Results for 'Security (Psychology)'

526 found
Order:
  1.  14
    Job Security and Organizational Citizenship Behaviors in Chinese Hybrid Employment Context: Organizational Identification Versus Psychological Contract Breach Perspective Differences Across Employment Status.Wenzhu Lu, Xiaolang Liu, Shanshi Liu & Chuanyan Qin - 2021 - Frontiers in Psychology 12.
    The goal of the present research was to identify the mechanism through which job security exerts its different effects on organizational citizenship behaviors among contract and permanent employees from social identity and social exchange perspectives. Our research suggests two distinct, yet related explanatory mechanisms: organizational identification and psychological contract breach, to extend the job security literature by examining whether psychological contract breach and organization identity complement each other and explaining the mechanism of different behaviors response to job (...) across employment status. Data were collected from 211 Chinese employees and 61 supervisory ratings of OCBs. Our results showed that relative to psychological contract breach, organizational identification plays a stronger mediating role in the association between job security and OCBs. Evidence from multi-group analyses also suggested employment status moderated the mediation mechanism of organizational identification between job security and OCB. Implications for job security and hybrid employment management are discussed. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  12
    Situational and Psychological Approach to the Personal Security of Endangered Judges, Prosecutors, and Investigators.Svetoslav Hadzhiyski - 2022 - Diogenes 30 (1):154-158.
    This article focuses on the situational and psychological approach that can enhance the effectiveness of the protection of endangered judges, prosecutors, and investigators. The idea was raised that risk assessment and the implementation of security would be more effective if the situation is viewed in a different way from the ordinary approach. The phenomenological view allows for a larger interpretation, which includes personal and external factors.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  60
    The Importance of Securing the Psychologically Impalpable: The Vicissitudes of the Perception of Expressiveness.Amedeo Giorgi - 2011 - Journal of Phenomenological Psychology 42 (1):26-45.
    Historically, when psychology broke away from a philosophical mode of scholarship it strove to become a natural science. This meant that it largely imitated the concepts and practices of the natural sciences which included the use of abstract terms to designate many of its phenomena with the consequence that psychology is often more abstract and generic than it ought to be. Husserl has emphasized the role of the life-world as the ultimate basis of all knowledge and a serious (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  4.  22
    Teaching Strategies and Psychological Effects of Entrepreneurship Education for College Students Majoring in Social Security Law Based on Deep Learning and Artificial Intelligence.Qinlei Zhu & Hao Zhang - 2022 - Frontiers in Psychology 13.
    This study aims to achieve the goal of cultivating and reserving emerging professional talents in social security law, improve the curriculum and mechanism of entrepreneurship education, and improve students’ entrepreneurial willingness and entrepreneurial ability. Deep learning technology is used to study the psychological effects of entrepreneurship education for college students majoring in social security law. Firstly, the concept of entrepreneurial psychology is elaborated and summarized. A related model is designed using the theory of proactive personality and planned (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  19
    Multiple Roles of Grit in the Relationship Between Interpersonal Stress and Psychological Security of College Freshmen.Qingsong Yang, Mengxi Shi, Dandan Tang, Hai Zhu & Ke Xiong - 2022 - Frontiers in Psychology 13.
    Grit, as an important positive psychological quality, has rarely been studied for its role involved in the mechanism between stress and psychological security. This article explores the moderating and mediating role of grit in the relationship between interpersonal stress and psychological security of freshmen through two studies. In study 1, freshmen from several Chinese universities were recruited to complete a battery of questionnaire, including assessments about interpersonal stress, grit, and psychological security. The moderating effect analysis showed that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  20
    The Phenomenon of Security Within the Socio-Psychological Knowledge in the Era of Postmodernism.Olha Lazorko, Hryhorii Dzhahupov, Rafal Abramciow, Svitlana Symonenko, Olena Hrek & Tetiana Kostieva - 2022 - Postmodern Openings 13 (3):180-200.
    The relevance of the study of the socio-psychological phenomenon of personal security in the era of post-modernism is due to the real problems of today's society, which at the present stage of state development are characterized by acute interrelationships between the requirements of social security as a factor of socio-political and national security and the real state of mental existence. associated with indicators of social well-being of the individual. The aim of the article is to prove that (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  19
    Measuring the Psychological Security of Urban Residents: Construction and Validation of a New Scale.Jiaqi Wang, Ruyin Long, Hong Chen & Qianwen Li - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  41
    Philosophical and sociocultural dimensions of personality psychological security.O. Y. Blynova, L. S. Holovkova & O. V. Sheviakov - 2018 - Anthropological Measurements of Philosophical Research 14:73-83.
    Purpose. The dynamics and pace of social and economic transformations that are characteristic of modern society, lead to an increase in tension and the destruction of habitual stereotypes – ideals, values, norms, patterns of behaviour that unite people. These moments encourage us to rethink the understanding of "security" essence, in particular, psychological, which emphasizes the urgency of its study in the philosophical and sociocultural coordinates. Theoretical basis of the research is based on the philosophical methodology of K. Jaspers, E. (...)
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  9.  24
    Security as Completeness.Matteo Santarelli - 2017 - European Journal of Pragmatism and American Philosophy 9 (1).
    Peirce’s anti-psychologism hinges on two main assumptions. First, logic and psychology belong to two separate disciplines – respectively, the normative sciences and the experimental sciences. Second, externalism must be understood as a crucial and inescapable epistemological criterion. The introspectionist illusion, according to which individuals have direct and epistemologically flawless access to their own internal states, should be dismissed. As Colapietro (2003) and Calcaterra (2006) observe, Peirce’s standpoint is far different from the Kantian classical account of anti-psychologism. This original take (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  10.  48
    Human Security and Citizenship in Finnish Religious Education: Rethinking Security Within the Human Rights Horizon.Gabriel O. Adebayo & Jan-Erik Mansikka - 2018 - Human Rights Review 19 (4):447-469.
    This paper discusses citizenship in Finnish religious education in relation to human security. It traces the characteristics of human security that connect citizenship, religion, and education in Finnish policy documents. The article focuses on basic education. Its data were analyzed employing qualitative content analysis. The findings indicate that citizenship in Finnish RE entails personal security concerns dealing with psychological and human rights issues. These are found to be essentially human security as conceptualized by the United Nations. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  63
    Security of infantile attachment as assessed in the “strange situation”: Its study and biological interpretation.Michael E. Lamb, Ross A. Thompson, William P. Gardner, Eric L. Charnov & David Estes - 1984 - Behavioral and Brain Sciences 7 (1):127-147.
    The Strange Situation procedure was developed by Ainsworth two decades agoas a means of assessing the security of infant-parent attachment. Users of the procedureclaim that it provides a way of determining whether the infant has developed species-appropriate adaptive behavior as a result of rearing in an evolutionary appropriate context, characterized by a sensitively responsive parent. Only when the parent behaves in the sensitive, species-appropriate fashion is the baby said to behave in the adaptive or secure fashion. Furthermore, when infants (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   70 citations  
  12.  1
    Family Security is a Legitimate Purpose to Achieve Human Security Spoken Legal Texts and Witnessing Human Studies- A Legal Scientific Study in the Light of the Purposes of Islamic Law.Abdulmalek Hussein Ali Altaj - forthcoming - Evolutionary Studies in Imaginative Culture:453-469.
    Praise be to Allah and peace and blessings be upon the Messenger of Allah and his family and companions, and after: This research tagged with: "Family security is a legitimate purpose to achieve human security" aims to show the importance of family security, and how the Sharia paid great attention to it, and stressed the need to maintain it in all psychological, health, physical, economic and moral fields as the family is the first basic social unit and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  46
    Social Security Satisfaction and People’s Subjective Wellbeing in China: The Serial Mediation Effect of Social Fairness and Social Trust.Na Li & Mang He - 2022 - Frontiers in Psychology 13.
    ObjectiveTo test the relationship between social security satisfaction, social fairness, social trust, and people’s subjective wellbeing in China and the serial mediation effect in this study.MethodsWe utilized the data from Chinese Social Survey in 2017 and 2019, involving 31 provinces across the country. There were 5,398 samples in 2017CSS and 2,580 samples in 2019CSS selected by the research objectives. There were 4,269 women and 3,709 men with the average age of participants being 43.ResultsThe results showed that the actual status (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  51
    Worldwide Testing and Test Security Issues: Ethical Challenges and Solutions.David F. Foster - 2010 - Ethics and Behavior 20 (3-4):207-228.
    As psychology ethics begins to become more standardized and formalized globally (e.g., Gauthier, 2007) there are still educational, political, and psychological areas that require significant discussion. For example, test security has become a global issue, as psychological tests and even college entrance and graduate school admission tests have found their way online.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker (ed.), Oxford Studies in Agency and Responsibility Volume 6. Oxford University Press. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral (...) is a critical foundation for agency. Parts three and four explore what happens to agency when moral security is lacking, as in the case of those subject to racism, and those living in poverty. The disadvantages suffered by those who are poor, in a racial minority or other oppressed group, or suffering mental illness or addiction, are often attributed to a lack of individual self-control or personal responsibility. In particular, members of these groups are often seen as irresponsibly focused on short-term pleasures over long-term good, a view underwritten by particular psychological theories of self-control. We explore how narratives about racism and poverty undermine moral security, and limit and distort the possibility of synchronic and diachronic self-control. Where moral security is undermined, the connection between self-control and diachronic goods often fails to obtain and agency contracts accordingly. We close with some preliminary reflections on the implications for responsibility. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  16.  23
    Beyond torture: Knowledge and power at the nexus of social science and national security.Joy Rohde - 2022 - History of the Human Sciences 35 (5):7-26.
    In the wake of revelations about the American Psychological Association's complicity in the military's enhanced interrogation program, some psychologists have called upon the association to sever its ties to national security agencies. But psychology's relationship to the military is no short-term fling born of the War on Terror. This article demonstrates that psychology's close relationship to national security agencies and interests has long been a visible and consequential feature of the discipline. Drawing on social scientific debates (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  60
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  22
    Security and Citizenship: Security, Im/migration and Shrinking Citizenship Regimes.Alexandra Dobrowolsky - 2007 - Theoretical Inquiries in Law 8 (2):629-662.
    This Article points to a widening gap between citizenship theories and practices. Although discourses of citizenship resonate widely and are used extensively by scholars and policy makers, the author argues that the social, economic, political and even psychological processes of citizenship are shrinking in a contemporary context of global insecurity where im/migration and ever more restrictive national security concerns have become enmeshed in law, as well as in the public consciousness. As a result, this Article explores new trends of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  24
    Secure attachment and autonomy orientation may foster mindfulness.Janis Leigh & Veanne N. Anderson - 2013 - Contemporary Buddhism 14 (2):265-283.
    Although mindfulness research has burgeoned, questions regarding the development of mindfulness remain largely unanswered. Mindfulness correlates negatively with the anxiety and avoidance dimensions of adult attachment and positively with autonomy, competence, and relatedness, the three primary psychological needs postulated by self-determination theory. It was hypothesized that secure attachment style and autonomy orientation would predict higher levels of self-reported mindfulness. After accounting for age, state self-esteem, and meditation practice, autonomy orientation predicted higher levels of self-reported mindfulness whereas secure attachment was no (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  30
    Torture Pornopticon: security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films. Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities, the panopticon remains a dominant paradigm within surveillance studies because it captures essential truths about (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  37
    Beyond food security: women’s experiences of urban agriculture in Cape Town.David W. Olivier & Lindy Heinecken - 2017 - Agriculture and Human Values 34 (3):743-755.
    Urban agriculture is an important source of food and income throughout Africa. The majority of cultivators on the continent are women who use urban agriculture to provide for their family. Much research on urban agriculture in Africa focuses on the material benefits of urban agriculture for women, but a smaller body of literature considers its social and psychological empowering effects. The present study seeks to contribute to this debate by looking at the ways in which urban agriculture empowers women on (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  25
    Computer Security Incident Response Team Effectiveness: A Needs Assessment.Rick Van der Kleij, Geert Kleinhuis & Heather Young - 2017 - Frontiers in Psychology 8.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  23.  24
    Use of Official Data of State Institutions in the Scientific Research of the Population Security.Vidmantas Egidijus Kurapka & Viktoras Justickis - 2010 - Jurisprudencija: Mokslo darbu žurnalas 121 (3):283-294.
    The paper discusses the problems in the detection of security information in legal and other administrative data. The authors analyse the prospects of the use of datamining in the solution of two key problems: abundance and indirectness of these data. Security research uses two kinds of data. The first one is scientific data, designed and gathered specially for the verification of certain security theories. They are the data of criminological, sociological, psychological surveys, experimental data, etc. The second (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational culture, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  20
    Torture, Truth and National Security in seneca's Troades.Matthew F. Payne - 2022 - Classical Quarterly 72 (2):719-738.
    This article argues that the encounter between Andromache and Ulysses in Seneca's Troades engages with the genre of declamation to juxtapose two different discourses surrounding torture: one focussed on torture's connection to truth, the other on its connection to tyranny. It describes how the Greek general Ulysses, convinced of the danger of letting the Trojan prince Astyanax live, threatens his mother Andromache with physical torture in order to ascertain the truth of Astyanax's whereabouts. However, Ulysses is countered by Andromache's rhetoric, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26. The ethics of interrogation and the American Psychological Association: A critique of policy and process.Brad Olson, Stephen Soldz & Martha Davis - 2008 - Philosophy, Ethics, and Humanities in Medicine 3:3.
    The Psychological Ethics and National Security (PENS) task force was assembled by the American Psychological Association (APA) to guide policy on the role of psychologists in interrogations at foreign detention centers for the purpose of U.S. national security. The task force met briefly in 2005, and its report was quickly accepted by the APA Board of Directors and deemed consistent with the APA Ethics Code by the APA Ethics Committee. This rapid acceptance was unusual for a number of (...)
    Direct download (13 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  27.  20
    Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI.C. Brock Kirwan, Daniel K. Bjornn, Bonnie Brinton Anderson, Anthony Vance, David Eargle & Jeffrey L. Jenkins - 2020 - Frontiers in Psychology 11.
    Computer users are often the last line of defense in computer security. However, with repeated exposures to system messages and computer security warnings, neural and behavioral responses show evidence of habituation. Habituation has been demonstrated at a neural level as repetition suppression where responses are attenuated with subsequent repetitions. In the brain, repetition suppression to visual stimuli has been demonstrated in multiple cortical areas, including the occipital lobe and medial temporal lobe. Prior research into the repetition suppression effect (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  53
    Multiple methods in psychology: Epistemological grounding and the possibility of unity.Frederick J. Wertz - 1999 - Journal of Theoretical and Philosophical Psychology 19 (2):131-166.
    The problem of methodological pluralism in psychology is addressed. The dominant paradigm, in which experimental methods are assigned top priority and quantification is preferred over qualitative methods, is no longer tenable in light of criticisms by philosophers of science and psychologists. The emergence of a panoply of alternative methods is reviewed and the problems of constructionism, eclecticism, and fragmentation are delineated. Solutions based on an indigenous epistemological foundation for psychology are sought in Continental philosophy. The commensurability of experimental, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  29. Security with self-reliance: The argument for the Singapore model.X. Lim - 2007 - Ethos: Journal of the Society for Psychological Anthropology 3:35-39.
     
    Export citation  
     
    Bookmark  
  30.  44
    Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model.Sophie Baeriswyl, Andreas Krause & Adrian Schwaninger - 2016 - Frontiers in Psychology 7:191272.
    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  31.  27
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  24
    Culturological reconstruction of ChatGPT's socio-cultural threats and information security of Russian citizens.Pavel Gennadievich Bylevskiy - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the study is the socio-cultural threats to the information security of Russian citizens associated with ChatGPT technologies (Chat Generative Pre-trained Transformer, a machine-generated text response generator simulating a dialogue). The object of research − evaluation of the ratio of advantages and threats of generative language models based on "machine learning" in modern (2021-2023) scientific literature (journals HAC K1, K2 and Scopus Q1, Q2). The scientific novelty of the research lies in the culturological approach to the analysis (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  33.  59
    Intentionalism and computational psychology.Alan Zaitchik - 1980 - Grazer Philosophische Studien 10 (1):149-166.
    Intentionalism must be distinguished from computational psychology. The former is a mentalist-realist metatheoretical stance vis-a-vis the latter, which is a research programme devoted to the construction of informationally-characterized simulation models for human behavior, perception, cognition, etc. Intentionalism has its attractive aspects, but unfortunately it is plagued by severe conceptual difficulties. Recent attempts to justify the intentionalist interpretation of computational models, by J.A. Fodor and by C. Graves, J.J. Katz et al., fail to secure a conceptually adequate and genuinely intentional (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34.  11
    The Psychology of Strategic Terrorism: Public and Government Responses to Attack.Ben Sheppard - 2008 - Routledge.
    This new volume explores terrorism and strategic terror, examining how the public responds to terrorist attacks, and what authorities can do in such situations. The book uses a unique interdisciplinary approach, which combines the behavioural sciences and international relations, in order to further the understanding of the 'terror' generated by strategic terror. The work examines five contemporary case studies of the psychological and behavioural effects of strategic terror, from either terrorist attacks or aerial bombardment. It also looks at how risk-communication (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  28
    Privacy and Security Issues with Mobile Health Research Applications.Stacey A. Tovino - 2020 - Journal of Law, Medicine and Ethics 48 (S1):154-158.
    This article examines the privacy and security issues associated with mobile application-mediated health research, concentrating in particular on research conducted or participated in by independent scientists, citizen scientists, and patient researchers. Building on other articles in this issue that examine state research laws and state data protection laws as possible sources of privacy and security protections for mobile research participants, this article focuses on the lack of application of federal standards to mobile application-mediated health research. As discussed in (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  2
    The Psychology of a Social Justice Movement: Social Justice Feminism as a Case Study.John McGuire - 2024 - Studies in Social Justice 18 (3):589-606.
    This article undertakes a case study of social justice feminism through four criteria that influence the psyches of social movement participants: grievance, ideology, efficacy, and social embeddedness. The grievance lay with the Second Industrial Revolution. Social justice feminists used an “entering wedge” strategy to promote and pass women’s labor legislation to eventually secure state protection of all workers in the United States. The ideology of social justice feminism came from a combination of socialist-influenced thought and the promotion of social justice. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  1
    Imperceptibility of children’s war trauma: analysing attachment, loss, and security in The Journey.Ramya Jayaram Paleri & Vinata Sai - forthcoming - Journal for Cultural Research:1-11.
    This research applies John Bowlby’s (1958–63) attachment theory to analyse child–parent relationships associated with loss and security in the children’s picture book, The Journey (2016) by Francesca Sanna, to examine children’s war trauma through attachment styles. Furthermore, Hong et al.’s (2013) cultural attachment theory is employed to explore the story representation of the children’s relationship with their culture. Amnesty International UK endorses the picture book to teach children about the hardships of refugees and asylum seekers. However, children’s literature often (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  54
    Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures.John D’Arcy & Anat Hovav - 2008 - Journal of Business Ethics 89 (S1):59-71.
    Research from the fields of criminology and social psychology suggests that the deterrent effect of security countermeasures is not uniform across individuals. In this study, we examine whether certain individual characteristics (i. e., computer self-efficacy) or work arrangement (i. e., virtual status) moderate the influence of security policies, security education, training, and awareness (SETA) program, and computer monitoring on information systems misuse. The results suggest that computer savvy individuals are less deterred by SETA programs and computer (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  39. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  11
    The presence of psychological distress in healthcare workers across different care settings in Windsor, Ontario, during the COVID-19 pandemic: A cross-sectional study.Jennifer Voth, Lindsey Jaber, Linda MacDougall, Leslee Ward, Jennifer Cordeiro & Erica P. Miklas - 2022 - Frontiers in Psychology 13.
    IntroductionFew studies have examined psychological distress in healthcare workers across the care continuum. This study describes distress levels reported by HCWs across care settings and factors associated with distress.MethodsA cross-sectional survey of HCWs from Windsor, Ontario, was conducted between May 30th, 2020, and June 30th, 2020. The survey included the Kessler Psychological Distress Scale, sociodemographic, frontline status, perceptions of training, protection, support, respect among teams, and professional and personal stressors. Univariate analyses were used to compare across settings and multivariate logistic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  16
    Social Innovation for Food Security and Tourism Poverty Alleviation: Some Examples From China.Guo-Qing Huang & Fu-Sheng Tsai - 2021 - Frontiers in Psychology 12.
    The COVID-19 pandemic has brought hunger to millions of people around the world. Social distancing measures coupled with national lockdowns have reduced work opportunities and the overall household incomes. Moreover, the disruption in agricultural production and supply routes is expected to continue into 2021, which may leave millions without access to food. Coincidentally, those who suffer the most are poor people. As such, food security and tourism poverty alleviation are interlinked when discussing social problems and development. While the corporate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  50
    Strategic games with security and potential level players.Alexander Zimper - 2007 - Theory and Decision 63 (1):53-78.
    This paper examines the existence of strategic solutions to finite normal form games under the assumption that strategy choices can be described as choices among lotteries where players have security- and potential level preferences over lotteries (e.g., Cohen, Theory and Decision, 33, 101–104, 1992, Gilboa, Journal of Mathematical Psychology, 32, 405–420, 1988, Jaffray, Theory and Decision, 24, 169–200, 1988). Since security- and potential level preferences require discontinuous utility representations, standard existence results for Nash equilibria in mixed strategies (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43. #HerStory: The Psychological Well-Being, Lived Experiences, and Challenges Faced by Female Police Officers.Jayra Blanco, Ella Marie Doloque, Shelwina Ruth Bonifacio, Galilee Jordan Ancheta, Charles Brixter Sotto Evangelista, Janelle Jose, Jericho Balading, Andrea Mae Santiago, Liezl Fulgencio, Christian Dave Francisco & Jhoselle Tus - 2023 - Psychology and Education: A Multidisciplinary Journal 7 (1):20-32.
    Police officers are vital to maintaining security and the continuity of national functions. Thus, Police officers are more exposed to different kinds of psychological concerns. However, a female in this kind of profession, based on various studies, experienced higher levels of stress because of other factors. Further, the primary goal of this study is to investigate the psychological well-being, lived experiences, challenges, and coping mechanisms of female police officers. Employing the Interpretative Phenomenological Analysis, the findings of this study were: (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  21
    Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.Zahid Maqbool, Palvi Aggarwal, V. S. Chandrasekhar Pammi & Varun Dutt - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  37
    Overcoming Fragmentation in Psychology: A Hermeneutic Approach.Frank Richardson - 2000 - Journal of Mind and Behavior 21 (3):289-305.
    Considerable fragmentation, and awareness of it, have characterized the field of psychology since its inception. It is suggested that over the years, efforts to reduce uncertainty and overcome fragmentation in psychology have clustered around two broad, opposite strategies which might be termed "scientism" and "constructionism." The first wishes to rely on secure methods and controlled experimentation, the second on a postmodern acceptance of radical heterogeneity and "no truth through method." Some of the shortcomings of these strategies are discussed. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  46. Whence avidity? Hume’s psychology and the origins of justice.Gerald J. Postema - 2006 - Synthese 152 (3):371-391.
    Hume's account of the roots of justice focuses on the need to secure possession against the corrosive effects of unrestrained avidity. The reasons for this focus lie deep in his understanding of human psychology, especially, the mimetic passions shaped by the principles of sympathy, social referencing, and reversal comparison. The need for esteem drives human beings to attach their pride to those things they think are especially valued by those whom they especially admire. Most predominant among these goods are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  47.  16
    Psychological Factors Underlying Attitudes toward War: A Theoretical Review.Olga Gulevich & Evgeny Osin - 2023 - Sociology of Power 35 (1):31-50.
    People have different attitudes toward military action as a way of resolving international conflicts. In this article we will examine the psychological approach to the study of these attitudes: (a) the levels of attitudes toward war (attitudes toward specific military campaigns vs. general attitude toward war as a way of resolving international conflicts); (b) psychological (individual, social-psychological, and situational) factors predicting these attitudes; (c) limitations of the existing research and directions for future research. We will focus on three social-psychological factors (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  48.  20
    Aviation Security and the TSA's Behavior Detection: Why Effective Academic and Practitioner Dialogue Is Vital.Vincent Denault & Louise M. Jupe - 2018 - Frontiers in Psychology 9.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  49.  28
    Freedom, Restraint, and Security: Japan and the United States.Betty B. Lanham - 1988 - Ethos: Journal of the Society for Psychological Anthropology 16 (3):273-284.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  34
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of 15,661 (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
1 — 50 / 526