首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   1篇
  2023年   1篇
  2017年   1篇
  2016年   2篇
  2012年   1篇
  2008年   1篇
排序方式: 共有6条查询结果,搜索用时 31 毫秒
1
1.
According to public health data, the US Hispanic population is far healthier than would be expected for a population with low socioeconomic status. Ever since Kyriakos Markides and Jeannine Coreil highlighted this in a seminal 1986 article, public health researchers have sought to explain the so-called “Hispanic paradox.” Several candidate explanations have been offered over the years, but the debate goes on. This article offers a philosophical analysis that clarifies how two sets of obstacles make it particularly difficult to explain the Hispanic paradox. First, different research projects define the Hispanic paradox phenomenon in substantially different ways. Moreover, using Bas van Fraassen’s pragmatic theory of explanation and Sean Valles’s extension of it with the concept of “phenomenon choice,” it also becomes clear that there are also multiple ways of explaining each individual definition of the phenomenon. A second set of philosophical and methodological challenges arises during any attempt to study “Hispanic” phenomena, with one key challenge being that the “Hispanic” panethnic concept was intentionally made vague as it was developed and popularized during the 1960s–1970s. After comparing this case with similar cases in the philosophical literature, the article concludes with observations on what makes this problem unique, particularly its ethical features.  相似文献   
2.
In computer security parlance, a hacker is an individual who actively seeks and takes advantage of flaws and weaknesses of a computer network or system. In recent years, one has seen the rise of hacking, often as a form of protest and retaliation for reasons ranging from political to social, but the question remains as to what really motivates an individual to hack a computer network? Using the Q-method, the study aimed to develop a classification of the motivation of computer hackers. This was done with the use of 43 participants who were subjected to preliminary interviews and the sorting method. The statements from the interviews were categorized that resulted in seven conceptual themes, namely social-positive, social-negative, intellectual gain, self-satisfaction, economic rewards, technological-positive and technological-negative. From these themes, three distinct profiles emerged and were used to describe the motivation of hackers.  相似文献   
3.
The primary goal of the study was to determine whether mother and peer's responses to direct and indirect aggression would contribute to children's use of direct and indirect aggression. Using adaptations of the Direct and Indirect Aggression Scale, a multi-informant strategy, and a sample of disadvantaged families, data were collected from 296 mothers of children ages 4-11, 237 children ages 6-11, and 151 teachers of those children. Mothers and peers were reported to react more harshly in response to direct aggression compared with indirect aggression, and higher rates of direct aggression were associated with reduced popularity. These findings were seen as being consistent with the hypothesis that different forms of aggression result in differential responding by mothers and peers, as well as the notion that direct aggression is a higher cost option than indirect aggression. Results also replicated previous findings that boys tend to use physical aggression more than girls, but girls use indirect aggression more than boys. Finally, low IQ was correlated with higher direct aggression in girls but had no relation with aggression in boys.  相似文献   
4.
Animal Cognition - Attention can be biased towards previously reward-associated stimuli even when they are task-irrelevant and physically non-salient, although studies of reward-modulated attention...  相似文献   
5.
6.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号