首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   46篇
  免费   11篇
  国内免费   1篇
  2022年   2篇
  2021年   2篇
  2020年   2篇
  2019年   1篇
  2018年   5篇
  2017年   8篇
  2016年   1篇
  2014年   4篇
  2013年   5篇
  2011年   2篇
  2010年   2篇
  2009年   2篇
  2008年   4篇
  2005年   4篇
  2004年   4篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1987年   1篇
排序方式: 共有58条查询结果,搜索用时 15 毫秒
11.
The present study was conducted to investigate the impact of cyber aggression and cyber victimization on the mental health and well-being of young adults. The sample consisted of 508 young adults, ages ranging from 18 to 25 years (mean±SD = 20.53 ± 1.77 years, 68.5% female). The data were collected from young adults studying at various universities of Rawalpindi and Islamabad, Pakistan. The participants completed the Cyberbullying and Cyber Victimization Scales, Depression, Anxiety, and Stress Scales (DASS-21), and The Warwick–Edinburgh Mental Well-being Scale (WEMWBS). The results showed a significant effect of cyber victimization on mental health and well-being. After controlling for the effect of age, gender, and residential status (staying at hostel vs. home), the cyber victimization significantly negatively predicted the well-being and significantly positively predicted mental health (i.e., depression, anxiety, and stress). In contrast, cyber aggression appeared to have a nonsignificant impact on both the mental health and well-being of young adults. Furthermore, the moderating role of gender was assessed for the effect of cyber victimization on mental health. The results revealed that the effect of cyber victimization is moderated by gender only on anxiety. Findings suggest that females are more vulnerable to develop anxiety due to cyber victimization as compared to their male counterparts. The findings of the study have important theoretical and practical implications and suggest the inclusion of some gender-specific strategies to develop counseling programs to save young adults from the negative psychological and emotional impacts of cyber victimization.  相似文献   
12.
In this note we show that the classical modal technology of Sahlqvist formulas gives quick proofs of the completeness theorems in [8] (D. Gregory, Completeness and decidability results for some propositional modal logics containing actually operators, Journal of Philosophical Logic 30(1): 57–78, 2001) and vastly generalizes them. Moreover, as a corollary, interpolation theorems for the logics considered in [8] are obtained. We then compare Gregory's modal language enriched with an actually operator with the work of Arthur Prior now known under the name of hybrid logic. This analysis relates the actually axioms to standard hybrid axioms, yields the decidability results in [8], and provides a number of complexity results. Finally, we use a bisimulation argument to show that the hybrid language is strictly more expressive than Gregory's language.  相似文献   
13.
The addition of actually operators to modal languages allows us to capture important inferential behaviours which cannot be adequately captured in logics formulated in simpler languages. Previous work on modal logics containing actually operators has concentrated entirely upon extensions of KT5 and has employed a particular model-theoretic treatment of them. This paper proves completeness and decidability results for a range of normal and nonnormal but quasi-normal propositional modal logics containing actually operators, the weakest of which are conservative extensions of K, using a novel generalisation of the standard semantics.  相似文献   
14.
An Armed Services Vocational Aptitude Battery (ASVAB) Review Panel, with expertise in personnel selection, job classification, psychometrics, and cognitive psychology developed recommendations for changes to the military enlistment test battery. One recommendation was to develop and evaluate a test of cyber/information and communications technology literacy to supplement current ASVAB content. This article summarizes a multiphased Cyber Test development process: (a) a review of information/computer technology literacy definitions and measures, (b) development and pilot testing of a cyber knowledge measure, (c) validation of test scores against final school grades (FSGs) for selected technical training courses, (d) development of an operational reporting metric and subgroup norms, and (e) examination of construct validity. Results indicate the Cyber Test has predictive validity versus technical training school grades and incremental validity comparable to the ASVAB technical knowledge tests when used with the ASVAB Armed Forces Qualification Test (AFQT) verbal/math composite as a baseline.  相似文献   
15.
《Journal of Applied Logic》2014,12(3):369-376
It is shown how the operators in the “graph model” for λ-calculus (which can function as a programming language for Recursive Function Theory) can be expanded to allow for “random combinators”. The result then is a model for a new language for random algorithms.  相似文献   
16.
As postindustrial societies become more dependent on technology, they also become encumbered by greater risk. With the mounting news reports of cyberattacks, a common reaction to these technology‐based hazards is anxiety. Whether anxiety enhances or erodes information processing is a topic of debate in previous literature, and equally uncertain is whether mass anxiety facilitates or hobbles the public's ability to contemplate current events. In light of three theoretical models in the basic research of anxiety, we hypothesized that (1) anxious participants are less able to recall the information in a news report of cyberattack than their nonanxious counterparts, (2) they become increasingly inept at recalling the details as the storyline unfolds, and (3) this impairment is unique to anxiety. Participants in Study 1 (130 college students) and Study 2 (392 American adults) viewed a news story of a cyberattack and then reported their emotional states and their levels of understanding of the various parts of the report—except that the anxiety in Study 1 was naturalistic, and in Study 2, experimentally manipulated. Results from both studies showed that anxiety undermined recall performance. In addition, Study 1 found that the recall was worse towards the middle and the end of the news story and that other emotions were not significantly associated with memory deficit. Anxiety is discussed as a barrier for the public to stay informed about cyberattacks.  相似文献   
17.
Lessons from safety-critical sociotechnical systems, such as aviation and acute medical care, demonstrate the importance of the human factor and highlight the crucial role of efficient communication between human agents. Although a large proportion of fatal incidents in aviation have been linked to failures in communication, cognitive engineering provides the theoretical framework to mitigate risks and increase performance in sociotechnical systems not only in the civil sector, but also in the military domain. Conducting cyber operations in multidomain battles presents new challenges for military training and education as the increased importance of psychological factors such as metacognitive skills and perspective-taking both in lower and higher ranking staff, becomes more apparent. The Hybrid Space framework (Jøsok et al., 2016) provides a blueprint for describing the cognitive and behavioral constraints for maneuvering between socio-technical and cyber-physical systems whilst cooperating, coordinating or competing with accompanying cognitive styles in the chain of command. We apply the Hybrid Space framework to communicative challenges in the military cyber domain and suggest a three-phase Orienting, Locating, Bridging model for safe and efficient communication between partners. Based on the educational principles of the Norwegian Defence Cyber Academy, we discuss the required skill-sets and knowledge in which cyber officer cadets are trained and taught early in their education, and how these refer to the theoretical framework of the Hybrid Space and the key principles of communication as defined in cognitive engineering.  相似文献   
18.
为了探索含有新算符的代数运算规则学习的有效样例设计方式,分别采用“转换标记法”和“解释法”设计“指-对数转换”运算和对数运算的样例,考察了初中三年级学生代数运算规则样例学习的迁移效果。结果显示:(1)采用“转换标记法”设计的样例可以明显提高“指-对数转换”规则样例学习的迁移效果;(2)采用“解释法”设计的运算样例,能够明显促进“对数运算规则”的样例学习迁移效果,并与被试的基础知识有关。  相似文献   
19.
In this study, the relationships between cyber bullying and involvement in traditional bullying, with reference to social support and gender differences, was examined. Social support plays an important role in empowering victims of cyber bullying and has a significant influence on children and teenagers’ well-being. A sample made up of 458 Israeli junior high students (242 female, 216 male) in the age range of 11 to 13 completed 4 questionnaires. Results indicated that there is an overlap between involvement in cyber bullying and involvement in traditional bullying. The findings indicate that girls were more likely to be cyber victims than boys and that boys were more likely to be cyber bullies than girls. Examination of the relationships between gender and social support variables such as friends, family, and others, shows that girls who were cyber victims reported having more support in all 3 types than cyber bullied boys. These findings can serve as a basis for prevention and intervention programs to cope with cyber bullying.  相似文献   
20.
We investigated what perceived reasons may be involved in the negative feelings that a victim of bullying may have, and how these relate to four forms of bullying (direct traditional bullying, indirect traditional bullying, cyberbullying public forms, and cyberbullying private forms). In Study 1, nineteen Swedish pupils participated in focus groups to elicit a range of perceived reasons for negative emotional experiences when bullied, yielding reasons of Publicity, Threat, Lack of effective coping strategies, Lack of social support, Persistence, No escape and Anonymity. In Study 2 we investigated how relevant these seven reasons were for the four types of bullying, with 499 Swedish pupils aged 12–16 years. Reasons differed by age, gender, and type of bullying. Findings are discussed in relation to coping and support strategies for different types of bullying.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号