首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This article discusses the limited utility of the concepts of “cyber terrorism” or “electronic Pearl Harbor.” It contrasts the absence of cyber terror incidents with the large number of terrorist attacks and computer security incidents in recent years. It suggests that this discrepancy is explained both by the low appeal of cyber weapons to terrorists and because critical infrastructures and nations are not vulnerable to computer attacks. The article calls for a more rigorous approach to data collection for cyber security incidents, and suggests cyber security should not be seen primarily as a national security issue. Before joining CSIS, he served in the U.S. Foreign Service and worked on security, intelligence, and technology issues. Lewis’s current research covers cyber security, spectrum management, authentication, and technology’s role in national security. He received his Ph.D. from the University of Chicago in 1984.  相似文献   

2.
For some time there has been a growing concern about violence in the workplace. This concern has tended to focus on employees with jobs which involve them in witnessing and dealing with the effects of disasters or traumas, such as the police, firefighters and ambulance personnel, rather than the actual victims of violent incidents. In the early 1980's, a psychological intervention known as either critical incident or psychological debriefing was introduced by the emergency services as a way of reducing the long term effects of exposure to traumatic events. The techniques involved in debriefing have been described by a number of workers (Dyregrov, 1989; Mitchell & Everly, 1993; Raphael, 1986). In all these models of debriefing, the debrief is undertaken with groups of victims, all of whom have been involved in a single traumatic incident as emergency workers. This paper describes the common features of the debriefing process; explains why debriefing is helpful; differentiates between debriefing and counselling; explores and contrasts three models of debriefing. Finally, it looks at a model of individual debriefing developed within the British Post Ofice to meet the specific needs of employees who have suffered personal attacks or other traumatic incidents.  相似文献   

3.
Galea S  Resnick H 《CNS spectrums》2005,10(2):107-115
Epidemiologically, disasters represent multiple forms of possible exposures, including exposure type (eg, natural versus human-made), intensity, and duration. It has been suggested that the consequences of human-made disasters (eg, terrorist incidents) may be more severe than those of natural disasters; recent evidence suggests that there may be a high prevalence of posttraumatic stress disorder (PTSD) among both direct survivors of such attacks and in the general population. Several studies after the September 11, 2001, terrorist attacks found that the prevalence of PTSD was higher in New York City than it was in the rest of the US and that there was a substantial burden of PTSD among persons who were not directly affected by the attacks. This raises important questions about the meaning of "exposure" to a disaster. Using data from an assessment of PTSD in the first 6 months after September 11th we considered the nature of the PTSD experienced by persons who were not directly affected by the September 11th attacks. These data suggest that persons in the general population may have clinically important posttraumatic stress symptomatology after a mass terrorist incident. Future research should consider mechanisms through which persons in the general population may be at risk for PTSD after such incidents.  相似文献   

4.
Children who understand that knowledge may have different origins produce more information in their free‐recall accounts than children who are less aware of source. We examined whether the tendency to make knowledge attributions was related to the number and proportion of details elicited from child witnesses using open‐ended invitations and whether this relationship varied depending on the number of incidents of abuse reported. The tendency to make knowledge attributions was measured in the presubstantive portion of protocol‐guided interviews with 3‐ to 11‐year‐old alleged victims of abuse. Hierarchical regression analyses revealed that the production of knowledge attribution details was positively related to the proportion of substantive episodic details produced by 3‐ to 6‐year‐olds recalling a single incident and by 3‐ to 11‐year‐olds recalling multiple incidents of abuse. Presubstantive source details were also positively correlated with the amount of source information recalled about incidents of abuse. These findings remained significant after controlling for the children's verbosity, the relative prominence of open‐ended invitations, and the children's ages. © 2003 US Government work.  相似文献   

5.
Is therapist self‐disclosure a therapeutic technique or a therapeutic mistake? Is it useful? Is it ethical? This study attempts to address this controversy among therapeutic modalities by asking clients about their perceptions of self‐disclosure and non‐disclosure. Eighteen people (16 women, two men), currently in therapy in two Canadian cities, generated 157 incidents of both disclosure and non‐disclosure. The incidents were first coded as helpful or unhelpful. Cross‐tabulation of the results showed that disclosures were more than twice as likely to be experienced as helpful; non‐disclosures were twice as likely to be unhelpful (χ2 (3, N=157) = 14.439, p≤0.002). One‐quarter of these incidents was coded by two independent raters; inter‐rater reliability was high (Pearson corr. ranged from 0.755 to 1.0, p≤0.01). The data was then sorted, using the Constant Comparison method, into themes, starting with, but not limited to, the themes suggested by the literature. The greatest single effect was on the therapeutic alliance, both positive and negative. Clients’ perceptions of helpful disclosures and non‐disclosures generally supported therapists’ rationales. There was also some evidence that when clients found disclosures unhelpful, the reasons also supported theoretical rationales against disclosing. Rather than simply supporting either position in the controversy, this study suggests that skill, or lack of it, was the intervening variable that affected the perceptions of both techniques. Further research on the effects of skill on both disclosure and non‐disclosure are warranted. This study has implications for both researchers and practitioners.  相似文献   

6.
In the self‐worth model, burnout is considered to be a syndrome of performance‐based self‐esteem (PBSE) and experiences of exhaustion. Studies have shown that PBSE and burnout indices such as Pines’ Burnout Measure (BM) are associated. Whether these variables have overlapping etiologies has however not been studied before. Genetic and environmental components of covariation between PBSE and exhaustion measured with Pines’ BM were examined in a bivariate Cholesky model using data from 14,875 monozygotic and dizygotic Swedish twins. Fifty‐two per cent of the phenotypic correlation (r = 0.41) between PBSE and Pines’ BM was explained by genetics and 48% by environmental factors. The findings of the present study strengthen the assumption that PBSE should be considered in the burnout process as proposed by the self‐worth conception of burnout. The present results extend our understanding of the link between this contingent self‐esteem construct and exhaustion and provide additional information about the underlying mechanisms in terms of genetics and environment. This finding corroborates the assumed syndrome view on burnout, while it also suggests an altered view of how the syndrome emerges and how it can be alleviated.  相似文献   

7.
Computer simulations have become a popular tool for assessing complex skills such as problem-solving. Log files of computer-based items record the human–computer interactive processes for each respondent in full. The response processes are very diverse, noisy, and of non-standard formats. Few generic methods have been developed to exploit the information contained in process data. In this paper we propose a method to extract latent variables from process data. The method utilizes a sequence-to-sequence autoencoder to compress response processes into standard numerical vectors. It does not require prior knowledge of the specific items and human–computer interaction patterns. The proposed method is applied to both simulated and real process data to demonstrate that the resulting latent variables extract useful information from the response processes.  相似文献   

8.
The horrific terrorist attacks on the United States on September 11, 2001, left an indelible mark on perceptions of security and threat across the world. This paper uses Schwartz's (1992) value circumplex model to examine value change across matched high school and university student samples in Finland, questioned before and after the World Trade Center (WTC) and associated attacks. In Study 1 ( N =419), security values of adolescents were higher the day following the WTC attacks than before, but fell back toward pre-attack levels in the subsequent two samples. In contrast, levels of stimulation were lower following the terrorist incidents. In Study 2 ( N =222), security levels of students were also higher following the WTC attacks, but again were closer to pre-attack levels in a subsequent cohort.  相似文献   

9.
张敏  卢家楣 《心理科学》2013,36(2):378-382
研究以青少年学生为被试,采用测验和实验的方法考察了情绪弹性和性别变量对青少年在四类负性情绪事件性质的判断偏向上可能产生的影响。结果表明:(1)情绪弹性对青少年加工负性情绪事件信息时的判断偏向产生一定影响,低情绪弹性个体在面对与一般生活情境相关的负性情绪事件时,更倾向于从消极方面对事件的性质加以判断。(2)性别对青少年加工负性情绪事件信息时的判断偏向不产生实质性影响。  相似文献   

10.
The aim of the current study was to investigate worry about terror as a mediating variable, with the exogenous variables being media viewing, differentiation of self, and trait anxiety, and the endogenous variables being somatic symptoms and perceptions of security‐related stress. Participants were divided into two groups by age/academic level: 248 high school students and 191 university students. A pathway correlation model was used to investigate worry about terror as a mediating variable. The central finding was that worry about terror was a significant mediating variable in the relationship between the extent of media viewing following terror events and the level of perception of security‐related stress. That is, young people who said they worried a lot reported a high level of stress relating to the terror events they saw covered in the media. In addition, trait anxiety was found to have an effect on stress perception only via the level of worry about terror. This means that high levels of stress are not experienced by all highly trait‐anxious people, but only by those who suffer from higher levels of worry about terror.  相似文献   

11.
The mass‐casualty school shooting incidents in recent years have heightened concern about the safety of U.S. schools and prompted responses that, in many cases, have centered mainly on bolstering security on school campuses. Some researchers have concluded, however, that the most effective prevention efforts are those that are more comprehensive in scope. This article explores selected spiritual, religious, and family value factors that research has indicated may play an important protective role in strengthening resilience in young people and minimizing at‐risk behavior that may be associated with school violence.  相似文献   

12.
Computer games are now a significant consumption activity in consumer culture. Informed by interdisciplinary studies and drawing on data from in‐depth interviews with players of the Warcraft III computer game, we explore the relationship between play and storytelling during digital play. Understanding that such play is determined by systems of game rules and that computer game characters and settings are capable of conveying cultural meanings to players, we found that the rules of play in computer games can be designed in ways that encourage consumers to co‐create meaningful story plots derived from their knowledge of myth and fiction. In the case of Warcraft, these plots resembled the archetypal plot of the hero's journey. We conclude that computer games immerse consumers in a form of playful consumption that engages them in memorialised, co‐authored storytelling. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

13.
Structural equation models are very popular for studying relationships among observed and latent variables. However, the existing theory and computer packages are developed mainly under the assumption of normality, and hence cannot be satisfactorily applied to non‐normal and ordered categorical data that are common in behavioural, social and psychological research. In this paper, we develop a Bayesian approach to the analysis of structural equation models in which the manifest variables are ordered categorical and/or from an exponential family. In this framework, models with a mixture of binomial, ordered categorical and normal variables can be analysed. Bayesian estimates of the unknown parameters are obtained by a computational procedure that combines the Gibbs sampler and the Metropolis–Hastings algorithm. Some goodness‐of‐fit statistics are proposed to evaluate the fit of the posited model. The methodology is illustrated by results obtained from a simulation study and analysis of a real data set about non‐adherence of hypertension patients in a medical treatment scheme.  相似文献   

14.
Child abuse has been frequently associated with adult aggression in its many forms. The Point Subtraction Aggression Paradigm (PSAP) is a popular laboratory‐based procedure derived from the retaliatory responses of participants engaged in a monetary‐reinforced computer game. PSAP responses have been found to discriminate between participants with and without violent, antisocial, substance abuse, and even contact‐sport athletic histories. The present study provided an initial test of the sensitivity of the PSAP and the Overt Aggression Scale (OAS) in discriminating between college students (n=28) with and without reported histories of recurrent physical abuse as defined by incidents of being pushed, shoved, struck, punched, or threatened with physical violence by a parent more than once every six weeks over 15 years of upbringing. PSAP responses were substantially higher (d=2.1) among participants reporting histories of recurrent parental physical abuse, with 46% (as opposed to 0% for controls) of these individuals generating PSAP responses in excess of 400 (average found for violent parolees). Group differences on the OAS were also considerable (>1 SD). Larger factorial designs examining relationships between a range of developmental variables (e.g., domestic abuse, physical abuse, sexual abuse, parental divorce, family climate, etc.) and adult PSAP responding may help advance present knowledge regarding the impact of childhood adversity on psychological development. Aggr. Behav. 30:217–228, 2004. © 2004 Wiley‐Liss, Inc.  相似文献   

15.

Innovation in technology often provides new opportunities in the pursuit of deviance. The response or adaptation to these new opportunities takes the form of deviant technicways. New technology in the case of the computer promises to have an applicability for carnal behavior that is socially volatile in both its perversity and import. Through on‐line bulletin boards dedicated to particular modes of sexual behavior, computer users with special sexual predilections can communicate with persons who share similar interests throughout the world. Computer communication of the erotic variety may involve mild flirtations, seeking and sharing information about sexual services available in different cities and countries, and seeking and sharing information about specific varieties of deviant sexual behavior. The computer has been used by some individuals to obtain child pornography from abroad, to contact youngsters to try to arrange meetings for sexual purposes, sometimes to misrepresent one's sexual identity ("gender bending") for various reasons ranging from seemingly harmless “on‐line transsexualism” (Van Gelder, 1985) to more convoluted (and possibly more sinister) purposes. The appearance of computer erotica can be interpreted at various functional levels and holds considerable import for social behavior. Just as the computer has begun to revolutionize social life, it may also revolutionize crime and the parameters of deviant sexual behavior.  相似文献   

16.
There is now much evidence that humans have multiple memory systems, and evidence is also building that other cognitive processes are mediated by multiple systems. Even so, several recent articles have questioned the existence of multiple cognitive systems, and a number of these have based their arguments on results from state-trace analysis. State-trace analysis was not developed for this purpose but, rather, to identify data sets that are consistent with variation in a single parameter. All previous applications have assumed that state-trace plots in which the data fall on separate curves rule out any model in which only a single parameter varies across the two tasks under study. Unfortunately, this assumption is incorrect. Models in which only one parameter varies can generate any type of state-trace plot, as can models in which two or more parameters vary. In addition, it is straightforward to show that both single-system and multiple-systems models can generate state-trace plots that are considered in the literature to be consistent with either one or multiple cognitive systems. Thus, without additional information, there is no empirical state-trace plot that supports any inferences about the number of underlying parameters or systems.  相似文献   

17.
When making decisions under uncertainty, it is important to distinguish between the probability that a judgment is true and the confidence analysts possess in drawing their conclusions. Yet analysts and decision‐makers often struggle to define “confidence” in this context, and many ways that scholars use this term do not necessarily facilitate decision‐making under uncertainty. To help resolve this confusion, we argue for disaggregating analytic confidence along three dimensions: reliability of available evidence, range of reasonable opinion, and responsiveness to new information. After explaining how these attributes hold different implications for decision‐making in principle, we present survey experiments examining how analysts and decision‐makers employ these ideas in practice. Our first experiment found that each conception of confidence distinctively influenced national security professionals' evaluations of high‐stakes decisions. Our second experiment showed that inexperienced assessors of uncertainty could consistently discriminate among our conceptions of confidence when making political forecasts. We focus on national security, where debates about defining “confidence levels” have clear practical implications. But our theoretical framework generalizes to nearly any area of political decision‐making, and our empirical results provide encouraging evidence that analysts and decision‐makers can grasp these abstract elements of uncertainty.  相似文献   

18.
The three-dimensional graphic method for quantifying body position is a series of observer procedures and computer programs designed to yield three-dimensional (height, width, and depth) coordinates for various body points. These coordinates can be graphed by computer in several different ways, and can be analyzed mathematically to provide information about a wide variety of variables, including interpersonal distance and body activity. The procedure for collecting and analyzing the data is explained and the computer programs developed for the method are described.  相似文献   

19.
This article describes a visualization experiment that tests hypotheses based on the social identity approach about effectiveness of communication strategies during mass decontamination. Specifically, the mediating role of social identity processes between effective responder communication and relevant outcome variables (e.g., public compliance), is examined. After visualizing that they had been involved in a hypothetical incident involving decontamination, participants (N = 129) received one of three different communication strategies: (1) health‐focused information about decontamination, sufficient practical information; (2) no health‐focused information, sufficient practical information; and (3) no health‐focused information, low practical information. The communication strategy perceived as most effective included health‐focused information and practical information; this resulted in the highest levels of expected compliance, mediated by social identity variables. Implications for management of mass decontamination are discussed.  相似文献   

20.
We investigated general confidence as a psychological buffer for coping with environmental uncertainty and threat. In Study 1, a new scale to measure general confidence was developed and cross‐validated with different samples. Study 2 examined general confidence as a moderator of the influence of environmental stress on individual strains. Two groups of participants were presented with photographs either of terrorist attacks or of neutral scenes. We found a significant interaction between presented scenes and general confidence. Study 3 examined the effect of general confidence on acceptance of mobile phone stations while controlling for relevant variables. The results showed good incremental validity for the General Confidence Scale over related personality and social psychological constructs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号