Search results for " THREAT"

showing 10 items of 113 documents

Izvairīšanās no lingvistiski-pragmatiskās kļūdas angļu valodā

2019

Šī bakalaura darba mērķis ir analizēt, vai lingvistiskais netiešums var izraisīt lingvistiski-pragmatisko kļūdu, un kādus lingvistiskos instrumentus var izmantot, lai izvairītos no konflikta. Lai analizētu politisko interviju plašsaziņas līdzekļos, tiek izmantota kvalitatīva pētījuma metode, kuras mērķis ir izpētīt, kā atrisināt lingvistisko netiešumu sarunā, kā atšķirt pateikto no tā, ko vēlas pateikt, kā arī to, kā izvairīties no lingvistiski–pragmatiskās kļūdas neskaidras valodas dēļ. Rezultāti liecina, ka kritērijs spējai pieņemt mijiedarbību ir atkarīgs no tā, cik lielā mērā tā var būt kaitīga sarunu partneriem, jo ikvienam sarunas partnerim pirmām kārtām rūp viņa personīgais tēls. Līd…

maximsValodniecībalinguistic politenessindirectnessindirect speech actsface threatening acts
researchProduct

“If you compress the spring, it will snap back hard”: The Ukrainian crisis and the balance of threat theory

2014

The narrative of an aggressive and neo-imperialist Russia that has dominated analyses of the 2014 Ukrainian crisis lacks theoretical rigour. We argue that a sustainable transformation of the Ukrainian crisis requires an accurate analysis of the context of the conflict, which should include an understanding of Moscow’s perception of the threats to its interests. This policy brief develops a theoretical understanding of the Ukrainian crisis through the lens of Stephen M. Walt’s balance of threat theory. We conclude that a realist analysis will help to explain Russian actions.

media_common.quotation_subjectThreat perceptionBalance of threatContext (language use)RigourSnap backPolitical economyPerceptionPolitical Science and International RelationsDevelopment economicsUkrainian crisisNarrativeSociologymedia_commonInternational Journal: Canada's Journal of Global Policy Analysis
researchProduct

Ingroup Identification Increases Differentiation in Response to Egalitarian Ingroup Norm under Distinctiveness Threat

2017

Previous findings suggest that high identifiers show their group loyalty by deviating from group norms that do not allow the group to react in an adaptive manner towards a threatening outgroup (i.e., when the ingroup norm is egalitarian). In this study, using natural groups (French and North Africans), we aimed at extending our understanding of such loyalty conflict by examining the relationship between ingroup identification and intergroup differentiation (stereotyping and prejudice) as a function of distinctiveness threat and ingroup norms. Results showed a positive relationship between identification and prejudice both in the discriminatory norm condition when intergroup similarity was l…

media_common.quotation_subjectlcsh:BF1-990Loyalty Conflict; Stereotyping; Prejudice; Distinctiveness Threat; Ingroup identification[SHS.PSY]Humanities and Social Sciences/Psychology050109 social psychology050105 experimental psychology[ SHS.PSY ] Humanities and Social Sciences/PsychologyLoyalty0501 psychology and cognitive sciences10. No inequalityComputingMilieux_MISCELLANEOUSSocial influencemedia_commonStereotyping05 social sciencesLoyalty ConflictIngroups and outgroupsGroup normsIngroup identificationlcsh:PsychologyOutgroupPositive relationshipOptimal distinctiveness theoryNorm (social)Distinctiveness ThreatPsychologySocial psychologyPrejudice
researchProduct

Women Scientists Who Made Nuclear Astrophysics

2019

Female role models reduce the impact on women of stereotype threat, i.e. of being at risk of conforming to a negative stereotype about one’s social, gender, or racial group (Fine in Delusion of Gender. W.W. Norton & Co. NY, p. 36, 2010 [1]; Steele and Aronson in J Pers Soc Psychol 69:797–811, 1995 [2]). This can lead women scientists to underperform or to leave their scientific career because of negative stereotypes such as, not being as talented or as interested in science as men. Sadly, history rarely provides role models for women scientists; instead, it often renders these women invisible (CafeBabel Homepage [3]). In response to this situation, we present a selection of twelve outst…

naisetFissionNuclear TheoryAstronomyNuclear physics050109 social psychologykosmologiaAstrophysics01 natural sciencestähtitiedeSolar studies5. Gender equalityHistory and Philosophy of Physics (physics.hist-ph)Nuclear Experiment (nucl-ex)Nuclear Experiment010303 astronomy & astrophysicsNuclear theoryQCQBEarth and Planetary Astrophysics (astro-ph.EP)High Energy Astrophysical Phenomena (astro-ph.HE)Women scientistsHistorical05 social sciencesGender studiestutkijatCosmologyStereotype threatRadioactivityAstrophysics - Solar and Stellar Astrophysicsmedicine.symptomAstrophysics - High Energy Astrophysical PhenomenaPsychologyydinfysiikkaScientific careerastrofysiikkaeducationPhysics - History and Philosophy of PhysicsFOS: Physical sciencesNegative stereotypeNuclear Theory (nucl-th)Delusion0103 physical sciencesmedicine0501 psychology and cognitive sciencesSolar and Stellar Astrophysics (astro-ph.SR)radioaktiivisuusRacial groupGénéralitésAstrophysics - Astrophysics of GalaxiesfissioAstrophysics of Galaxies (astro-ph.GA)Astrophysics - Earth and Planetary Astrophysics
researchProduct

AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks

2023

The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…

quantum encryptioncyber threatedge-intelligence systemscyber-attacksAI-based analysingtekoälykyberturvallisuusverkkohyökkäykset
researchProduct

Believe It or Not – No Support for an Effect of Providing Explanatory or Threat-Related Information on Conspiracy Theories’ Credibility

2021

Past research suggests that certain content features of conspiracy theories may foster their credibility. In two experimental studies (N = 293), we examined whether conspiracy theories that explicitly offer a broad explanation for the respective phenomena and/or identify potential threat posed by conspirators are granted more credibility than conspiracy theories lacking such information. Furthermore, we tested whether people with a pronounced predisposition to believe in conspiracies are particularly susceptible to such information. To this end, participants judged the credibility of four conspiracy theories which varied in the provision of explanatory and threat-related information. Intere…

receptionSocial PsychologySpecific-informationMindsetsocial psychology media psychologyconspiracy theories; conspiracy mentality; explanation; threat; receptionEpistemologyBF1-990conspiracy theoriesCredibilityRelevance (law)conspiracy mentalityPsychologythreatPsychologyContent (Freudian dream analysis)explanation
researchProduct

Further development of integrated threat theory and intergroup contact: a reply to Aberson (2015)

2016

ABSTRACTThis essay furthers a dialogue about the theoretical and statistical merits of Croucher's [(2013). Integrated threat theory and acceptance of immigrant assimilation: An analysis of Muslim immigration in Western Europe. Communication Monographs, 80, 46–62] study exploring the relationships between threat from an immigrant group, belief that an immigrant wants to assimilate, and intergroup contact. Key points of divergence include assertions that (a) the relationships in the original piece are counter to previous literature/relationships, (b) the correlations presented are implausible, (c) the magnitude of the relationships is too strong, and (d) the manuscript has “odd” multiple regr…

samplingDivergence (linguistics)CommunicationIntegrated threat theorymedia_common.quotation_subject05 social sciencesImmigration050801 communication & media studies050109 social psychologyLanguage and Linguistics0508 media and communicationsintegrated threat theorycorrelationsWestern europe0501 psychology and cognitive sciencesintergroup contactSociologyta518Social psychologymedia_commonCommunication Monographs
researchProduct

Towards a framework for assessment and management of cumulative human impacts on marine food webs

2015

Effective ecosystem-based management requires understanding ecosystem responses to multiple human threats, rather than focusing on single threats. To understand ecosystem responses to anthropogenic threats holistically, it is necessary to know how threats affect different components within ecosystems and ultimately alter ecosystem functioning. We used a case study of a Mediterranean seagrass (Posidonia oceanica) food web and expert knowledge elicitation in an application of the initial steps of a framework for assessment of cumulative human impacts on food webs. We produced a conceptual seagrass food web model, determined the main trophic relationships, identified the main threats to the fo…

seagrassBiodiversity & Conservationvulnerability05 Environmental SciencesVulnerabilityTHREATSExpert knowledge elicitationFood chainecosystem-based managementconservation actions ecosystem-based management expert knowledge elicitation multiple threats seagrass vulnerabilityECOSYSTEM-BASED MANAGEMENTWater Pollution ChemicalZoologíaComputingMilieux_MISCELLANEOUSTrophic levelelicitationAlismatalesAcciones de conservaciónbiologyEcologymultiple threatsSeagraEnvironmental resource managementconservation actionsobtencion de conocimiento de expertosEcosystem-based managementFood webacciones de conservaciónSeagrassobtención de conocimiento de expertosBiodiversity ConservationConservation actionAlismatidaeKnow-howLife Sciences & Biomedicineacciones de conservacionAmenazas múltiplesMultiple threatSettore BIO/07 - EcologiaConservation of Natural ResourcesFood ChainFisheriesEnvironmental Sciences & EcologyManejo con base en los ecosistemasamenazas múltiplesPastos marinosexpert knowledgeOCEANexpert knowledge elicitationMediterranean SeaHumansEcosystemObtención de conocimiento de expertos14. Life underwaterEcology Evolution Behavior and SystematicsNature and Landscape ConservationScience & Technologybusiness.industrymanejo con base en los ecosistemasvulnerabilidadpastos marinos15. Life on land06 Biological Sciencesbiology.organism_classification13. Climate actionamenazas multiples07 Agricultural And Veterinary Sciences[SDE.BE]Environmental Sciences/Biodiversity and EcologybusinessVulnerabilidadEnvironmental Sciences
researchProduct

Terroryzm w obliczu bezpieczeństwa państwa

2018

securit threatsinternational securitysecurity environmentterrorismStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Zagrożenie terroryzmem oraz aspekt militarny w jego zwalczaniu

2015

security threatsinternational securitysecurity environmentspecial forcesterrorismNorth Atlantic Treaty OrganizationStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct