Journal articles on the topic 'Threat Value'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threat Value.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rowley, Liv. "The value of threat intelligence." Computer Fraud & Security 2019, no. 10 (October 2019): 20. http://dx.doi.org/10.1016/s1361-3723(19)30109-5.
Full textPalmer, T. E. A. "Electronic Publishing: Value or Threat?" Anaesthesia and Intensive Care 28, no. 4 (August 2000): 361. http://dx.doi.org/10.1177/0310057x0002800402.
Full textDjupe, Paul A., and Brian R. Calfano. "Religious Value Priming, Threat, and Political Tolerance." Political Research Quarterly 66, no. 4 (December 26, 2012): 768–80. http://dx.doi.org/10.1177/1065912912471203.
Full textStephan, Cookie White, Walter G. Stephan, Katherine M. Demitrakis, Ann Marie Yamada, and Dennis L. Clason. "Women's Attitudes Toward Men: an Integrated Threat Theory Approach." Psychology of Women Quarterly 24, no. 1 (March 2000): 63–73. http://dx.doi.org/10.1111/j.1471-6402.2000.tb01022.x.
Full textKim, Andy, and Brian Anderson. "Value-Driven Attentional Capture Under Threat of Shock." Journal of Vision 18, no. 10 (September 1, 2018): 1252. http://dx.doi.org/10.1167/18.10.1252.
Full textRoy, Yanina, Nataliia Mazur, and Olena Riabchun. "STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY." Cybersecurity: Education, Science, Technique, no. 3 (2019): 97–103. http://dx.doi.org/10.28925/2663-4023.2019.3.97103.
Full textHolmes IV, Oscar, Marilyn V. Whitman, Kim S. Campbell, and Diane E. Johnson. "Exploring the social identity threat response framework." Equality, Diversity and Inclusion: An International Journal 35, no. 3 (April 18, 2016): 205–20. http://dx.doi.org/10.1108/edi-08-2015-0068.
Full textBender, Jens, Tobias Rothmund, Peter Nauroth, and Mario Gollwitzer. "How Moral Threat Shapes Laypersons’ Engagement With Science." Personality and Social Psychology Bulletin 42, no. 12 (November 17, 2016): 1723–35. http://dx.doi.org/10.1177/0146167216671518.
Full textZhong, Ming, RenNong Yang, Jun Wu, and Huan Zhang. "Multi-Target Strike Path Planning Based on Improved Decomposition Evolutionary Algorithm." Mathematical Problems in Engineering 2019 (January 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/7205154.
Full textMayton, Daniel. "Value Priority Differences across Levels of Nuclear Threat Concern." Journal of Social Psychology 132, no. 4 (August 1, 1992): 539–41. http://dx.doi.org/10.1080/00224545.1992.9924733.
Full textVázquez, Alexandra, Lucía López-Rodríguez, Mercedes Martínez, Scott Atran, and Ángel Gómez. "Threat Enhances Aggressive Inclinations Among Devoted Actors Via Increase in Their Relative Physical Formidability." Personality and Social Psychology Bulletin 46, no. 10 (March 12, 2020): 1461–75. http://dx.doi.org/10.1177/0146167220907466.
Full textAngelou, Georgios, and Anastasio Economides. "A Fuzzy Growth Options Approach under Competition Threat." Journal of International Business and Economy 8, no. 1 (July 1, 2007): 23–42. http://dx.doi.org/10.51240/jibe.2007.1.3.
Full textYang, Hongyu, Renyun Zeng, Fengyan Wang, Guangquan Xu, and Jiyong Zhang. "An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things." Security and Communication Networks 2020 (November 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/6656066.
Full textBöhringer, Christoph, Jared C. Carbone, and Thomas F. Rutherford. "The Strategic Value of Carbon Tariffs." American Economic Journal: Economic Policy 8, no. 1 (February 1, 2016): 28–51. http://dx.doi.org/10.1257/pol.20130327.
Full textMcComb, Karen, Graeme Shannon, Sarah M. Durant, Katito Sayialel, Rob Slotow, Joyce Poole, and Cynthia Moss. "Leadership in elephants: the adaptive value of age." Proceedings of the Royal Society B: Biological Sciences 278, no. 1722 (March 16, 2011): 3270–76. http://dx.doi.org/10.1098/rspb.2011.0168.
Full textSaidu, I. R., T. Suleiman, and U. E. Akpan. "THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE." FUDMA JOURNAL OF SCIENCES 5, no. 1 (June 25, 2021): 193–201. http://dx.doi.org/10.33003/fjs-2021-0501-554.
Full textMURADI, Clark, Leo AGUSTINO, Idil AKBAR, and Firman MANAN. "Narkoba and Security Threats in Indonesia: Regional Responsiveness Index and Eradication Policies." Journal of Advanced Research in Law and Economics 11, no. 4 (June 15, 2020): 1206. http://dx.doi.org/10.14505//jarle.v11.4(50).17.
Full textPokhrel, Geeta, Anju Upadhyaya, and Mahendra Singh Thapa. "Threats and Conservation of Paris polyphylla: Vulnerable Medicinal Plant in Panchase Protected Forest, Nepal." Forestry: Journal of Institute of Forestry, Nepal 16 (November 30, 2019): 14–30. http://dx.doi.org/10.3126/forestry.v16i0.28351.
Full textDenning, Stephen. "Why maximizing shareholder value is a threat to U.S. business." Strategy & Leadership 45, no. 6 (November 20, 2017): 3–10. http://dx.doi.org/10.1108/sl-09-2017-0084.
Full textSackett, Paul R., Chaitra M. Hardison, and Michael J. Cullen. "On the Value of Correcting Mischaracterizations of Stereotype Threat Research." American Psychologist 59, no. 1 (2004): 48–49. http://dx.doi.org/10.1037/0003-066x.59.1.48.
Full textKim, Andy Jeesu, and Brian A. Anderson. "Threat reduces value-driven but not salience-driven attentional capture." Emotion 20, no. 5 (August 2020): 874–89. http://dx.doi.org/10.1037/emo0000599.
Full textHAJI, ISHTIYAQUE. "Incompatibilism’s Threat to Worldly Value: Source Incompatibilism, Desert, and Pleasure." Philosophy and Phenomenological Research 78, no. 3 (May 2009): 621–45. http://dx.doi.org/10.1111/j.1933-1592.2009.00258.x.
Full textBader, Benjamin, Gabriele Suder, and Robert Grosse. "Terrorism as an external threat factor in global value chains." Thunderbird International Business Review 62, no. 2 (December 30, 2019): 135–48. http://dx.doi.org/10.1002/tie.22118.
Full textLi, Yiting, and Guillaume Rocheteau. "ON THE THREAT OF COUNTERFEITING." Macroeconomic Dynamics 15, S1 (December 16, 2010): 10–41. http://dx.doi.org/10.1017/s1365100510000544.
Full textRaio, Candace M., Catherine A. Hartley, Temidayo A. Orederu, Jian Li, and Elizabeth A. Phelps. "Stress attenuates the flexible updating of aversive value." Proceedings of the National Academy of Sciences 114, no. 42 (October 2, 2017): 11241–46. http://dx.doi.org/10.1073/pnas.1702565114.
Full textÖztürk, Resul. "Health or Death? The Online Purchase Intentions of Consumers during the COVID-19 Pandemic." Transnational Marketing Journal 8, no. 2 (October 20, 2020): 219–41. http://dx.doi.org/10.33182/tmj.v8i2.1069.
Full textZhao, Taiyang, Wei Song, Xiaotong Jin, Hongjing Cui, and Yang Li. "Hedonism or self-growth? The influence of perceived control on individual product preferences for individuals under self-threat." Asia Pacific Journal of Marketing and Logistics 32, no. 6 (August 28, 2019): 1343–61. http://dx.doi.org/10.1108/apjml-02-2019-0072.
Full textKARZAEVA, N. N. "ASSESSMENT OF THE RELIABILITY OF THE INFORMATION OF THE ACCOUNTING SYSTEM OF ECONOMIC ENTITY." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 1, no. 7 (2021): 94–99. http://dx.doi.org/10.36871/ek.up.p.r.2021.07.01.012.
Full textAlsowail, Rakan A., and Taher Al-Shehari. "A Multi-Tiered Framework for Insider Threat Prevention." Electronics 10, no. 9 (April 22, 2021): 1005. http://dx.doi.org/10.3390/electronics10091005.
Full textKhoshkhoo, Roohollah. "Adaptation of Line Operations Safety Audit (LOSA) to Dispatch Operations (DOSA)." Journal of Airline and Airport Management 7, no. 2 (January 29, 2018): 126. http://dx.doi.org/10.3926/jairm.112.
Full textMesinger, F. "Bias Adjusted Precipitation Threat Scores." Advances in Geosciences 16 (April 9, 2008): 137–42. http://dx.doi.org/10.5194/adgeo-16-137-2008.
Full textTekic, Zeljko, and Dragan Kukolj. "Threat of Litigation and Patent Value: What Technology Managers Should Know." Research-Technology Management 56, no. 2 (March 2013): 18–25. http://dx.doi.org/10.5437/08956308x5602093.
Full textEVANS, TONY. "The limits of tolerance: Islam as counter-hegemony?" Review of International Studies 37, no. 4 (May 21, 2010): 1751–73. http://dx.doi.org/10.1017/s0260210510000185.
Full textOliveira, Eduardo, and Carlos Cabral Cardoso. "Stereotype threat and older worker’s attitudes: a mediation model." Personnel Review 47, no. 1 (February 5, 2018): 187–205. http://dx.doi.org/10.1108/pr-11-2016-0306.
Full textMiles, Edward W., Jeff Schatten, and Elizabeth Chapman. "How face threat sensitivity affects proactive negotiation behavior." Organization Management Journal 17, no. 1 (March 19, 2020): 2–14. http://dx.doi.org/10.1108/omj-05-2019-0725.
Full textPeterson, Timothy M. "Reconsidering economic leverage and vulnerability: Trade ties, sanction threats, and the success of economic coercion." Conflict Management and Peace Science 37, no. 4 (September 18, 2018): 409–29. http://dx.doi.org/10.1177/0738894218797024.
Full textXu, Yanping, Tingcong Ye, Xin Wang, Yuping Lai, Jian Qiu, Lingjun Zhang, and Xia Zhang. "GMM with parameters initialization based on SVD for network threat detection." Journal of Intelligent & Fuzzy Systems 40, no. 1 (January 4, 2021): 477–90. http://dx.doi.org/10.3233/jifs-200066.
Full textAndersen, Elizabeth. "Participant Retention in Randomized, Controlled Trials: The Value of Relational Engagement." International Journal of Human Caring 11, no. 4 (June 2007): 46–51. http://dx.doi.org/10.20467/1091-5710.11.4.46.
Full textKurniawan, Rizal, and Saifuddin Azwar. "Konstruksi Skala Kepedulian terhadap Penggunaan Energi." Jurnal Ilmu Perilaku 1, no. 1 (August 1, 2017): 22. http://dx.doi.org/10.25077/jip.1.1.22-32.2017.
Full textReisel, William D., and Moshe Banai. "Comparison of a Multidimensional and a Global Measure of Job Insecurity: Predicting Job Attitudes and Work Behaviors." Psychological Reports 90, no. 3 (June 2002): 913–22. http://dx.doi.org/10.2466/pr0.2002.90.3.913.
Full textViney, Linda L. "Loss of Life and Loss of Bodily Integrity: Two Different Sources of Threat for People who are Ill." OMEGA - Journal of Death and Dying 15, no. 3 (November 1985): 207–22. http://dx.doi.org/10.2190/x1b1-3c94-v2d5-amqj.
Full textMobbs, D., R. Yu, J. B. Rowe, H. Eich, O. FeldmanHall, and T. Dalgleish. "Neural activity associated with monitoring the oscillating threat value of a tarantula." Proceedings of the National Academy of Sciences 107, no. 47 (November 8, 2010): 20582–86. http://dx.doi.org/10.1073/pnas.1009076107.
Full textBal, Payal, Ayesha I. T. Tulloch, Iadine Chadès, Josie Carwardine, Eve McDonald‐Madden, and Jonathan R. Rhodes. "Quantifying the value of monitoring species in multi‐species, multi‐threat systems." Methods in Ecology and Evolution 9, no. 7 (June 28, 2018): 1706–17. http://dx.doi.org/10.1111/2041-210x.13037.
Full textGarcia-Retamero, Rocio, Stephanie M. Müller, and David L. Rousseau. "The Impact of Value Similarity and Power on the Perception of Threat." Political Psychology 33, no. 2 (March 13, 2012): 179–93. http://dx.doi.org/10.1111/j.1467-9221.2012.00869.x.
Full textØverland, Gerhard. "Conditional Threats." Journal of Moral Philosophy 7, no. 3 (2010): 334–45. http://dx.doi.org/10.1163/174552410x511400.
Full textRizki Atthoriq Hidayat and Muhammad Hanif. "SPATIAL MODELING OF THE THREAT OF DAMAGE TO THE PEATLAND ECOSYSTEM IN THE MAINLAND OF BENGKALIS REGENCY, RIAU PROVINCE." Sociae Polites 21, no. 2 (December 9, 2020): 193–208. http://dx.doi.org/10.33541/sp.v21i3.2249.
Full textPradanti, Della Safera. "EVALUATION OF FORMAL RISK ASSESSMENT IMPLEMENTATION OF MIDDLE EAST RESPIRATORY SYNDROME CORONAVIRUS IN 2018." Jurnal Berkala Epidemiologi 7, no. 3 (September 30, 2019): 197. http://dx.doi.org/10.20473/jbe.v7i32019.197-206.
Full textOliveira, Eduardo, and Carlos Cabral-Cardoso. "Older workers’ representation and age-based stereotype threats in the workplace." Journal of Managerial Psychology 32, no. 3 (April 10, 2017): 254–68. http://dx.doi.org/10.1108/jmp-03-2016-0085.
Full textShechner, Tomer, and Yair Bar-Haim. "Threat Monitoring and Attention-Bias Modification in Anxiety and Stress-Related Disorders." Current Directions in Psychological Science 25, no. 6 (December 2016): 431–37. http://dx.doi.org/10.1177/0963721416664341.
Full textDu, Lili, Yaqin Fan, Lvyang Zhang, Lianying Wang, and Tianhang Sun. "A Summary of the Development of Cyber Security Threat Intelligence Sharing." International Journal of Digital Crime and Forensics 12, no. 4 (October 2020): 54–67. http://dx.doi.org/10.4018/ijdcf.2020100105.
Full text