-2015-0068.

Full text
Abstract:
Purpose – The purpose of this paper is to explore what individuals perceive as social identity threats, the sources of the threat, individuals’ responses, and the consequences of the threat. Design/methodology/approach – Narratives from 224 individuals were collected. A sample of 84 narratives were analyzed in depth using a qualitative content analysis approach. Findings – Initial support for identity threat response theory was found. Three new distinct threat responses – constructive action, ignore, and seek assistance – were uncovered. Additionally, harm/loss appraisals were found to be perceived and reacted to similarly to Petriglieri-defined identity threats. Originality/value – This study contributes to identity scholarship by shedding further light on the “theoretical black box” associated with identity threat. Such insight is necessary in further enhancing our understanding of the impact that identity threat has at the individual and organizational level.
APA, Harvard, Vancouver, ISO, and other styles
8

Bender, Jens, Tobias Rothmund, Peter Nauroth, and Mario Gollwitzer. "How Moral Threat Shapes Laypersons’ Engagement With Science." Personality and Social Psychology Bulletin 42, no. 12 (November 17, 2016): 1723–35. http://dx.doi.org/10.1177/0146167216671518.

Full text
Abstract:
Laypersons’ engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons’ engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people’s self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons’ evaluation of science above and beyond value salience.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhong, Ming, RenNong Yang, Jun Wu, and Huan Zhang. "Multi-Target Strike Path Planning Based on Improved Decomposition Evolutionary Algorithm." Mathematical Problems in Engineering 2019 (January 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/7205154.

Full text
Abstract:
This study proposes a path-finding model for multi-target strike planning. The model evaluates three elements, i.e., the target value, the aircraft’s threat tolerance, and the battlefield threat, and optimizes the striking path by constraining the balance between mission execution and the combat survival. In order to improve the speed of the Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), we use the conjugate gradient method for optimization. A Gaussian perturbation is added to the search points to make their distribution closer to the population distribution. The simulation shows that the proposed method effectively chooses its target according to the target value and the aircraft’s acceptable threat value, completes the strike on high value targets, evades threats, and verifies the feasibility and effectiveness of the multi-objective optimization model.
APA, Harvard, Vancouver, ISO, and other styles
10

Mayton, Daniel. "Value Priority Differences across Levels of Nuclear Threat Concern." Journal of Social Psychology 132, no. 4 (August 1, 1992): 539–41. http://dx.doi.org/10.1080/00224545.1992.9924733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Threat Value"

1

Noseworthy, Elizabeth Jessie Carleton University Dissertation Linguistics and Applied Language Studies. "English in Mexico: EFL teachers' perceptions of the value, the threat and ELT." Ottawa, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Akst, Lesley M. "Perceived value threat as a predictor of discrimination toward homosexuals within the legal context." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape10/PQDD_0014/MQ42118.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grigoropoulou, Nikolitsa. "Our Own and the Others: What Happens to Perceptions of Immigrant Threat when Value Priorities Collide?" Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609152/.

Full text
Abstract:
With immigration controversies increasingly found at the forefront of the European public arena, understanding the social and cultural forces driving negative perceptions of immigrants becomes a pressing task of academic scholarship. Situated within the broader theoretical framework of group-conflict theories, human values theory and social identity theory encourage different interpretations of how our interest to the welfare of the people closest to us (benevolence) and the broader human community (universalism) can inform attitudes towards immigrants. Human values theory argues for a unidirectional, negative effect of benevolence and universalism on negative perceptions of immigrants, while social identity theory suggests that, unlike universalism, benevolence would increase such perceptions. The present study seeks to examine how self-transcending human values (a.k.a. benevolence and universalism) affect perceptions of immigrant threat and whether the locus of our value priority matters. Using nationally pooled data from the European Social Survey (ESS) for 15 European countries, the results provide robust evidence that benevolence and universalism affect perceived immigrant threat in opposite directions, generally aligning with the propositions of the social identity theory. The group we place our loyalty matters. At the same time, national context matters too suggesting that grand scheme interpretations of this phenomenon fall short. Theoretical implications and future directions are further discussed.
APA, Harvard, Vancouver, ISO, and other styles
4

Sitniece, Katrīna Marija. "The Power of Values in Determining Interstate Threat Perception." Thesis, Uppsala universitet, Institutionen för freds- och konfliktforskning, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-445527.

Full text
Abstract:
Interstate threat perception plays a vital role in peace and conflict, having the potential to lead to pre-emptive war.  Despite the significance of the theme, little is known about the elements and mechanisms at play guiding threat perception at the state level. This study contributes to said gap by focusing on values as the driver of threat perception. The argument explores the regional constraints of threat perception, focusing on regional military interventions and their effects on the threat perception of the states within said region. Thus, the paper addresses the question of what role value congruence plays in interstate threat perception following a regional military intervention. The paper hypothesises that a higher perceived value congruence between the perceiving state and the intervening state lowers the degree of threat perception. Noting data limitations and isolation challenges, the study finds support for this hypothesis by exploring the case of 2014 Russian intervention in Ukraine and its effects on Belarus, Poland, and Sweden.
APA, Harvard, Vancouver, ISO, and other styles
5

Beauchamp, Alexandra L. "The Value in Science: Perceptions of Religiosity Influence Trust of Scientists." Ohio University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1530543806752117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lindersson, Carl. "Threatening Measures, at Face Value : Electrophysiology Indicating Confounds of the Facial Width-to-Height Ratio." Thesis, Högskolan i Skövde, Institutionen för biovetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17350.

Full text
Abstract:
Previous studies support that the relative width of the upper face (facial width-to-height ratio; fWHR) has evolved to signal threat, but these studies rely greatly on subjective facial ratings and measurements prone to confounds. The present study objectively quantifies threat perception to the magnitude of the observers’ electrophysiological reaction, specifically the event-related potential (ERP) called the late positive potential (LPP), and investigate if brow height and jaw width could have confounded previous fWHR studies. Swedish and international students (N = 30, females = 11, Mage = 24 years, SDage = 2.9) were shown computer-generated neutral faces created with the underlying skeletal morphology varying in brow ridge height, cheekbone width and jaw width. Participants first rated how threatening each face was and then viewed 12 blocks of 64 faces while their electroencephalography (EEG) was recorded. The results supported that the LPP could be used to index threat perception and showed that only brow height significantly affected both facial ratings (p < .001, ɳp2 = .698) and magnitude of the LPP within the 400 to 800 ms latency (p = .02, d = .542). Hence, brow height, not facial width, could explain previous findings. The results contradict the hypothesis that fWHR is an evolved cue of threat and instead support the overgeneralisation hypothesis in that faces with similar features to anger will be perceived as more threatening.
APA, Harvard, Vancouver, ISO, and other styles
7

Syed, Romilla. "DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3906.

Full text
Abstract:
This dissertation examines the identity threats perceived by individuals and organizations in Online Social Networks (OSNs). The research constitutes two major studies. Using the concepts of Value Focused Thinking and the related methodology of Multiple Objectives Decision Analysis, the first research study develops the qualitative and quantitative value models to explain the social identity threats perceived by individuals in Online Social Networks. The qualitative value model defines value hierarchy i.e. the fundamental objectives to prevent social identity threats and taxonomy of user responses, referred to as Social Identity Protection Responses (SIPR), to avert the social identity threats. The quantitative value model describes the utility of the current social networking sites and SIPR to achieve the fundamental objectives for averting social identity threats in OSNs. The second research study examines the threats to the external identity of organizations i.e. Information Security Reputation (ISR) in the aftermath of a data breach. The threat analysis is undertaken by examining the discourses related to the data breach at Home Depot and JPMorgan Chase in the popular microblogging website, Twitter, to identify: 1) the dimensions of information security discussed in the Twitter postings; 2) the attribution of data breach responsibility and the related sentiments expressed in the Twitter postings; and 3) the subsequent diffusion of the tweets that threaten organizational reputation.
APA, Harvard, Vancouver, ISO, and other styles
8

Leite, Juliana Valeria 1977. "Prognostic value of the blinking reflex to visual threat in comatous patients = Valor prognóstico do reflexo de piscar à ameaça visual em pacientes comatosos." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/313507.

Full text
Abstract:
Orientador: Donizeti Cesar Honorato
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Ciências Médicas
Made available in DSpace on 2018-08-23T19:15:40Z (GMT). No. of bitstreams: 1 Leite_JulianaValeria_M.pdf: 641050 bytes, checksum: b62398f140661279efb6ea212dc9afcf (MD5) Previous issue date: 2013
Resumo: A avaliação do nível de consciência faz parte da rotina da equipe multiprofissional que conduz pacientes em coma. Sinais que possam representar a melhora do nível de consciência destes pacientes são constantemente buscados. Atualmente sabe-se que alguns fatores, como por exemplo, a resposta motora na escala de coma de Glasgow (ECG) e a apresentação do reflexo fotomotor apresentam valor prognóstico, porém nenhum deles é relacionado diretamente ao despertar destes pacientes. O objetivo deste estudo foi o de relacionar a presença do reflexo de piscar à ameaça visual (RPAV), com o despertar de pacientes comatosos e evidenciar o seu valor prognóstico. Para tanto foi feito um estudo retrospectivo com os dados obtidos em prontuários do serviço de arquivos médicos do Hospital das Clínicas da Universidade Estadual de Campinas (HC-UNICAMP) de pacientes internados nas enfermarias de neurologia clinica e neurocirurgia entre os períodos de abril de 2005 a abril de 2010. Foram selecionados 975 prontuários correspondentes ao diagnóstico de traumatismo cranioencefálico e acidente vascular encefálico. Destes, foram selecionados 119 prontuários de pacientes que se enquadraram nos critérios de inclusão representados pela resposta motora menor ou igual a quatro na ECG na admissão hospitalar e a descrição do RPAV durante o período de internação sendo excluídos os pacientes com resposta motora na admissão hospitalar superior a quatro, que não apresentassem a descrição da avaliação do RPAV ou que tivessem patologias neurológicas associadas às mencionadas como fator de seleção para os prontuários. Foram analisados os dados relativos ao sexo, diagnóstico clínico, resposta motora isolada e ao Glasgow total na admissão e alta hospitalar, a apresentação do RPAV durante o período de internação e a evolução clínica do paciente que foi representada pelo despertar, traduzido pela resposta motora seis ou cinco na ECG, evolução ao estado vegetativo persistente e óbito. A análise estatística demonstrou através da análise de regressão logística univariada e multivariada com critério Stepwise de seleção de variáveis uma associação entre a apresentação positiva do RPAV durante o período de internação e o despertar dos pacientes estudados (p<0.001). Todos os 51 pacientes que apresentaram o reflexo despertaram enquanto os pacientes que não apresentaram o reflexo não despertaram, evoluindo ao estado vegetativo persistente (24 pacientes) ou ao óbito (44 pacientes). Os pacientes que apresentaram o reflexo positivo durante o período de internação apresentaram uma maior possibilidade de despertar (11.685.00 vezes maior) dos que não o apresentaram adotando-se o nível de significância para os testes estatísticos de 5%, ou seja, p<0.05. O presente estudo demonstrou que o RPAV apresenta valor prognostico, estando sua apresentação positiva diretamente associada ao despertar destes pacientes
Abstract: The level of consciousness assessment is part of the hospital routine in comatose patients. Signs that may indicate cognitive improvement in these patients are constantly searched. Nowadays it is kwon that some features represent prognostic value, however, none relates directly with awakening in coma patients. The main purpose of this study was to associate the presence of the blinking reflex as a response to a visual threat with awakening in coma patients. We reviewed medical records from University of Campinas Clinical Hospital from patients diagnosed with stroke and traumatic brain injury (TBI) who stayed in the hospital neurological ward from April 2005 to April 2010. We reviewed 975 medical records. 119 patients were included; on admission they presented a score four or less for motor response in Glasgow Coma Scale (GCS) and description RPVA during hospitalization, being excluded patients with diagnoses other than those cited and motor response at admission more than four, which did not present the description of the assessment the blinking reflex or had neurological pathologies associated with those mentioned as selection factor for records. We gathered information from the charts regarding sex, disease, GCS total score, GCS motor score on admission and discharge, the presence or absence of the blinking reflex and level of consciousness on discharge, characterized as awakening, persistent vegetative state or death. Statistical analysis demonstrated through the analysis of univariate and multivariate logistic regression with stepwise selection criterion variables of a direct association between a positive blinking reflex of to visual threat during the period of hospitalization awakening in our cohort (p<0.001) . All the 51 patients with a positive reflex awoke, while patients with a negative reflex don't awakening evolved to persistent vegetative state (24) or death (44). A positive blinking reflex to visual threat during hospitalization increases the chance of awakening by 11.685.00 times when compared with patients with a negative reflex. The blinking reflex as a response to a threat has great prognostic value while its positivity is directly associated with awakening in coma patients
Mestrado
Ciencias Biomedicas
Mestra em Ciências Médicas
APA, Harvard, Vancouver, ISO, and other styles
9

Shabir, Asim. "Supersizing : a financial saving or threat to consumer health : the moderating role of nutritional labels." Electronic Thesis or Diss., Aix-Marseille, 2019. http://theses.univ-amu.fr.lama.univ-amu.fr/191125_SHABIR_168p658wo433wo325yrsqlh_TH.pdf.

Full text
Abstract:
Cette thèse adopte une approche mixte basée sur des études qualitatives et quantitatives. Dans un premier temps, une phase exploratoire qualitative permet de mettre à jour les antécédents et les conséquences d’un achat de produits alimentaires en grand format. Les conclusions de cette phase qualitative suggèrent que le consommateur choisit le format des aliments selon le rapport quantité/prix, la sensation de faim, la ressemblance et l’influence sociale. De plus, choisir les grands formats génère diverses conséquences, en termes d’économies financières, de problèmes de santé, de gaspillage alimentaire, de culpabilité et de satisfaction. Notre étude qualitative nous permet de proposer un modèle centré autour de l’alternative entre les avantages financiers et les considérations de santé. L'étude quantitative a démontré que les stratégies de prix dégressifs selon les quantités achetées incitent non seulement les consommateurs à acheter et à consommer davantage, mais aussi, dans le même temps, amenuisent leurs objectifs de santé et diminuent leur culpabilité de trop consommer (souvent associée aux aliments hédoniques). Cependant, la présence d’étiquettes nutritionnelles contenant les informations relatives aux calories et aux nutriments pour le format proposé, remet au premier rang les objectifs de santé et augmente le sentiment de culpabilité. Cette thèse contribue à la littérature existante sur le « supersizing » dans le cas de produits alimentaires. A la lumière de la théorie des Moyens-Fins et dans une approche de Transformative Consumer Research ; cette recherche apporte des pistes d’action susceptibles d’améliorer le bien-être alimentaire de tous
This dissertation adopted a mixed-method approach based on qualitative and quantitative studies. The qualitative exploratory research examined the antecedents and consequences behind the purchase of supersized food products. Our findings from the qualitative study suggest that consumers’ choice of upsized food is inspired by several antecedents such as price quantity trade-off, hunger, likeness, and social influence. Besides, the acquisition of a larger food container also results in some inevitable consequences, which appear in the form of financial saving, health concerns, food waste, guilt, and satisfaction. Our qualitative study led the foundation for quantitative research to further examine the role of supersized pricing.The quantitative study demonstrated that such pricing strategies not only cause consumers to purchase and consume more but at the same time influence their crucial goals in distinct domains, expressly, by diminishing the importance of health goals and decreasing the anticipated consumption guilt which is often associated with hedonic foods. The supersized pricing is influential in affecting the buying behavior of consumers; however, the carefully designed nutritional labels containing the nutritional information related to the whole portion can refrain them from diminished health focus and increase their feelings of guilt for hedonic food. Moreover, supersized pricing can also be used to enhance the size choice of healthy food.This dissertation contributes to the existing literature on supersizing, consumption guilt, and nutritional labeling in light of the Means-End theory and TCR. It also discusses the marketing and public policy implications
APA, Harvard, Vancouver, ISO, and other styles
10

Webber, David. "The motivating influence of death are individual differences in death-thought accessibility and defensive behavior related? /." Laramie, Wyo. : University of Wyoming, 2009. http://proquest.umi.com/pqdweb?did=1939351871&sid=1&Fmt=2&clientId=18949&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Threat Value"

1

Bellow, Adam. New threats to freedom. West Conshohocken, PA: Templeton Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bok, Sissela. A strategy for peace: Human values and the threat of war. New York: Pantheon Books, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

A strategy for peace: Human values and the threat of war. New York: Pantheon Books, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bok, Sissela. A strategy for peace: Human values and the threat of war. New York: Vintage Books, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Risk monetization: Converting threats and opportunities into impact on project value. Boca Raton, FL: CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Koller, Glenn R. Risk monetization: Converting threats and opportunities into impact on project value. Boca Raton, FL: CRC Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Values and stakeholders in an era of social responsibility: Cut-throat competition? Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Computer-generated 3D-visualisations in archaeology: Between added value and deception. Oxford: Archaeopress, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1955-, Thompson Dougal, ed. Values at work: The invisible threads between people, performance and profit. Auckland, N.Z: HarperBusiness, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kukukina, Irina, and Irina Astrahanceva. Accounting and analysis of bankruptcies. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/949490.

Full text
Abstract:
The textbook introduces the history of the formation of the institute of bankruptcy, conducting reorganization and liquidation procedures in a crisis, diagnosing the financial condition of an enterprise based on situational and coefficient analysis, multiplicative factor models for assessing the threat of bankruptcy, methods for assessing the value of an insolvent enterprise, as well as accounting for operations related to bankruptcy procedures. The possibilities of an integrated approach to the development of a strategy for overcoming the crisis and choosing ways to restructure a bankrupt enterprise are considered. Meets the requirements of the federal state educational standards of higher education of the latest generation. For teachers, postgraduates and students of higher educational organizations, employees of analytical services, anti-crisis managers.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Threat Value"

1

Owusu Yeboah, Adwoa Yeboaa, Michael Adu Kwarteng, and Petr Novak. "Value Creation Through Social Media Marketing: A Threat to Sustainability Performance?" In Re-imagining Diffusion and Adoption of Information Technology and Systems: A Continuing Conversation, 475–86. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64861-9_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Berndt, Anzel, and Jacques Ophoff. "Exploring the Value of a Cyber Threat Intelligence Function in an Organization." In Information Security Education. Information Security in Action, 96–109. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59291-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Yan, Hao Li, and Zhi Liu. "Real-Time Coverage Path Planning of a UAV with Threat and Value Zone Constraints." In Lecture Notes in Electrical Engineering, 840–48. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8450-3_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Guha Roy, S. "Phytophthora: A Member of the Sixth Kingdom Revisited as a Threat to Food Security in the Twenty-First Century." In Value Addition of Horticultural Crops: Recent Trends and Future Directions, 325–37. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2262-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Wen-Fang. "Three-Valued Plurivaluationism of Vague Predicates." In Logic, Rationality, and Interaction, 379–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48561-3_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Blanco, Gerardo L. "Higher Education and the Enduring Value of Hospitality: Reflections for the 21st Century." In The Promise of Higher Education, 175–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67245-4_27.

Full text
Abstract:
AbstractThe 21st century is a perilous time for international collaboration among university actors. Mobility and international exchange have come to a total standstill as the world shelters in place, trying to slow down the course of a pandemic. However, the crisis of hospitality in higher education has been long in the making. Within universities, internationalization has been driven by profits and revenues for decades, while discussions of core values have been cast aside as utopian or idealistic. There are thousands of displaced, imprisoned and exiled academics, and there are millions of university-aged refugees in the world, with only a tiny fraction of them entering universities. Beyond university walls, scepticism toward the other has been brewing, popularizing xenophobic nationalism and construing mobility as a threat that must be curtailed or regulated to new extremes. As some governments have turned to authoritarianism, universities have become targets, and government actions have resulted in significant numbers of displaced and unemployed academics, many of whom look beyond national borders to find spaces where the pursuit of their ideas is less threatening and where they can exercise their intellectual calling. Responding to these needs requires hospitality, which is not unprecedented, but that has become a lower priority among many others such as the constant pressure to move up the rankings or league tables.
APA, Harvard, Vancouver, ISO, and other styles
7

Clark, Mark E. "The Future: A Search for Values." In Ariadne’s Thread, 3–27. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-20077-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Subramanian, S. "Three themes in economics." In Present Values, 13–20. Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge India, 2020. http://dx.doi.org/10.4324/9781003050322-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Morgan, Charles G. "Two Values, Three Values, Many Values, No Values." In Beyond Two: Theory and Applications of Multiple-Valued Logic, 349–74. Heidelberg: Physica-Verlag HD, 2003. http://dx.doi.org/10.1007/978-3-7908-1769-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McNair, Brian. "From Deep Throat to Don Jon: The Pornographication of Cinematic Entertainment." In Entertainment Values, 251–67. London: Palgrave Macmillan UK, 2017. http://dx.doi.org/10.1057/978-1-137-47290-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threat Value"

1

Chen, Yue, Barry Boehm, and Luke Sheppard. "Value Driven Security Threat Modeling Based on Attack Path Analysis." In Proceedings of the 40th Annual Hawaii International Conference on System Sciences. IEEE, 2007. http://dx.doi.org/10.1109/hicss.2007.601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Yue. "Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems." In 29th International Conference on Software Engineering. IEEE, 2007. http://dx.doi.org/10.1109/icsecompanion.2007.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Franqueira, Virginia N. L., Roel Wieringa, and Pascal van Eck. "External Insider Threat: A Real Security Challenge in Enterprise Value Webs." In Fifth International Conference on Availability, Reliability, and Security (ARES 2010). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Greitzer, Frank, Justin Purl, D. E. (Sunny) Becker, Paul Sticha, and Yung Mei Leong. "Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2019. http://dx.doi.org/10.24251/hicss.2019.387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xie, Weiqiang, Xiao Yu, Yuqing Zhang, and He Wang. "An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing." In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020. http://dx.doi.org/10.1109/infocomwkshps50562.2020.9162739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Peterlin, Judita, and Vlado Dimovski. "Are Meetings Our Collective Value: Multiple Intelligent Approach to Leading Meetings: Matter od Strategy, Not Only Operation?" In Values, Competencies and Changes in Organizations. University of Maribor Press, 2021. http://dx.doi.org/10.18690/978-961-286-442-2.50.

Full text
Abstract:
Meetings are part of everyday life of managers. Unfortunately, often too little attention is dedicated to them, therefore the paper addresses the role of the meetings in avoiding the threats to cross-group collaboration of different departments. The paper emphasizes collaboration blind spot which happens when managers do not do the first step in collaboration implementation correctly which is identifying the potential threats each group involved in the potential collaboration might feel. People often feel potential collaboration as a threat to their identity and legitimacy of their existing group and therefore act defensively or even avoid collaboration. We position meetings as a key element of organizational culture which needs to be professionaly managed and address them as a strategical tool for achieving organizational success in an efficient way.
APA, Harvard, Vancouver, ISO, and other styles
7

Robinson, Clive G., Zoë E. Wattis, Colin Dooley, and Sladjana Popovic. "Assessment of the Threat From Wildfires on Above Ground Natural Gas Facilities." In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78059.

Full text
Abstract:
In the light of recent experience of wildfires in Alberta and British Columbia, Alliance Pipeline has strengthened their emergency preparedness in dealing with external fire events that have the potential to affect above-ground facilities connected with their high pressure natural gas pipeline system. As part of this initiative a quantitative methodology has been developed that enables the effects of a wildfire on an above-ground pipeline facility to be assessed. The methodology consists of three linked calculations which assess: 1. the severity of the wildfire, based on information from the Canadian Wildland Fire Information System, 2. the transmission of thermal radiation from the wildfire to the facility, and, 3. the response of equipment, structures and buildings to the incident thermal radiation. The predictions of the methodology agree well with the actual damage observed at a lateral block valve site following a wildfire in 2016. Application to example facility types (block valve sites, meter stations and compressor stations) has demonstrated that, in general, damage is only predicted for more vulnerable items such as cables. The sensitivity of the predictions of the methodology to the input parameters and key modelling uncertainties has been examined. This demonstrates that the results are sensitive to the distance of the facility from the tree line and the assumed vegetation type. This shows the importance of verifying the location relative to the vegetation and selecting the appropriate vegetation type from the Canadian Wildland Fire Information System for site specific assessments. The predictions of the methodology are particularly sensitive to the assumed flame temperature. However, a value has been chosen that gives good agreement with measured thermal radiation values from wildfires. Of the mitigation options considered, the most effective and practical is to increase the distance to the tree line. This measure has the advantage of reducing radiation levels for all items on the site. Even though the work shows that failure of exposed pipework due to wildfires is unlikely, maintaining the flow within pipes is recommended as this increases the radiative flux at which failure is predicted to occur. However, as failure of cables and hence control systems would occur at a lower flux levels the fail-safe actions of such systems needs to be confirmed. Shielding of cables or items of equipment in general is likely to be impractical but could be considered for particularly vulnerable equipment or locations.
APA, Harvard, Vancouver, ISO, and other styles
8

Udović, Ugo. "Application of Business Intelligence in the Post-Industrial Period." In Values, Competencies and Changes in Organizations. University of Maribor Press, 2021. http://dx.doi.org/10.18690/978-961-286-442-2.70.

Full text
Abstract:
The purpose of the article is a theoretical and empirical analysis of the job insecurity due its influence on the employee job attitudes. Design. The design of the study was longitudinal. The empirical results were collected in 2018–2019. The empirical basis of the research is the separate structural department of the bank. The organization has realized downsizing project during the collection of empirical data. It has made possible to analyze the job satisfaction and work engagement before, during and after the downsizing project. The measures used in the present study are: 1) the “Utrecht Work Engagement Scale”; 2) “Brief Job Satisfaction Measure; 3) “The Job Insecurity Scale”. An empirical analysis of the dynamics of job attitudes in the groups differ in age and gender has found out a short-term motivating effect of the threat of job loss. The motivating effect of the threat of job loss is lost during six months. The most significance motivating effect was wound out in within the group of ordinary employees in the senior category over 45 years. The threat of dismissal also has the greatest impact on the behavior change of that part of the staff that is most susceptible to experiencing job insecurity. The employees who perceived the job insecurity are more satisfied with their work and value it more highly.
APA, Harvard, Vancouver, ISO, and other styles
9

Haskett, William. "Four Simple Questions: Decision-Centered Risk and Project Management." In SPE Annual Technical Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/205848-ms.

Full text
Abstract:
Abstract A decision-centric approach to projects creates confidence, improves value, and shortens time to revenue. A straight-forward objective based approach to managing project decisions is presented in the form of four primary questions. Those questions are:Does the issue/threat/opportunity make a material difference to the project? (Materiality)Can anything be done to affect the outcome? (Influence)Can you afford to do anything about it? (Value)What if you are wrong? (Confidence) Materiality – An issue/threat/opportunity must make a material difference to a project decision to be worth receiving attention. The concept of materiality will vary in size and consequence from project to project, so it is important to maintain a decision focus. Understanding the variability in the project with respect to decision thresholds can provide an indication of materiality. We must also ask how different our current assessment of the project, or its environment could get before we would like to change our decision. Affective ability – Accepted risk-management options of avoidance, mitigation, transfer, and acceptance present the decision options within this category. In considering the consequences the options, decision tools such as Indifference Assessment and Pain and Regret Assessment. Avoidance, Mitigation, or Transfer – while most projects can benefit through risk reduction, such effort must make economic sense. Risk reduction paths must add value to the project through added upside or elimination of at least a portion of downside threat. The value of these efforts is aided by use of tools such as Value-of-Information, Value-of-Control, and Value-of-learning. Being wrong – Making a regretful decision is always a possibility but the source of the "wrongness" and its likely impact is often overlooked by teams. In project planning and execution, decision-makers are often presented with a plethora of issues, threats, and opportunities. From development planning through implementation significant time and resource waste can be cut by prioritizing effort to the issues that matter. Understanding the issues in the context of materiality and then what to do, if anything, about an issue, becomes key to maximizing success. This approach cuts waste and focuses the attention on what matters. Decision Intelligence not only increases the probability of making the best decisions, but it also prioritizes work to those items that matter either for value or decision path. While most of the decision tools referenced are well documented in the literature, placing them into the context of the Four Question Approach allows teams and management to focus more closely on efficiently mitigating issues, shortening workflow, and creating significantly higher decision confidence. This novel approach works well in all phases of project planning through project management implementation.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Guanlan, Francois Ayello, Jiana Zhang, and Peter Stephens. "The Application of Bayesian Network Threat Model for Corrosion Assessment of Pipeline in Design Stage." In 2018 12th International Pipeline Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/ipc2018-78388.

Full text
Abstract:
Internal corrosion modeling of oil and gas pipelines requires the consideration of interactions between various parameters (e.g. brine chemistry, flow conditions or scale deposition). Moreover, the number of interactions increases when we consider that there are multiple types of internal corrosion mechanisms (i.e. uniform corrosion, localized corrosion, erosion-corrosion and microbiologically influenced corrosion). To better describe the pipeline internal corrosion threats, a Bayesian network model was created by identifying and quantifying causal relationships between parameters influencing internal corrosion. One of the strengths of the Bayesian network methodology is its capability to handle uncertain and missing data. The model had previously proven its accuracy in predicting the internal condition of existing pipelines. However, the model has never been tested on a pipeline in design stage, where future operating conditions are uncertain and data uncertainty is high. In this study, an offshore pipeline was selected for an internal corrosion threat assessment. All available information related to the pipeline were collected and uncertainties in some parameters were estimated based on subject matter expertise. The results showed that the Bayesian network model can be used to quantify the value of each information (i.e. which parameters have the most effect now and in the future), predict the range of possible corrosion rates and pipeline failure probability within a given confidence level.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threat Value"

1

Dahl, Gordon, and Matthew Knepper. Why is Workplace Sexual Harassment Underreported? The Value of Outside Options Amid the Threat of Retaliation. Cambridge, MA: National Bureau of Economic Research, September 2021. http://dx.doi.org/10.3386/w29248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stacey, Marcela R., James G. Arendts, Ray A. Berry, Gary E. Korth, and Paul R. Schwieder. Eaton Throat-Valve Element Modifications Preliminary Report. Fort Belvoir, VA: Defense Technical Information Center, July 1995. http://dx.doi.org/10.21236/ada299173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stacey, M. R., J. G. Arendts, R. A. Berry, G. E. Korth, P. R. Schwieder, J. P. Sekot, and S. D. Snow. Eaton Throat-Valve Element prototype concept. Phase 1. Office of Scientific and Technical Information (OSTI), December 1993. http://dx.doi.org/10.2172/10167496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Steele, R. Jr, J. C. Watkins, and K. G. DeWall. Methods for determining atypical gate valve thrust requirements. Office of Scientific and Technical Information (OSTI), April 1995. http://dx.doi.org/10.2172/93882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Osuka, Kennedy, Melita Samoilys, James Mbugua, Jan de Leeuw, and David Obura. Marine habitats of the Lamu-Kiunga coast: an assessment of biodiversity value, threats and opportunities. World Agroforestry Centre, 2016. http://dx.doi.org/10.5716/wp16167.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hwang, Chanmi, Whitney Rorah, Kathie Thompson, Ling Zhang, and Eulanda Sanders. Examining the Value of Three Critique Methods in an Introductory Apparel Design Studio. Ames: Iowa State University, Digital Repository, November 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Ernest R., and Jeffrey A. Melby. Three-Dimensional Breakwater Stability Tests at Vale de Cavaleiros, Cape Verde. Fort Belvoir, VA: Defense Technical Information Center, July 1998. http://dx.doi.org/10.21236/ada351944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bacher-Hicks, Andrew, Mark Chin, Thomas Kane, and Douglas Staiger. An Evaluation of Bias in Three Measures of Teacher Quality: Value-Added, Classroom Observations, and Student Surveys. Cambridge, MA: National Bureau of Economic Research, June 2017. http://dx.doi.org/10.3386/w23478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bertoni, Eleonora, Gregory Elacqua, Carolina Méndez, and Humberto Santos. Teacher Hiring Instruments and Teacher Value Added: Evidence from Peru. Inter-American Development Bank, December 2020. http://dx.doi.org/10.18235/0003123.

Full text
Abstract:
In this article, we explore whether the evaluation instruments used to recruit teachers in the national teacher hiring process in Peru are good predictors of teacher effectiveness. To this end, we estimate teacher value-added (TVA) measures for public primary school teachers in 2018 and test for their correlation with the results of the 2015 and 2017 national evaluations. Our findings indicate that among the three sub-tests that comprise the first, centralized stage of the process, the curricular and pedagogical knowledge component has the strongest (and significant) correlation with the TVA measure, while the weakest correlation is found with the reading comprehension component. At the second, decentralized stage, we find no significant correlation with our measures of TVA for math, as well as non-robust correlations for the professional experience and classroom observation evaluation instruments. A positive and significant correlation is found between the classroom observation component and TVA for reading. Moreover, we find correlations between our measure of TVA and several teacher characteristics: TVA is higher for female teachers and for those at higher salary levels while it is lower for teachers with temporary contracts (compared to those with permanent positions).
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Joseph J., Samuel Dominguez, and Luis Diaz. Freight Demand Model for Southern California Freeways with Owner–Operator Truck Drivers. Mineta Transportation Institute, October 2020. http://dx.doi.org/10.31979/mti.2020.1931.

Full text
Abstract:
This study evaluates the demand for truck-only toll lanes on Southern California freeways with owner–operator truck drivers. The study implemented the stated preference survey method to estimate the value placed by drivers on time, reliability, and safety measures using various scenarios geared towards assessing those values. The project team met face-to-face with owner- operator truck drivers near the Ports of Los Angeles and Long Beach to understand the drivers’ perspectives regarding truck-only toll lanes on Southern California freeways. A data set containing 31 survey responses is obtained and used for statistical data analysis using analysis of variable (ANOVA) and two sample t-tests. The analysis results showed that 75.27% of the owner– operator truck drivers responded are willing to pay toll fees when they choose routes. The tolerated average toll fees are $13.77/ hr and $12.82/hr for weekdays and weekends, respectively. The analysis results also showed that owner–operator truck drivers will take truck-only toll lanes when they take the routes used in four comparisons out of six comparisons according to the three measures such as values of time, reliability, and safety, despite sharing a common origin and destination. The highest toll fee per mile on any day that drivers are willing to pay when the main factor being compared is value of time is $0.31/mile or $18.35/hr. The toll fees associated with reliability and safety measures are $0.30/mile or $8.94/hr and $0.22/mile or $11.01/hr, respectively. These results are meaningful for legislators and transportation agencies as the behaviors and route choice characteristics of owner–operator truck drivers help them better understand the utility and demand for truck-only toll lanes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography