首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
College students' food situations may have been disrupted by the COVID-19 pandemic, which could have affected their health and well-being. However, little is known about how the pandemic impacted students' food experiences and how students coped with food-related disruptions, particularly from the student's own perspective. This study reviews data from 571 undergraduates who attended public colleges during Fall 2021 and Spring 2022 and wrote a narrative about the pandemic's impact on their food experiences. Most students indicated they experienced a wide range of food difficulties and adapted new food practices. Despite these challenges, students emphasized proactive coping strategies and positive pandemic outcomes rather than difficulties and negative outcomes. These findings have implications for students' long-term health and well-being.  相似文献   

2.
This article considers several of the most famous arguments for our being under a moral obligation to preserve species, and finds them all wanting. The most promising argument for preserving all varieties of species might seem to be an aesthetic one. Unfortunately, the suggestion that the moral basis for the preservation of species should be construed as similar to the moral basis for the preservation of a work of art seems to presume (what are now widely regarded as) erroneous conceptualizations of "species". The article concludes by arguing that more promising approaches to how "species" ought to be conceptualized suggest that the preservation of species should be construed as of far greater aesthetic importance than is suggested by focusing upon the preservation of any single work of art. Hence, if we have a moral obligation to preserve a single artwork, then we have a far greater moral obligation to preserve species than has often been presumed.  相似文献   

3.
4.
5.
The contact hypothesis suggests that the interaction between members of different groups decreases prejudice. Moderators and mediators shaping this link have been investigated. However, research about the factors that facilitate contact is not frequent. This article examines secure attachment as an antecedent of contact. Three studies provide information about various aspects of the relationship between secure attachment and contact: security is positively associated with (a) intergroup contact, which in turn is related to reduced prejudice (Study 1); (b) implicit approach tendencies toward the outgroup (Study 2); and, once again, (c) with contact through the indirect effect of openness to exploration (Study 3). In the discussion, we recommend priming both secure and insecure schemas to investigate their unique effects on intergroup contact.  相似文献   

6.
7.
Issues that arise in using game theory to model national security problems are discussed, including positing nation-states as players, assuming that their decision makers act rationally and possess complete information, and modeling certain conflicts as two-person games. A generic two-person game called the Conflict Game, which captures strategic features of such variable-sum games as Chicken and Prisoners' Dilemma, is then analyzed. Unlike these classical games, however, the Conflict Game is a two-stage game in which each player can threaten to retaliate — and carry out this threat in the second stage — if its opponent chose noncooperation in the first stage.Conditions for the existence of different pure-strategy Nash equilibria, or stable outcomes, are found, and these results are extended to situations in which the players can select mixed strategies (i.e., make probabilistic threats or choices). Although the Conflict Game sheds light on the rational foundations underlying arms races, nuclear deterrence, and other strategic situations, more detailed assumptions are required to tie this generic game to specific conflicts.Steven J. Brams gratefully acknowledges the financial support of the National Science Foundation under Grant No. SES85-20154, the Sloan Foundation, and the Guggenheim Foundation.D. Marc Kilgour gratefully acknowledges the financial support of the Natural Sciences and Engineering Research Council of Canada under Grant No. A8974.  相似文献   

8.
9.
Reinforcing value and habituation are two processes that have been used to study eating behaviors, but no research has examined their relationship, how they relate to energy intake, and whether they respond in a similar manner to food deprivation. Twenty-two female subjects were randomized to food deprived or non-deprived conditions, and assessed for food reinforcement, habituation to food and ad libitum eating. Results showed food reinforcement and habituation are correlated (r = 0.62, p = 0.002) and both independently predict energy intake. Hierarchical regression showed that the rate of habituation accounted for 30 percent of the variance in eating (p = 0.008), and adding food reinforcement increased the amount of variance accounted for up to 57.5 percent (p < 0.05). This suggests that both processes may influence energy intake in a meal.  相似文献   

10.
11.
12.
This paper describes the new security solutions based on cognitive approaches and new computing paradigm called cognitive cryptography. This new security area establish a new generation of computational methods and security systems, focused on creation intelligent cryptographic algorithms and security protocols using cognitive information processing approaches. Such systems are designed for semantic evaluation of encrypted data, and allow to select the most appropriate techniques of its encryption. This paper presents a possible application of such techniques for different security tasks like authentication, secret sharing, secure data management etc. Additionally, some cryptographic solutions inspired by biological models will be presented.  相似文献   

13.
14.
15.
16.
17.
The authors report the results of two studies in which they explored the relationship of related and individuated self-construals, as suggested by the balanced integration-differentiation (BID) model (E. O. Imamo?lu, 2003), with (a) general attachment security in the first study (N = 168 Turkish university students) and (b) relationship-specific attachment security with the family, peers, and romantic partners in the second study (N = 110 Turkish university students). Results indicated that attachment security tended to be associated with the relational self-orientation; however, when relatedness was complemented with individuation, there was a trend toward enhanced attachment security that reached significance when multiple measures of attachment across relationship contexts were considered. The authors discuss results with reference to their implications for attachment theory and the BID model.  相似文献   

18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号