首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33篇
  免费   0篇
  2019年   1篇
  2018年   1篇
  2015年   1篇
  2014年   1篇
  2013年   1篇
  2012年   3篇
  2011年   6篇
  2008年   1篇
  2007年   1篇
  2006年   1篇
  2005年   2篇
  2004年   3篇
  2003年   1篇
  2000年   1篇
  1998年   1篇
  1992年   4篇
  1991年   1篇
  1990年   1篇
  1986年   1篇
  1980年   1篇
排序方式: 共有33条查询结果,搜索用时 15 毫秒
21.
Binary choice under instructions to select versus reject   总被引:1,自引:1,他引:0  
Two experiments examine differences in binary choice under select versus reject instructions. Three aspects of the choice process are examined: commitment to the chosen alternative, absolute magnitude of attribute evaluations, and information distortion during the choice process. Although the findings support previously hypothesized causes (Study 1), these results are reversed when the decision alternatives are uniformly negative (Study 2a). Accompanying verbal protocols (Study 2b) provide additional insights into the underlying decision process. The results consistently support a compatibility effect. Whenever there is a match between the valences of the alternatives and of the decision strategy, namely selecting a positive alternative or rejecting a negative one, there is greater accentuation of attribute differences, higher certainty in the final choice, and more information distortion. Metaphorically, the choice process seems to flow more smoothly in the compatible conditions.  相似文献   
22.
This validation study analyses data from a sample of North American terrorist attackers (n = 33) and non‐attackers (n = 23) through the lens of the Terrorist Radicalization Assessment Protocol (TRAP‐18; Meloy, 2017) utilizing a multivariate statistical approach – multidimensional scaling – to visualize potential clustering (co‐occurrence) of risk factors. Rarely done in terrorism research, the results plotted in two‐dimensional space show the clustering and co‐occurrence of most of the eight proximal warning behaviors among the attackers, but not among the non‐attackers, and less of a clustering and association of distal characteristics, but their presence in both attackers and non‐attackers. These findings provide further empirical support for the rational‐theoretical model of the TRAP‐18, a structured professional judgment instrument for threat assessment of lone actor terrorists. It advances the quantitative analysis of operationally relevant and behaviorally observable indicators for use by law enforcement and counterterrorism professionals and their consultants. Findings are discussed in relation to other research on pre‐offense behaviors of lone actor terrorists, and recommendations are made for both operational use and further research.  相似文献   
23.
24.
The published Rorschach (Kaiser, 1970) of Sirhan Sirhan, the man who assassinated presidential aspirant Robert F. Kennedy in 1968, was studied. Psychostructural and psychodynamic analyses were conducted using reliable and valid methodology that was unavailable at the time of examination. In contrast to the defense experts at trial who diagnosed paranoid schizophrenia, the data suggest a depressed and suicidal individual organized at a borderline level of personality. Character pathology is hysterical, paranoid, and dependent. When the Rorschach findings are compared to the development history of Sirhan and the behavior around the time of the assassination, the data are somewhat consistent with the theme of psychic trauma, are very consistent with the theme of recurrent loss and pathological mourning, and validate a characterological distrust and hatred of, yet hysterical dependence on, the object world. Rorschach indices of predatory violence (Meloy, 1988a) in relation to the planned and purposeful assassination are also discussed.  相似文献   
25.
The Terrorist Radicalization Assessment Protocol (TRAP–18) is a structured professional judgment instrument for threat assessment of the individual terrorist. It is a rationally derived theoretical model comprising eight proximal warning behaviors and 10 distal characteristics. Empirical research on the TRAP–18 is reviewed, including both nomothetic and idiographic studies of individual terrorists in both the United States and Europe. Mean interrater reliability is 0.895 (Cohen's kappa), ranging from 0.69 to 1.0. Evidence of criterion validity has been demonstrated, including usefulness of the instrument across various extremist ideologies (jihadism, ethnic nationalism, and single-issue), and its ability to discriminate between thwarted and successful attackers. The instrument appears to advance the domain recommendations of Monahan (2012, 2016) for the risk assessment of the individual terrorist. The TRAP–18 is further discussed as a threat assessment instrument for mental health clinicians. The limitations of the current research provide direction for further studies to assess its reliability and construct, discriminant, and predictive validity.  相似文献   
26.
Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings.  相似文献   
27.
Fourteen non-terrorist attackers of public figures in Germany between 1968 and 2004 were intensively studied, with a particular focus on warning behaviors, attack behaviors, and the relationship between psychiatric diagnosis, symptoms, and motivations for the assault. A large proportion of the attackers were severely mentally ill, and most likely to be in the potentially lethal rather than the non-lethal group. A new typology of seven warning behaviors was applied to the data, and all were present, most frequently fixation and pathway warning behavior, and least frequently a direct threat. Psychiatric diagnosis could be closely linked to motivation when analyzed at the level of symptom and content of thought, often delusional. Most of the attacks were directed at political figures, and the majority occurred after 1995.  相似文献   
28.
We investigated the constructs of attachment and anxiety in inpatient conduct-disordered and dysthymic adolescents. Texture, diffuse shading, and pure human content (Exner, 1986) Rorschach indices were compared between 48 subjects who met the criteria for conduct disorder and 30 subjects who met the criteria for dysthymia, according to the Diagnostic and Statistical Manual of Mental Disorders (3rd ed., rev. [DSM-III-R]; American Psychiatric Association, 1987). We also compared mild, moderate, and severe conduct-disorder groups on the three selected Rorschach variables and investigated certain family characteristics for the two groups. We found a lower frequency of texture and pure human content responses in conduct-disordered subjects and a greater frequency of diffuse shading responses in the dysthymic subjects. The conduct-disordered subjects also came from homes in which the mother figure was significantly less present. Our psychometric findings of lessened attachment and diminished anxiety in the conduct-disordered adolescents are similar to adult psychopaths. We urge that an attachment or socialization disturbance criterion be reintroduced into the forthcoming DSM-IV conduct-disorder diagnosis.  相似文献   
29.
Extending previous work on biased predecisional processing, we investigate the distortion of information during the evaluation of a single option. A coherence-based account of the evaluation task suggests that individuals will form an initial assessment of favorability toward the option and then bias their evaluation of subsequent information to cohere with their initial disposition. Three experiments tested this hypothesis. Initial disposition was manipulated (Studies 1 and 3) or measured (Study 2), and attribute ratings were collected as indicators of information distortion. Results from all three experiments indicate that attribute evaluations were biased to favor initial dispositions. These findings provide evidence that information distortion is one cause of primacy effects in judgment and decision-making settings involving a single option.  相似文献   
30.
We show how decision makers can be induced to choose a personally inferior alternative, a strong violation of rational decision making. First, the inferior alternative is installed as the leading option by starting with information that supports this alternative. Then, the decision maker uses the natural process of distorting new information to support whichever alternative is leading. This leader-supporting distortion overcomes the inherent advantages of the superior alternative. The end result is a tendency to choose the self-identified inferior alternative. We trace the choice process to reveal the amount of distortion and its influence on preference. Self-reported awareness of distortion to support the inferior alternative is not related to the amount of distortion. The absence of valid awareness suggests that the manipulation that produces this preference violation is unlikely to be detected and that the distortion is unlikely to be corrected by the decision maker. As expected, given the lack of awareness, final confidence is just as high when the inferior alternative is chosen as when the superior one is. The discussion considers how to prevent an adversary from manipulating one's decisions using this technique.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号