To see the other types of publications on this topic, follow the link: Threat Value.

Journal articles on the topic 'Threat Value'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Threat Value.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rowley, Liv. "The value of threat intelligence." Computer Fraud & Security 2019, no. 10 (October 2019): 20. http://dx.doi.org/10.1016/s1361-3723(19)30109-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palmer, T. E. A. "Electronic Publishing: Value or Threat?" Anaesthesia and Intensive Care 28, no. 4 (August 2000): 361. http://dx.doi.org/10.1177/0310057x0002800402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Djupe, Paul A., and Brian R. Calfano. "Religious Value Priming, Threat, and Political Tolerance." Political Research Quarterly 66, no. 4 (December 26, 2012): 768–80. http://dx.doi.org/10.1177/1065912912471203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stephan, Cookie White, Walter G. Stephan, Katherine M. Demitrakis, Ann Marie Yamada, and Dennis L. Clason. "Women's Attitudes Toward Men: an Integrated Threat Theory Approach." Psychology of Women Quarterly 24, no. 1 (March 2000): 63–73. http://dx.doi.org/10.1111/j.1471-6402.2000.tb01022.x.

Full text
Abstract:
Three studies were conducted to measure the antecedents of women's attitudes toward men using the integrated threat model. Four types of threats were hypothesized to produce negative attitudes toward men: (1) realistic threat based on threats to women's political and economic power, (2) symbolic threat based on value differences, (3) intergroup anxiety experienced during social interaction with outgroup members, and (4) negative stereotypes of men. Negative contact was hypothesized to increase the perception of all four threats as well as to affect attitudes directly. The findings suggest that symbolic threat, intergroup anxiety, and negative contact are the strongest predictors of negative attitudes toward men. Contrary to expectation, realistic threat may not be important to women's attitudes toward men.
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Andy, and Brian Anderson. "Value-Driven Attentional Capture Under Threat of Shock." Journal of Vision 18, no. 10 (September 1, 2018): 1252. http://dx.doi.org/10.1167/18.10.1252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Roy, Yanina, Nataliia Mazur, and Olena Riabchun. "STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY." Cybersecurity: Education, Science, Technique, no. 3 (2019): 97–103. http://dx.doi.org/10.28925/2663-4023.2019.3.97103.

Full text
Abstract:
In this article, a mathematical apparatus for comparative analysis of the set of threats of state information resources (DIR) is proposed for consideration, which combines methods and approaches to assess their qualitative and quantitative indicators. The main feature of the study is that the proposed approach to solving the problem of choice does not require a complete restoration of the principle of optimality, but allows to limit only information that will be sufficient to select the "reference sample". The essence of the ranking procedure lies in the fact that the expert poses the threat of an IP in the order that, in his opinion, is the most rational. For each of them the expert assigns specific numbers from a natural series - ranks. In this case, the highest rank receives the threat that has the highest priority. The order scale to be obtained as a result of ranking should satisfy the condition of equality of the number of ranks of the number of ranked threats. In this case, the less complex value of the numerical value will correspond to the least dangerous threat. The essence of the method lies in the fact that the expert must put each threat considered in a certain place in accordance with the degree of availability of one or another property, or in accordance with the proposed by the same expert, the coefficient of significance. In this case, the larger value of a complex assessment corresponds to the least dangerous threat. The basic mathematical method for assessing the threat of threats from the "general population" of the IB classes of threats is the method of formation and research of generalized indicators (criteria), the results of complex combination of which determine the trends of qualitative growth of their significance. Methods of expert assessments are used to increase the reliability of the results of assessing the levels of potential hazards of each threat from the "general population" of IB threat classes. The application of the proposed method will reduce the time to assess the state of the security of information resources and will allow, firstly, to identify the most significant threats that could inflict the greatest damage to information security and, secondly, to direct them the necessary means and safeguards.
APA, Harvard, Vancouver, ISO, and other styles
7

Holmes IV, Oscar, Marilyn V. Whitman, Kim S. Campbell, and Diane E. Johnson. "Exploring the social identity threat response framework." Equality, Diversity and Inclusion: An International Journal 35, no. 3 (April 18, 2016): 205–20. http://dx.doi.org/10.1108/edi-08-2015-0068.

Full text
Abstract:
Purpose – The purpose of this paper is to explore what individuals perceive as social identity threats, the sources of the threat, individuals’ responses, and the consequences of the threat. Design/methodology/approach – Narratives from 224 individuals were collected. A sample of 84 narratives were analyzed in depth using a qualitative content analysis approach. Findings – Initial support for identity threat response theory was found. Three new distinct threat responses – constructive action, ignore, and seek assistance – were uncovered. Additionally, harm/loss appraisals were found to be perceived and reacted to similarly to Petriglieri-defined identity threats. Originality/value – This study contributes to identity scholarship by shedding further light on the “theoretical black box” associated with identity threat. Such insight is necessary in further enhancing our understanding of the impact that identity threat has at the individual and organizational level.
APA, Harvard, Vancouver, ISO, and other styles
8

Bender, Jens, Tobias Rothmund, Peter Nauroth, and Mario Gollwitzer. "How Moral Threat Shapes Laypersons’ Engagement With Science." Personality and Social Psychology Bulletin 42, no. 12 (November 17, 2016): 1723–35. http://dx.doi.org/10.1177/0146167216671518.

Full text
Abstract:
Laypersons’ engagement with science has grown over the last decade, especially in Internet environments. While this development has many benefits, scientists also face the challenge of devaluation and public criticism by laypersons. Embedding this phenomenon in social-psychological theories and research on value-behavior correspondence, we investigated moral threat as a factor influencing laypersons’ engagement with science. Across three studies, we hypothesized and found that moral values shape the way laypersons evaluate and communicate about science when these values are threatened in a given situation and central to people’s self-concept. However, prior research on the underlying mechanism of moral threat effects cannot fully rule out value salience as an alternative explanation. To close this gap, we situationally induced value salience while varying the degree of moral threat (Study 3). Our findings indicate that moral threat amplifies the influence of moral values on laypersons’ evaluation of science above and beyond value salience.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhong, Ming, RenNong Yang, Jun Wu, and Huan Zhang. "Multi-Target Strike Path Planning Based on Improved Decomposition Evolutionary Algorithm." Mathematical Problems in Engineering 2019 (January 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/7205154.

Full text
Abstract:
This study proposes a path-finding model for multi-target strike planning. The model evaluates three elements, i.e., the target value, the aircraft’s threat tolerance, and the battlefield threat, and optimizes the striking path by constraining the balance between mission execution and the combat survival. In order to improve the speed of the Multi-Objective Evolutionary Algorithm Based on Decomposition (MOEA/D), we use the conjugate gradient method for optimization. A Gaussian perturbation is added to the search points to make their distribution closer to the population distribution. The simulation shows that the proposed method effectively chooses its target according to the target value and the aircraft’s acceptable threat value, completes the strike on high value targets, evades threats, and verifies the feasibility and effectiveness of the multi-objective optimization model.
APA, Harvard, Vancouver, ISO, and other styles
10

Mayton, Daniel. "Value Priority Differences across Levels of Nuclear Threat Concern." Journal of Social Psychology 132, no. 4 (August 1, 1992): 539–41. http://dx.doi.org/10.1080/00224545.1992.9924733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Vázquez, Alexandra, Lucía López-Rodríguez, Mercedes Martínez, Scott Atran, and Ángel Gómez. "Threat Enhances Aggressive Inclinations Among Devoted Actors Via Increase in Their Relative Physical Formidability." Personality and Social Psychology Bulletin 46, no. 10 (March 12, 2020): 1461–75. http://dx.doi.org/10.1177/0146167220907466.

Full text
Abstract:
Devoted actors—those who share sacred values with a group with which they are fused—are particularly willing to self-sacrifice to defend their group or values when they are threatened. Here, we explore whether they are also prone to aggressive inclinations toward those who endanger their group or convictions. To that end, we examined the effect of threat and the two components of the devoted actor framework—identity fusion and sacred values—on aggressive inclinations. These inclinations were registered with a videogame that allowed participants to destroy ingroup and outgroup symbols. Two experiments indicated that devoted actors reacted to threats to their ingroup and value by increasing aggressive inclinations against the rival group. This effect was apparently mediated by the perceived physical strength of the ingroup versus foes. Results suggest that devoted actors might be more prone to self-sacrifice, but also to attack those who threaten their group or values.
APA, Harvard, Vancouver, ISO, and other styles
12

Angelou, Georgios, and Anastasio Economides. "A Fuzzy Growth Options Approach under Competition Threat." Journal of International Business and Economy 8, no. 1 (July 1, 2007): 23–42. http://dx.doi.org/10.51240/jibe.2007.1.3.

Full text
Abstract:
Information Communication Technology (ICT) projects may contain “wait and see” components, which give ICT managers the option to defer decisions until some uncertainty is resolved. In this paper, we treat these ICT opportunities as Real Options (RO) and assume that there is competition threat that can influence negatively or even worst eliminate their values. We consider exogenous competition modeling assuming that competitors are entering randomly into the market and cause a degradation of the available to the firm of interest overall market value. We introduce fuzzy logic and combine it with ROs under competition threat. The theory developed implicitly contains not only the deferral flexibility of projects but also the possibility of considering vague information, which needs to be taken into account when (long-time range) financial decisions are made. Our proposed model is applied to a real life broadband technology business activity associated with “Egnatia Odos S.A.” strategic decision to deploy optical fiber backbone network along the national motorway “Egnatia Odos.” The results of our model prove that FROs analysis may increase the overall value of the ICT business activity despite competition threat.
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Hongyu, Renyun Zeng, Fengyan Wang, Guangquan Xu, and Jiyong Zhang. "An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things." Security and Communication Networks 2020 (November 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/6656066.

Full text
Abstract:
With the wide application of network technology, the Internet of Things (IoT) systems are facing the increasingly serious situation of network threats; the network threat situation assessment becomes an important approach to solve these problems. Aiming at the traditional methods based on data category tag that has high modeling cost and low efficiency in the network threat situation assessment, this paper proposes a network threat situation assessment model based on unsupervised learning for IoT. Firstly, we combine the encoder of variational autoencoder (VAE) and the discriminator of generative adversarial networks (GAN) to form the V-G network. Then, we obtain the reconstruction error of each layer network by training the network collection layer of the V-G network with normal network traffic. Besides, we conduct the reconstruction error learning by the 3-layer variational autoencoder of the output layer and calculate the abnormal threshold of the training. Moreover, we carry out the group threat testing with the test dataset containing abnormal network traffic and calculate the threat probability of each test group. Finally, we obtain the threat situation value (TSV) according to the threat probability and the threat impact. The simulation results show that, compared with the other methods, this proposed method can evaluate the overall situation of network security threat more intuitively and has a stronger characterization ability for network threats.
APA, Harvard, Vancouver, ISO, and other styles
14

Böhringer, Christoph, Jared C. Carbone, and Thomas F. Rutherford. "The Strategic Value of Carbon Tariffs." American Economic Journal: Economic Policy 8, no. 1 (February 1, 2016): 28–51. http://dx.doi.org/10.1257/pol.20130327.

Full text
Abstract:
We ask whether the threat of carbon tariffs might lower the cost of reductions in world carbon emissions by inducing unregulated regions to adopt emission controls. We use a numerical model to generate payoffs of a game in which a coalition regulates emissions and chooses whether to employ carbon tariffs against unregulated regions. Unregulated regions respond by abating, retaliating, or ignoring the tariffs. In the Nash equilibrium, the use of tariffs is a credible and effective threat. It induces cooperation from noncoalition regions that lowers the cost of global abatement substantially relative to the case where the coalition acts alone. (JEL D58, F13, F18, H23, Q54, Q58)
APA, Harvard, Vancouver, ISO, and other styles
15

McComb, Karen, Graeme Shannon, Sarah M. Durant, Katito Sayialel, Rob Slotow, Joyce Poole, and Cynthia Moss. "Leadership in elephants: the adaptive value of age." Proceedings of the Royal Society B: Biological Sciences 278, no. 1722 (March 16, 2011): 3270–76. http://dx.doi.org/10.1098/rspb.2011.0168.

Full text
Abstract:
The value of age is well recognized in human societies, where older individuals often emerge as leaders in tasks requiring specialized knowledge, but what part do such individuals play in other social species? Despite growing interest in how effective leadership might be achieved in animal social systems, the specific role that older leaders may play in decision-making has rarely been experimentally investigated. Here, we use a novel playback paradigm to demonstrate that in African elephants ( Loxodonta africana ), age affects the ability of matriarchs to make ecologically relevant decisions in a domain critical to survival—the assessment of predatory threat. While groups consistently adjust their defensive behaviour to the greater threat of three roaring lions versus one, families with younger matriarchs typically under-react to roars from male lions despite the severe danger they represent. Sensitivity to this key threat increases with matriarch age and is greatest for the oldest matriarchs, who are likely to have accumulated the most experience. Our study provides the first empirical evidence that individuals within a social group may derive significant benefits from the influence of an older leader because of their enhanced ability to make crucial decisions about predatory threat, generating important insights into selection for longevity in cognitively advanced social mammals.
APA, Harvard, Vancouver, ISO, and other styles
16

Saidu, I. R., T. Suleiman, and U. E. Akpan. "THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE." FUDMA JOURNAL OF SCIENCES 5, no. 1 (June 25, 2021): 193–201. http://dx.doi.org/10.33003/fjs-2021-0501-554.

Full text
Abstract:
This research work was conducted to examine critically and systematically cyber threat intelligence challenges and prospects in Nigeria. It judges the value and relevance of cyber threat intelligence in the society where they are lacking in providing necessary information. Dealing with these challenges that may cause threat intelligence to be useless has become a major concern to Nigeria. The work was intended to achieve the following objectives: to examine the nature of cybersecurity in Nigeria, to analyse the cybersecurity threats that can disrupt the functioning of the country, to identify the challenges facing the Nigeria cyberspace and the conduct of a cyber threat intelligence analysis, to discuss the means by which cyber threat can be used to boost Nigeria’s National Security Policy, to make recommendations to preserve important intelligence capabilities while ensuring the protection of its critical infrastructures through the use of threat intelligence. The scope of the study was limited to the period 2009 – 2019. The research was analytical. Relevant data were collected from both primary and secondary sources of data. The data analysis used the percentage instrument and the following conclusions were drawn: that threat data overload, threat data quality, privacy and legal issues and interoperability issues are some of the challenges of cyber threat intelligence; also, the need to continually invest in research, build local cyber threat management infrastructure and enhance the ability to anticipate, detect, respond and contain information security threats is very crucial. Nigeria
APA, Harvard, Vancouver, ISO, and other styles
17

MURADI, Clark, Leo AGUSTINO, Idil AKBAR, and Firman MANAN. "Narkoba and Security Threats in Indonesia: Regional Responsiveness Index and Eradication Policies." Journal of Advanced Research in Law and Economics 11, no. 4 (June 15, 2020): 1206. http://dx.doi.org/10.14505//jarle.v11.4(50).17.

Full text
Abstract:
This article aims to explain how the drug phenomenon with all its developments that occur in Indonesia, threats that arise against security, its impact and how efforts in overcoming it. The article is based on the results of a national survey of the city index for responding to drug threats in 173 districts and cities that have BNN representatives. Through quantitative methods with statistical calculations Index Kota Tanggap Ancaman Narkoba was divided into two categories of analysis units: family analysis unit and non-family analysis unit. The Index value obtained was transformed into categories that represent the level of responsiveness to the threat of narcotics. The results of the majority of regions in Indonesia are still not good responsiveness to the threat of drugs. Index values for all variables (family, institutional, territorial, community and legal resilience) are still below 40, except for family resilience at 64.84. These values also serve as indicators for developing integral policies so that prevention and abuse of drugs can be carried out.
APA, Harvard, Vancouver, ISO, and other styles
18

Pokhrel, Geeta, Anju Upadhyaya, and Mahendra Singh Thapa. "Threats and Conservation of Paris polyphylla: Vulnerable Medicinal Plant in Panchase Protected Forest, Nepal." Forestry: Journal of Institute of Forestry, Nepal 16 (November 30, 2019): 14–30. http://dx.doi.org/10.3126/forestry.v16i0.28351.

Full text
Abstract:
Government of Nepal has enlisted Paris polyphylla as the priority medicinal and aromatic plant (MAPs) for the economic development of the country due to its high market price and demand. But in Panchase Protected Forest (PPF) its value is not well recognized. Therefore, this study aimed to explore the distribution of the plant, assess threats and interventions for conservation and promotion in Bhadaure Tamagi area of Kaski district. Participatory resource mapping, semi-structured questionnaire and key informant survey were carried out for data collection. The plant was distributed at nine different patches of the forest at moist, fertile, and sloppy sites in Northern and Eastern aspects, and spotted only at two patches. Among 10 threat factors, illegal collection with Relative Threat Factor Severity Index (RTFSI) value of 0.90 was the major threat to the plant, and forest fire with value of 0.25 was the least impacting threat. Poor management and institutional factors were not understood by local people directly. Though the plant has high market value, only 6% of the locals used the plant for direct income whereas the rest used for the household purpose as they have no idea of the market. It is recommended to empower and support local people for commercial cultivation and trade, sustainable harvesting techniques, and to bring all the concerned stakeholders of PPF together to work effectively to conserve and promote this wonder herb.
APA, Harvard, Vancouver, ISO, and other styles
19

Denning, Stephen. "Why maximizing shareholder value is a threat to U.S. business." Strategy & Leadership 45, no. 6 (November 20, 2017): 3–10. http://dx.doi.org/10.1108/sl-09-2017-0084.

Full text
Abstract:
Purpose The article outlines the arguments by the proponents and opponents of maximizing shareholder value and identifies the true threat the concept poses to U.S. businesses. Design/methodology/approach The author quotes authorities on both side of the debate over the validity of maximizing shareholder value as a driving principle of management and points out the risks and the alternatives. He notes that many long-established public corporations in the U.S. have chosen to bow to the power of shareholders and reward them instead of attempting risky initiatives that might create new customers or enhance customer value. Findings Maximizing shareholder value is either the guiding principle of business success that provides a rightful reward for investors or a corrupting influence that thwarts investment in employee talent, sustaining innovation, product quality and customer loyalty. Practical implications Since the C-suite is hugely compensated for increases in the current stock price, decisions based on “shareholder value” tend to be decisions that boost the current stock price. Social implications As evidence the problem is being recognized, some CEOs have already spoken out against preferentially rewarding stockholders instead of investing to sustain the organization. Originality/value The author concludes that shareholder value theory has not only failed on its own narrow terms of making money for shareholders. It has been steadily destroying the productive capacity and dynamism of the entire economy.
APA, Harvard, Vancouver, ISO, and other styles
20

Sackett, Paul R., Chaitra M. Hardison, and Michael J. Cullen. "On the Value of Correcting Mischaracterizations of Stereotype Threat Research." American Psychologist 59, no. 1 (2004): 48–49. http://dx.doi.org/10.1037/0003-066x.59.1.48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Kim, Andy Jeesu, and Brian A. Anderson. "Threat reduces value-driven but not salience-driven attentional capture." Emotion 20, no. 5 (August 2020): 874–89. http://dx.doi.org/10.1037/emo0000599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

HAJI, ISHTIYAQUE. "Incompatibilism’s Threat to Worldly Value: Source Incompatibilism, Desert, and Pleasure." Philosophy and Phenomenological Research 78, no. 3 (May 2009): 621–45. http://dx.doi.org/10.1111/j.1933-1592.2009.00258.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Bader, Benjamin, Gabriele Suder, and Robert Grosse. "Terrorism as an external threat factor in global value chains." Thunderbird International Business Review 62, no. 2 (December 30, 2019): 135–48. http://dx.doi.org/10.1002/tie.22118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Yiting, and Guillaume Rocheteau. "ON THE THREAT OF COUNTERFEITING." Macroeconomic Dynamics 15, S1 (December 16, 2010): 10–41. http://dx.doi.org/10.1017/s1365100510000544.

Full text
Abstract:
We study counterfeiting of currency in a search-theoretic model of monetary exchange. In contrast to Nosal and Wallace [Journal of Monetary Economics 54, 229–246 (2007)], we establish that counterfeiting does not pose a threat to the existence of a monetary equilibrium; i.e., a monetary equilibrium exists irrespective of the cost of producing counterfeits, or the ease with which genuine money can be authenticated. However, the possibility of counterfeiting fiat money can affect its value, velocity, output, and welfare, even if no counterfeiting occurs in equilibrium. We provide two extensions of the model under which the threat of counterfeiting can materialize: counterfeits can circulate across periods, and sellers set terms of trade in some matches. Policies that make the currency more costly to counterfeit or easier to recognize raise the value of money and society's welfare, but the latter policy does not always decrease counterfeiting.
APA, Harvard, Vancouver, ISO, and other styles
25

Raio, Candace M., Catherine A. Hartley, Temidayo A. Orederu, Jian Li, and Elizabeth A. Phelps. "Stress attenuates the flexible updating of aversive value." Proceedings of the National Academy of Sciences 114, no. 42 (October 2, 2017): 11241–46. http://dx.doi.org/10.1073/pnas.1702565114.

Full text
Abstract:
In a dynamic environment, sources of threat or safety can unexpectedly change, requiring the flexible updating of stimulus−outcome associations that promote adaptive behavior. However, aversive contexts in which we are required to update predictions of threat are often marked by stress. Acute stress is thought to reduce behavioral flexibility, yet its influence on the modulation of aversive value has not been well characterized. Given that stress exposure is a prominent risk factor for anxiety and trauma-related disorders marked by persistent, inflexible responses to threat, here we examined how acute stress affects the flexible updating of threat responses. Participants completed an aversive learning task, in which one stimulus was probabilistically associated with an electric shock, while the other stimulus signaled safety. A day later, participants underwent an acute stress or control manipulation before completing a reversal learning task during which the original stimulus−outcome contingencies switched. Skin conductance and neuroendocrine responses provided indices of sympathetic arousal and stress responses, respectively. Despite equivalent initial learning, stressed participants showed marked impairments in reversal learning relative to controls. Additionally, reversal learning deficits across participants were related to heightened levels of alpha-amylase, a marker of noradrenergic activity. Finally, fitting arousal data to a computational reinforcement learning model revealed that stress-induced reversal learning deficits emerged from stress-specific changes in the weight assigned to prediction error signals, disrupting the adaptive adjustment of learning rates. Our findings provide insight into how stress renders individuals less sensitive to changes in aversive reinforcement and have implications for understanding clinical conditions marked by stress-related psychopathology.
APA, Harvard, Vancouver, ISO, and other styles
26

Öztürk, Resul. "Health or Death? The Online Purchase Intentions of Consumers during the COVID-19 Pandemic." Transnational Marketing Journal 8, no. 2 (October 20, 2020): 219–41. http://dx.doi.org/10.33182/tmj.v8i2.1069.

Full text
Abstract:
Consumer behaviour can change according to time and conditions. The hedonic and utilitarian values that evoke our sense of purchase can be effective in producing these differences. Specifically, consumers display purchasing activities with different values and behaviours when they feel insecure, such the feeling of a potential threat to their lives, such as during the current COVID-19 pandemic. The present cross-sectional study aims to investigate the effects of such a potential threat on online purchase intentions toward food products and whether hedonic and/or utilitarian shopping values play a mediating role in these relations during the current COVID-19 pandemic conditions in Turkey. More specifically, data was collected from 556 food consumers during April 2020 using an online survey. This study used a structural equation model to analyse and test the research hypotheses. The results show that a perceived potential threat to life (death threat) is positively related to both utilitarian versus hedonic shopping value and online purchase intentions toward food products. Also, utilitarian versus hedonic shopping values are positively related to a death threat with regard to food products. Utilitarian shopping and hedonic shopping values can play a mediating role between death threat and online purchase intentions. This demonstrates that a strong perceived threat to life, such as in the case of the COVID-19 pandemic or other high risk factors, will result in the intention to buy foods providing hedonic or utilitarian value, which promotes online shopping.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhao, Taiyang, Wei Song, Xiaotong Jin, Hongjing Cui, and Yang Li. "Hedonism or self-growth? The influence of perceived control on individual product preferences for individuals under self-threat." Asia Pacific Journal of Marketing and Logistics 32, no. 6 (August 28, 2019): 1343–61. http://dx.doi.org/10.1108/apjml-02-2019-0072.

Full text
Abstract:
Purpose The purpose of this paper is to study the influence of perceived control on product preferences of consumers under self-threat. Design/methodology/approach By conducting four experiments, this paper manipulated the participants’ self-threat and three sources of perceived control – namely, the controllability of the threat itself, the internal and external locus of control of the individual and priming the existing positive or negative experience of the individuals. After the manipulations, the participants’ product preferences for self-growth goods or hedonic goods were measured. Findings The findings of this research indicated that when consumers have a higher perceived control of the threats they are facing, they are more likely to adopt problem-focused coping strategies and show a preference for self-growth goods, which can help them resolve their threats. However, when consumers have a lower perceived control on the threats they are facing, they are more likely to adopt emotion-focused coping strategies and show a preference for hedonic goods, which can help them adjust their emotions. Originality/value This paper systematically confirms the interactive effect of perceived control and self-threat on consumers’ product preferences, as well as the meditation role of problem-focused coping and emotion-focused coping. It also provides insights for marketers to know what factors may affect consumers’ preferences for products in self-threat situations, thus contributing to marketing practices.
APA, Harvard, Vancouver, ISO, and other styles
28

KARZAEVA, N. N. "ASSESSMENT OF THE RELIABILITY OF THE INFORMATION OF THE ACCOUNTING SYSTEM OF ECONOMIC ENTITY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1, no. 7 (2021): 94–99. http://dx.doi.org/10.36871/ek.up.p.r.2021.07.01.012.

Full text
Abstract:
The information base of management decision-making makes it necessary to include a threat to the accounting system of an economic entity in the information security objects. The article proposes two criteria for classifying threats to the accounting system: the content of threats and the impact on the reliability of financial information. The conclusion is made about the construction of indicators for assessing only threats that have a direct impact on the reliability of information. Based on the principles of validity, measurability and simplicity, indicators corresponding to the threat of accounting activities are constructed. The total value of these indicators and the level of materiality of information are elements of the model for assessing the level of security of accounting activities proposed by the author.
APA, Harvard, Vancouver, ISO, and other styles
29

Alsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (April 22, 2021): 1005. http://dx.doi.org/10.3390/electronics10091005.

Full text
Abstract:
As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization’s assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders’ employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.
APA, Harvard, Vancouver, ISO, and other styles
30

Khoshkhoo, Roohollah. "Adaptation of Line Operations Safety Audit (LOSA) to Dispatch Operations (DOSA)." Journal of Airline and Airport Management 7, no. 2 (January 29, 2018): 126. http://dx.doi.org/10.3926/jairm.112.

Full text
Abstract:
Purpose: Dispatch Operations Safety Audit (DOSA) is a proactive and predictive method in safety management system that detects the capabilities and pitfalls of dispatcher performance. In this study, Dispatch-Line Operations Safety Audit is carried out in an airline and results are analyzed and discussed.Design/methodology/approach: The method of DOSA implementation for flight operations officers is similar to LOSA for flight crew.Findings: Results show that DOSA has an important effect on Threat and Error Management (TEM) in the Operations Control Center (OCC).Originality/value: Potential applications of this research include the better threat and error management in OCC with the implementation of DOSA as well as identification of threats and errors types for FOOs in OCC. Also distribution of threats and errors in different phases of dispatch shift is discussed, therefore syllabuses of training courses can be provided with respect to threat and error types for flight operations officers.
APA, Harvard, Vancouver, ISO, and other styles
31

Mesinger, F. "Bias Adjusted Precipitation Threat Scores." Advances in Geosciences 16 (April 9, 2008): 137–42. http://dx.doi.org/10.5194/adgeo-16-137-2008.

Full text
Abstract:
Abstract. Among the wide variety of performance measures available for the assessment of skill of deterministic precipitation forecasts, the equitable threat score (ETS) might well be the one used most frequently. It is typically used in conjunction with the bias score. However, apart from its mathematical definition the meaning of the ETS is not clear. It has been pointed out (Mason, 1989; Hamill, 1999) that forecasts with a larger bias tend to have a higher ETS. Even so, the present author has not seen this having been accounted for in any of numerous papers that in recent years have used the ETS along with bias "as a measure of forecast accuracy". A method to adjust the threat score (TS) or the ETS so as to arrive at their values that correspond to unit bias in order to show the model's or forecaster's accuracy in \\textit{placing} precipitation has been proposed earlier by the present author (Mesinger and Brill, the so-called dH/dF method). A serious deficiency however has since been noted with the dH/dF method in that the hypothetical function that it arrives at to interpolate or extrapolate the observed value of hits to unit bias can have values of hits greater than forecast when the forecast area tends to zero. Another method is proposed here based on the assumption that the increase in hits per unit increase in false alarms is proportional to the yet unhit area. This new method removes the deficiency of the dH/dF method. Examples of its performance for 12 months of forecasts by three NCEP operational models are given.
APA, Harvard, Vancouver, ISO, and other styles
32

Tekic, Zeljko, and Dragan Kukolj. "Threat of Litigation and Patent Value: What Technology Managers Should Know." Research-Technology Management 56, no. 2 (March 2013): 18–25. http://dx.doi.org/10.5437/08956308x5602093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

EVANS, TONY. "The limits of tolerance: Islam as counter-hegemony?" Review of International Studies 37, no. 4 (May 21, 2010): 1751–73. http://dx.doi.org/10.1017/s0260210510000185.

Full text
Abstract:
AbstractFollowing recent acts of terrorism in many parts of the world, Islam has become an object of fear. While the threat of violence is undoubtedly an element that inspires this fear, Islam's counter-hegemonic threat is not limited to violence alone. Given its 1.2 billion following, Islam also offers a challenge to the central values that describe the dominant neo-liberal world order, particularly those values that legitimate the global political economy. Although tolerance is an important value in liberal thought, tolerance cannot be exercised where counter-hegemonic threats include challenges to the central tenets of liberalism. This article argues that the current fear of Islam is motivated by just such a challenge. By looking at four central concepts where liberal and Islamic thought diverge – reason and revelation, private property, rights and duties, and government and state – this article seeks to gain a more nuanced insight into current attitudes towards Islam and the fear of counter-hegemony.
APA, Harvard, Vancouver, ISO, and other styles
34

Oliveira, Eduardo, and Carlos Cabral Cardoso. "Stereotype threat and older worker’s attitudes: a mediation model." Personnel Review 47, no. 1 (February 5, 2018): 187–205. http://dx.doi.org/10.1108/pr-11-2016-0306.

Full text
Abstract:
Purpose Taking a social identity approach, the purpose of this paper is to examine the extent to which age-based stereotype threat mediates the relationships between older workers’ negative age-based metastereotypes and two negative work attitudes: organizational disidentification and work disengagement. Design/methodology/approach A two-wave cross-sectional design was adopted to collect data from 423 blue-collar older workers of the Portuguese manufacturing sector. Structural equation modeling was used to test the mediation model. Findings The analyses show that age-based stereotype threat partially mediates the relationship between negative age-based metastereotypes and negative work attitudes. Moreover, findings suggest that older workers respond to negative age-based metastereotypes through threat reactions, and undesirable work attitudes. Originality/value This paper contributes to the literature by showing the importance of negative age-based metastereotypes and age-based stereotype threat in workplace dynamics. It also provides evidence that age threats impair the relationship older workers keep with their organization and their work.
APA, Harvard, Vancouver, ISO, and other styles
35

Miles, Edward W., Jeff Schatten, and Elizabeth Chapman. "How face threat sensitivity affects proactive negotiation behavior." Organization Management Journal 17, no. 1 (March 19, 2020): 2–14. http://dx.doi.org/10.1108/omj-05-2019-0725.

Full text
Abstract:
Purpose Face threat sensitivity (FTS) has been found to influence objective negotiated outcomes when the threat to face is activated. The purpose of this study is to extend that research by testing whether FTS – which is defined as a propensity to act – is associated with the outcomes of negotiators when the threat has not been specifically activated. Face theory specifies that face threats can cause individuals to take proactive steps to avoid threats before they might occur. Design/methodology/approach Drawing on face theory and social role theory, the authors conduct a negotiation experiment and use hierarchical regression to test hypotheses concerning the relationship between FTS for sellers and buyers on negotiated outcomes in both distributive and integrative negotiations. The authors also use moderated regression to test if gender moderates the relationship between buyer and seller FTS and negotiation outcomes. Findings Results show that, when the threat is not activated, high FTS buyers pay more than low FTS buyers. Consistent with face theory and social role theory, this effect is moderated by gender, with the association being stronger for women buyers than for men buyers. Originality/value This paper exhibits that FTS can influence negotiator behavior even when FTS is not activated. This is valuable to negotiation scholars and practitioners who are interested in the role that individual characteristics play in negotiation behavior.
APA, Harvard, Vancouver, ISO, and other styles
36

Peterson, Timothy M. "Reconsidering economic leverage and vulnerability: Trade ties, sanction threats, and the success of economic coercion." Conflict Management and Peace Science 37, no. 4 (September 18, 2018): 409–29. http://dx.doi.org/10.1177/0738894218797024.

Full text
Abstract:
I contend that a state’s position in the global trade network affects the initiation and outcome of sanction threats. A state is vulnerable, and thus more likely to acquiesce, when its trade has low value to trade partners that are well connected to the global trade network. Conversely, a state has leverage that could motivate the use of sanction threats when its trade has high value to trade partners that are otherwise not well connected. Capturing leverage/vulnerability with an interaction between two network centrality measures, results indicate that vulnerability is associated with acquiescence to sanctions, while leverage is associated with threat initiation.
APA, Harvard, Vancouver, ISO, and other styles
37

Xu, Yanping, Tingcong Ye, Xin Wang, Yuping Lai, Jian Qiu, Lingjun Zhang, and Xia Zhang. "GMM with parameters initialization based on SVD for network threat detection." Journal of Intelligent & Fuzzy Systems 40, no. 1 (January 4, 2021): 477–90. http://dx.doi.org/10.3233/jifs-200066.

Full text
Abstract:
In the field of security, the data labels are unknown or the labels are too expensive to label, so that clustering methods are used to detect the threat behavior contained in the big data. The most widely used probabilistic clustering model is Gaussian Mixture Models(GMM), which is flexible and powerful to apply prior knowledge for modelling the uncertainty of the data. Therefore, in this paper, we use GMM to build the threat behavior detection model. Commonly, Expectation Maximization (EM) and Variational Inference (VI) are used to estimate the optimal parameters of GMM. However, both EM and VI are quite sensitive to the initial values of the parameters. Therefore, we propose to use Singular Value Decomposition (SVD) to initialize the parameters. Firstly, SVD is used to factorize the data set matrix to get the singular value matrix and singular matrices. Then we calculate the number of the components of GMM by the first two singular values in the singular value matrix and the dimension of the data. Next, other parameters of GMM, such as the mixing coefficients, the mean and the covariance, are calculated based on the number of the components. After that, the initialization values of the parameters are input into EM and VI to estimate the optimal parameters of GMM. The experiment results indicate that our proposed method performs well on the parameters initialization of GMM clustering using EM and VI for estimating parameters.
APA, Harvard, Vancouver, ISO, and other styles
38

Andersen, Elizabeth. "Participant Retention in Randomized, Controlled Trials: The Value of Relational Engagement." International Journal of Human Caring 11, no. 4 (June 2007): 46–51. http://dx.doi.org/10.20467/1091-5710.11.4.46.

Full text
Abstract:
Although participant retention is critically important for the conduct of randomized controlled trials, relatively little is known about factors that lead to attrition. I argue that commonly used retention strategies are not cost effective in large trials because most participants do not value them. Attrition in experimental research occurs because we rely on conventional retention strategies and we neglect the unspoken values and beliefs of our participants. The most important of these is the value of relational engagement. Relational engagement does pose a potential threat to internal validity in trials with small sample sizes. This threat is discussed. In conclusion, I suggest that large trials should consider supporting relational engagement rather than spending money on conventional retention strategies.
APA, Harvard, Vancouver, ISO, and other styles
39

Kurniawan, Rizal, and Saifuddin Azwar. "Konstruksi Skala Kepedulian terhadap Penggunaan Energi." Jurnal Ilmu Perilaku 1, no. 1 (August 1, 2017): 22. http://dx.doi.org/10.25077/jip.1.1.22-32.2017.

Full text
Abstract:
Using electricity and fuel oil might have some negative impact towards the national economy and the environment. Psychological scale for measuring awareness of energy usage has never been tested before. The main purpose of this study is to construct psychological scale for measuring energy usage. The concept of Amburgey (2012) has been used to describe of psychological concern that are perceived threat and desired change. Perceived threat is an evaluation of a person to a problem and desired change is one’s willingness to resolve that problem. Four hundred-thirty eight students were enrolled in this study with a mean of age 21 years old. The results of content item validation show that one item from perceived threat’s subscale has value of Aiken (V) less than .50 and all of items from desired change’s subscale have V value greater than .50. Result from item’s discrimination process show that 40% items from perceived threat’s subscale has low of discrimination power and desired change’s sub scale has 31%. Alpha value for perceived threat’s subscales is .76 and desired change’s sub scale is .78. The concern for energy usage scale has poor model fit.
APA, Harvard, Vancouver, ISO, and other styles
40

Reisel, William D., and Moshe Banai. "Comparison of a Multidimensional and a Global Measure of Job Insecurity: Predicting Job Attitudes and Work Behaviors." Psychological Reports 90, no. 3 (June 2002): 913–22. http://dx.doi.org/10.2466/pr0.2002.90.3.913.

Full text
Abstract:
This paper examined the multidimensional formulation of job insecurity theory described by Greenhalgh and Rosenblatt in 1984. They held that job insecurity is multidimensional and is comprised of two principle threats, (1) threat to the job and (2) threat to job features. To date, there has been no empirical test comparing the predictive value of the separate dimensions of job insecurity on the outcome variables commitment, trust, and job search behavior. A total of 276 managers completed surveys of their job insecurity using both multidimensional and global measures of job insecurity. Regression analysis suggested that the job threat dimension better explains outcome attitudes and behaviors than the job features dimension. Further, contrary to earlier reports, the global measure of job insecurity explained more variance in two out of three outcome variables investigated here. Implications for job insecurity measurement and theory are discussed.
APA, Harvard, Vancouver, ISO, and other styles
41

Viney, Linda L. "Loss of Life and Loss of Bodily Integrity: Two Different Sources of Threat for People who are Ill." OMEGA - Journal of Death and Dying 15, no. 3 (November 1985): 207–22. http://dx.doi.org/10.2190/x1b1-3c94-v2d5-amqj.

Full text
Abstract:
Personal construct theory was used to generate some questions about the meanings that different types of threat–loss of life and loss of bodily integrity–hold for people who are severely ill. Content analyses of the responses of ill people and healthy people indicated that ill people expressed more concern with both types of threat than healthy people. Ill people who were suffering from acute rather than chronic illness, who were scheduled for surgery and who were hospitalized rather than being cared for at home expressed more concern about loss of life but not about loss of bodily integrity than other ill people. Each type of threatened loss was found to be associated with a different set of psychological states for people who were ill. Threat of loss of life was associated with indirectly expressed anger and uncertainty but also with the expression of many positive feelings. Threat of loss of bodily integrity was also associated with indirectly expressed anger, but with direct expression of it too, together with hopelessness and helplessness. Patients facing the first threat saw themselves as actively engaged in relationships with others, while those facing the second viewed themselves more often as passive participants. The value of this information about the meanings of threats of loss of life and loss of bodily integrity for the counseling of ill people dealing with these threats was illustrated by two case studies.
APA, Harvard, Vancouver, ISO, and other styles
42

Mobbs, D., R. Yu, J. B. Rowe, H. Eich, O. FeldmanHall, and T. Dalgleish. "Neural activity associated with monitoring the oscillating threat value of a tarantula." Proceedings of the National Academy of Sciences 107, no. 47 (November 8, 2010): 20582–86. http://dx.doi.org/10.1073/pnas.1009076107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bal, Payal, Ayesha I. T. Tulloch, Iadine Chadès, Josie Carwardine, Eve McDonald‐Madden, and Jonathan R. Rhodes. "Quantifying the value of monitoring species in multi‐species, multi‐threat systems." Methods in Ecology and Evolution 9, no. 7 (June 28, 2018): 1706–17. http://dx.doi.org/10.1111/2041-210x.13037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Garcia-Retamero, Rocio, Stephanie M. Müller, and David L. Rousseau. "The Impact of Value Similarity and Power on the Perception of Threat." Political Psychology 33, no. 2 (March 13, 2012): 179–93. http://dx.doi.org/10.1111/j.1467-9221.2012.00869.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Øverland, Gerhard. "Conditional Threats." Journal of Moral Philosophy 7, no. 3 (2010): 334–45. http://dx.doi.org/10.1163/174552410x511400.

Full text
Abstract:
AbstractIn this paper I ponder the moral status of conditional threats, in particular the extent to which a threatened party would be permitted to use (lethal) defensive force. I first investigate a mugger case before turning briefly to the more complicated issue of national defence in the face of an invading army. One should not exaggerate the level of protection people under threat owe their conditioned killers simply because what is extorted is of little value. After all, either the conditional threat is willing to kill for something she has no claim on at all, or, if she has a just claim on it – or good reason to believe that she has – she is willing to kill to (re)acquire something of not much worth. In both cases the moral culpability of the conditional threat could be seen as reducing her claim on protection from harm.
APA, Harvard, Vancouver, ISO, and other styles
46

Rizki Atthoriq Hidayat and Muhammad Hanif. "SPATIAL MODELING OF THE THREAT OF DAMAGE TO THE PEATLAND ECOSYSTEM IN THE MAINLAND OF BENGKALIS REGENCY, RIAU PROVINCE." Sociae Polites 21, no. 2 (December 9, 2020): 193–208. http://dx.doi.org/10.33541/sp.v21i3.2249.

Full text
Abstract:
Peatlands are the stretch of ecosystem landscape with unique characteristics, both physically, chemically, and biodiversity. Anthropogenic activities in peatland use and disasters pose a threat to the preservation of the peatland ecosystem, which has impacts toward abiotic to the element of biodiversity (biotic). The purpose of this research is to model how the threat of the peatland ecosystem by using spatial data modeling. The method in this research using cloud-based GIS data analysis from Google earth engine, modeling distance parameter to variable modeling of interaction among landscapes on the peatland, and weight sum the value over raster-based spatial layer to determinate the thereat in the peatland ecosystem. The results of this study found zones where hot spots often occur. Modeling with euclidean distance to all modeling variables (except temperature) gives a clear effect on how the threats from each landscape interact with each other. We found that the threat of peatland damage in the high threat class dominates the plantation area reaching 30.9% of the total peatland area, whereas the forest landscape only has a high threat with a percentage of 1.9% and a low threat which the ecosystem is stable and natural reaching over 34.7 %. From this model, we succeeded in bringing up the idea to determine the priority area for policies where need to be done in handling the protection of peatland ecosystems, especially in plantations where the highest percentage of the ecosystem threat is in the high level with integrated peatland management. Keywords: Peatland ecosystem, landscape, threat
APA, Harvard, Vancouver, ISO, and other styles
47

Pradanti, Della Safera. "EVALUATION OF FORMAL RISK ASSESSMENT IMPLEMENTATION OF MIDDLE EAST RESPIRATORY SYNDROME CORONAVIRUS IN 2018." Jurnal Berkala Epidemiologi 7, no. 3 (September 30, 2019): 197. http://dx.doi.org/10.20473/jbe.v7i32019.197-206.

Full text
Abstract:
Background: Confirmed cases of Middle East respiratory syndrome caused by coronavirus (MERS-CoV) were not found until the end of February 2019 in Indonesia. The spreading threat of MERS-CoV disease in Indonesia is still quite vast, mainly because of the amount of international travel from Indonesia to Saudi Arabia for the purpose of Hajj and Umrah, vacationing, working, or settling in the Arabian Peninsula. Purpose: The aim of this study is to evaluate the implementation of formal risk assessment (FRA) and MERS-CoV risk in Indonesia in 2018, having regard to threat, vulnerability, and capacity. Method: This study is a non-reactive observation study presented descriptively using the literature method and in-depth interviews with staff of the subdirectorat of Penyakit Infeksi Emerging Kementerian Kesehatan Republik. Decision-making for the threat category and vulnerability category is based on the highest threat index and vulnerability values, while the capacity category is based on the lowest capacity index value. Results: This study shows that there are three threat subcategories and two vulnerability subcategories that have high index scores and eight capacity subcategories that have low scores. Conclusion: The implementation of risk assessment for MERS-CoV with the FRA method as a whole has been maximally pursued. However, there are still shortcomings in the results of the research that need to be improved through further interventions to reduce the subcategory values that are high in the threat and vulnerability index and to increase the value of the low capacity index.
APA, Harvard, Vancouver, ISO, and other styles
48

Oliveira, Eduardo, and Carlos Cabral-Cardoso. "Older workers’ representation and age-based stereotype threats in the workplace." Journal of Managerial Psychology 32, no. 3 (April 10, 2017): 254–68. http://dx.doi.org/10.1108/jmp-03-2016-0085.

Full text
Abstract:
Purpose The purpose of this paper is to examine the extent to which negative age-based metastereotypes mediate the relationship between the representation of older workers and two forms of stereotype threat in the workplace: own-reputation and group-reputation. Adopting a social identity perspective, this paper also explores whether age diversity beliefs moderate the relationship between negative age-based metastereotypes and stereotype threats. Design/methodology/approach A cross-sectional design was adopted with bootstrapped mediation and moderation analyses. The data were collected from 567 older workers working in 15 manufacturing companies. Findings The analyses provide support for partial mediation and for a moderation effect of age diversity beliefs in the relationship between negative age-based metastereotypes and own-reputation threat. The results hold while controlling for age, objective organizational age diversity, and organizational tenure. Research limitations/implications The limitations of this study include its cross-sectional nature and the need for further work regarding older workers’ metastereotypes about middle-aged workers. Practical implications For stereotype threat interventions to be effective they must identify beforehand the target and the source of the threat. Moreover, interventions should aim for the development of a sense of identity on the organization as it may pave the way for members of different age groups to build bonds and for intergenerational boundaries to be blurred. Originality/value This paper contributes to the literature by showing the importance of negative age-based metastereotypes in workplace age dynamics. It also provides further support for a multi-threat approach to the experience of age-based stereotype threats in the workplace.
APA, Harvard, Vancouver, ISO, and other styles
49

Shechner, Tomer, and Yair Bar-Haim. "Threat Monitoring and Attention-Bias Modification in Anxiety and Stress-Related Disorders." Current Directions in Psychological Science 25, no. 6 (December 2016): 431–37. http://dx.doi.org/10.1177/0963721416664341.

Full text
Abstract:
Extensive research has demonstrated the effects of threat-related attentional bias on anxiety and stress-related disorders. This review summarizes recent findings from clinical affective neuroscience. It takes a multilevel analysis approach by presenting behavioral and neural findings from studies conducted in laboratories, clinical settings, and real-life situations. Building on recent findings, we propose a new working model linking individual tendencies to attend or avoid threats with the level of danger in a given context. Namely, adaptive or pathological response is determined by threat-monitoring flexibility and plasticity in an ever-changing environment. The review culminates by describing the potential therapeutic value of attention-bias modification in the treatment of anxiety and stress-related disorders.
APA, Harvard, Vancouver, ISO, and other styles
50

Du, Lili, Yaqin Fan, Lvyang Zhang, Lianying Wang, and Tianhang Sun. "A Summary of the Development of Cyber Security Threat Intelligence Sharing." International Journal of Digital Crime and Forensics 12, no. 4 (October 2020): 54–67. http://dx.doi.org/10.4018/ijdcf.2020100105.

Full text
Abstract:
In recent years, the sharing of cybersecurity threat intelligence (hereinafter referred to as threat intelligence) has received increasing attention from national network security management organizations and network security enterprises. Academia and industry have conducted research on threat intelligence analysis and sharing. This paper first introduces the value and significance of threat intelligence. Then it introduces the commonly used threat intelligence analysis model. Then it organizes and classifies the threat intelligence sharing norms and threat intelligence vendors. Then it starts from the main problems faced by threat intelligence sharing. A solution to build regional network security capabilities is presented; finally, the future research direction of threat intelligence sharing is explored.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography