全文获取类型
收费全文 | 66篇 |
免费 | 4篇 |
出版年
2021年 | 1篇 |
2018年 | 3篇 |
2017年 | 1篇 |
2016年 | 3篇 |
2015年 | 3篇 |
2013年 | 1篇 |
2012年 | 5篇 |
2011年 | 2篇 |
2010年 | 2篇 |
2009年 | 2篇 |
2008年 | 6篇 |
2007年 | 6篇 |
2006年 | 5篇 |
2005年 | 1篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1998年 | 1篇 |
1997年 | 3篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1983年 | 1篇 |
1979年 | 1篇 |
1972年 | 1篇 |
1969年 | 1篇 |
排序方式: 共有70条查询结果,搜索用时 15 毫秒
51.
This study focuses on the strength of the relationship between behavioural intentions and actual behaviour in a multi-alternative choice context. Two separate moderating processes of intention-behaviour consistency were hypothesized, i.e. the amount of reasoning during intention formation, and the degree of confidence in the intention. Involvement (as an issue-specific factor), and need for cognition (as an individual difference factor) were investigated as antecedents of amount of reasoning. confidence in the intention was predicted from the size of the consideration set (i.e. the number of alternatives that one considers for choice), and involvement. The study comprised a longitudinal two-wave survey conducted before and after national elections in The Netherlands, in which pre-election voting intentions were compared with actual voting behaviour. A high degree of intention-behaviour consistency was found, which was significantly related to both amount of reasoning and confidence. The expected relations were found. The results extend current process models of attitude–behaviour relations. Furthermore, the results indicate that processes related to the consideration set size and content account for variance in intention-behaviour consistency in choice contexts that cannot be accounted for by traditional attitude-behaviour perspectives. 相似文献
52.
We investigate a hybrid system for autonomous exploration and navigation, and implement it in a virtual mobile agent, which
operates in virtual spatial environments. The system is based on several distinguishing properties. The representation is
not map-like, but based on sensorimotor features, i.e. on combinations of sensory features and motor actions. The system has
a hybrid architecture, which integrates a bottom-up processing of sensorimotor features with a top-down, knowledge-based reasoning
strategy. This strategy selects the optimal motor action in each step according to the principle of maximum information gain.
Two sensorimotor levels with different behavioural granularity are implemented, a macro-level, which controls the movements
of the agent in space, and a micro-level, which controls its eye movements. At each level, the same type of hybrid architecture
and the same principle of information gain are used for sensorimotor control. The localisation performance of the system is
tested with large sets of virtual rooms containing different mixtures of unique and non-unique objects. The results demonstrate
that the system efficiently performs those exploratory motor actions that yield a maximum amount of information about the
current environment. Localisation is typically achieved within a few steps. Furthermore, the computational complexity of the
underlying computations is limited, and the system is robust with respect to minor variations in the spatial environments. 相似文献
53.
54.
We propose a theory of regret regulation that distinguishes regret from related emotions, specifies the conditions under which regret is felt, the aspects of the decision that are regretted, and the behavioral implications. The theory incorporates hitherto scattered findings and ideas from psychology, economics, marketing, and related disciplines. By identifying strategies that consumers may employ to regulate anticipated and experienced regret, the theory identifies gaps in our current knowledge and thereby outlines opportunities for future research. 相似文献
55.
56.
M. Probst W. Vandereycken H. Van Coppenolle G. Pieters 《Behaviour research and therapy》1995,33(8):985-990
The video distortion method on a life-size screen is a new method for studying eating disordered patients' estimations of their own body width. Testing this method in female patients (53 with anorexia nervosa, 38 with bulimia nervosa) and 36 normal females, yielded high to very high reliability scores (consistency and test-retest stability). A careful analysis of the ‘just noticeable difference’ showed that a 5% deviation from the undistorted image should be considered as within the range of accuracy. Taking this into account, anorectic patients appear to score below, above, as well as within the normal range. Bulimia nervosa patients are either accurate in their body estimations or overestimate their body width. All control Ss are correct in their estimations. With this method no significant differences were found between the anorectic patients and the controls. Bulimics differ significantly from anorectics and controls on their optative responses (i.e. what they wanted to look like) and their affective responses (i.e. what they felt they looked like). 相似文献
57.
58.
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
下载免费PDF全文
![点击此处可从《Journal of Investigative Psychology & Offender Profiling》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Jan‐Willem Hendrik Bullée Lorena Montoya Wolter Pieters Marianne Junger Pieter Hartel 《Journal of Investigative Psychology & Offender Profiling》2018,15(1):20-45
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineering attacks, (b) authority (1 of the 6 persuasion principles) is used considerably more often than others, and (c) single‐principle attack steps occur more often than multiple‐principle ones. The social engineers identified in the scenarios more often used persuasion principles compared to other social influences. The scenario analysis illustrates how to exploit the human element in security. The findings support the view that security mechanisms should include not only technical but also social countermeasures. 相似文献
59.
Wolter Pieters Dina Hadžiosmanović Francien Dechesne 《Science and engineering ethics》2016,22(3):831-850
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies. 相似文献
60.
Standard models for model predicate logic consist of a Kripke frame whose worlds come equipped with relational structures. Both modal and two-sorted predicate logic are natural languages for speaking about such models. In this paper we compare their expressivity. We determine a fragment of the two-sorted language for which the modal language is expressively complete on S5-models. Decidable criteria for modal definability are presented. 相似文献