Search results for "Denial"

showing 10 items of 54 documents

Climate Change: Negationism, Skepticism, and Misinformation

2021

Resumen: El objetivo de este artículo es examinar los principales lineamientos antagonistas sobre el cambio climático. Para ello, se ofrece una aproximación teórica a las narrativas y repertorios sustantivos que sostienen los fundamentos de la negación y se diferencia conceptualmente entre negacionistas, climatoescépticos y contrarios climáticos. Estos repertorios son la negación de las evidencias científicas, la negación económica y la negación política. Finalmente, se hace referencia a la difusión de información errónea y tóxica como estrategia organizada y deliberada. Como principal conclusión se abordan los emergentes programas de alfabetización climática para neutralizar la desinformac…

0106 biological sciencesfake news.fake newsalfabetización climática[SHS.INFO]Humanities and Social Sciences/Library and information sciencescontrários climáticosHome Influència del climaGN1-89001 natural sciencesanthropogenic global warmingalfabetização climática03 medical and health sciences010608 biotechnologydenial narrativesdenial narratives climate change literacy climate contrarians fake news.Desinformacióaquecimento global antropogénicoH1-990303 health sciences[SHS.SOCIO]Humanities and Social Sciences/Sociologynarrativas negacionistas030306 microbiology[SDE.ES]Environmental Sciences/Environmental and Society[SHS.SCIPO]Humanities and Social Sciences/Political scienceSocial sciences (General)13. Climate actionclimate change literacyAnthropologyclimate contrarianscalentamiento global antropogénicocontrarios climáticos
researchProduct

Deep in the Dark: A Novel Threat Detection System using Darknet Traffic

2019

This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several threats such as DDoS attacks, botnets, spoofing, probes and scanning attacks. We analyse darknet traffic by extracting network traffic features from it that help in finding patterns of these advanced threats. We collected the darknet traffic from the network sensors deployed at SURFnet and extracted several network-based features. In this study, we proposed a framework that uses supervised machine learning and a concept drift detector. Our experimental res…

021110 strategic defence & security studiesSpoofing attackComputer scienceNetwork telescopeDarknetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesBotnetDenial-of-service attack02 engineering and technologyComputer securitycomputer.software_genre0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputer
researchProduct

Solastalgia's mourning and the slowly evolving effect of asbestos pollution: A qualitative study in Italy

2019

In Italy, the problem of asbestos pollution is increasing in severity. In fact, in recent years, the number of people affected by asbestos-related illnesses has been growing because of the fibre's slowly evolving effects and its progressive pollution in the environment adjacent to the places where it is processed. Even though the physical consequences of asbestos are now quite clear, few studies have examined the psychological consequences of this kind of disaster. Since it is difficult to perceive its pathogenicity in daily life, this study was conducted in the affected areas of north-eastern Italy, using the qualitative research in psychology with 51 persons who experienced asbestos-relat…

0301 basic medicineCoping (psychology)Place attachment lossmedia_common.quotation_subjectPlace attachmentAngerArticleElisabeth Kubler-Ross modelAttribution processes03 medical and health sciencesAsbestos pollution; Attribution processes; Disaster; Elisabeth Kubler-Ross model; Mourning; Place attachment loss; Psychology; Solastalgia0302 clinical medicineDenialPsychologyNarrativelcsh:Social sciences (General)lcsh:Science (General)media_commonMultidisciplinary030104 developmental biologyFeelingDisasterSolastalgialcsh:H1-99PsychologyAttributionMourningSocial psychology030217 neurology & neurosurgeryAsbestos pollutionlcsh:Q1-390Qualitative researchHeliyon
researchProduct

La incidencia de las malas relaciones entre los progenitores a la hora de acordar el régimen de guarda y custodia compartida. Análisis de la reciente…

2018

The relationship that the parents have with each other is one of the factors to take into consideration when adopting or not the modality of shared custody and custody after a situation of family crisis. To deny the shared modality if there was no good relationship between the parents was the rule until relatively recent dates. With the entry into force of local laws as well as the change in jurisprudence, the tendency that remains is to consider that it will no longer be enough that there is this bad relationship but will have to be a situation of high confrontation so that this situation may be grounds for denial of the shared custody regime.

:CIENCIAS JURÍDICAS [UNESCO]2386-4567 22661 Actualidad jurídica iberoamericana 502169 2018 9 6653333 La incidencia de las malas relaciones entre los progenitores a la hora de acordar el régimen de guarda y custodia compartida. Análisis de la reciente doctrina del Tribunal Supremo Martínez SanchisBad relationships between parentsUNESCO::CIENCIAS JURÍDICASguarda y custodia compartidathe tendency that remains is to consider that it will no longer be enough that there is this bad relationship but will have to be a situation of high confrontation so that this situation may be grounds for denial of the shared custody regime. Malas relaciones entre los progenitoresinterés superior del menor.the best interests of the child. 402 417Nuria The relationship that the parents have with each other is one of the factors to take into consideration when adopting or not the modality of shared custody and custody after a situation of family crisis. To deny the shared modality if there was no good relationship between the parents was the rule until relatively recent dates. With the entry into force of local laws as well as the change in jurisprudencecustody and shared custody
researchProduct

Discriminación indirecta por pertenencia a minoría nacional : denegación de prestación de viudedad en el caso de matrimonio celebrado según el rito g…

2021

The commented sentence rejects that the Muñoz Díaz doctrine is applicable to all cases of gypsy marriage. In addition, it considers that the denial of effects to the union celebrated according to said rite is not discriminatory. This conclusion is discussed, understanding that the analysis of the singularities of the gypsy people must lead to the conclusion of the existence of indirect discrimination.

:CIENCIAS JURÍDICAS [UNESCO]Indirect discriminationviudedadgypsy rite 1032 1051understanding that the analysis of the singularities of the gypsy people must lead to the conclusion of the existence of indirect discrimination. Discriminación indirectaminoría nacionalrito gitano2070-8157 22082 Revista Boliviana de Derecho 584568 2021 32 8055248 Discriminación indirecta por pertenencia a minoría nacional denegación de prestación de viudedad en el caso de matrimonio celebrado según el rito gitano. Comentario de la STC de España 1/2021UNESCO::CIENCIAS JURÍDICASAntonio The commented sentence rejects that the Muñoz Díaz doctrine is applicable to all cases of gypsy marriage. In additionwidowhoodde 25 de enero) Folgoso Olmoit considers that the denial of effects to the union celebrated according to said rite is not discriminatory. This conclusion is discussednational minority
researchProduct

Developmental and content effects in reasoning with causal conditionals.

2002

Abstract Two predictions derived from Markovits and Barrouillet's (2001) developmental model of conditional reasoning were tested in a study in which 72 twelve-year-olds, 80 fifteen-year-olds, and 104 adults received a paper-and-pencil test of conditional reasoning with causal premises (“if cause P then effect Q”). First, we predicted that conditional premises would induce more correct uncertainty responses to the Affirmation of the consequent and Denial of the antecedent forms when the antecedent term is weakly associated to the consequent than when the two are strongly associated and that this effect would decrease with age. Second, uncertainty responding to the Denial of the antecedent f…

AdultDeductive reasoningAdolescentAntecedent (logic)media_common.quotation_subjectConcept FormationExperimental and Cognitive PsychologyCognitionModels PsychologicalCausalityTerm (time)CausalityDenialChild DevelopmentCognitionPremiseDevelopmental and Educational PsychologyCognitive developmentHumansPsychologyChildSocial psychologyProblem SolvingCognitive psychologymedia_commonJournal of experimental child psychology
researchProduct

Diagnostic delay in oral squamous cell carcinoma: the role of cognitive and psychological variables

2014

This retrospective study investigated, in two cohorts of subjects living in Southern Italy and awaiting treatment for oral squamous cell carcinoma (OSCC), the variables related to diagnostic delay ascribable to the patient, with particular reference to the cognitive and psychological ones. A total of 156 patients with OSCC (mean age: 62 years, M/F: 2.39∶1) were recruited at the Universities of Palermo and Naples. Risk factors related to patient delay included: sociodemographic, health-related, cognitive and psychological variables. The analysis was conducted by considering two different delay ranges: dichotomous (≤1 month vs. >1 month) and polytomous (3 months) delay. Data were investigated…

AdultMaleHealth Knowledge Attitudes Practicemedicine.medical_specialtyPathologyDelayed DiagnosisMultivariate analysisdiagnosisHealth BehaviorPopulationDenial PsychologicalCohort StudiesCognitionSettore MED/28 - Malattie OdontostomatologicheInternal medicinemedicineHumanseducationGeneral DentistryAgedRetrospective StudiesAged 80 and overMouth neoplasmeducation.field_of_studybusiness.industryAge FactorsPolytomous Rasch modelRetrospective cohort studyFearOdds ratioAwarenessMiddle AgedConfidence intervaldiagnosiSocioeconomic FactorsOral squamous cell carcinomaCarcinoma Squamous CellOriginal ArticleFemaleMouth Neoplasmscognitive/psychological factorsbusinessAttitude to Healthpatient delayCohort studyInternational Journal of Oral Science
researchProduct

Countertransference in Factitious Disorder

1994

In the treatment of patients with factitious disorder it is important to realize that at various levels of their experience these patients are more intimate with death than with life. This requires a particular awareness of resistance mechanisms to countertransference as well as of the importance of clinical procedures, in particular with regard to superego analysis. A requirement for establishing a psychotherapeutic alliance with patients suffering from factitious disorder is a high degree of 'therapeutic eros', hope and trust in one's own capabilities. The emphasis on a 'biophile attitude' does, however, involve the danger that the destructive potential, fantasies of death or killing, but…

AdultPsychotherapistPsychoanalysismedia_common.quotation_subjectMunchausen SyndromeShameResistance (psychoanalysis)DenialChild of Impaired ParentsId ego and super-egomedicineHumansCountertransferenceApplied PsychologyConscienceDefense Mechanismsmedia_commonPhysician-Patient RelationsGeneral Medicinemedicine.diseaseFactitious disorderPsychoanalytic TherapyPsychotherapyFactitious DisordersPsychiatry and Mental healthClinical PsychologyPersonality DevelopmentFeelingFemaleCountertransferencePsychologySelf-Injurious BehaviorPsychotherapy and Psychosomatics
researchProduct

State of the Art Literature Review on Network Anomaly Detection

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatComputer science05 social sciences050801 communication & media studiesDenial-of-service attack02 engineering and technology021001 nanoscience & nanotechnologyComputer securitycomputer.software_genrenetwork anomaly detection0508 media and communicationsAnomaly detectionState (computer science)tietoturva0210 nano-technologyverkkohyökkäyksetcomputer
researchProduct

Mitigating DDoS using weight‐based geographical clustering

2020

Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …

Anomaly intrusion detectionsComputer Networks and CommunicationsComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackFault tolerancecomputer.software_genreClustering techniquesData segmentComputer Science ApplicationsTheoretical Computer ScienceComputational Theory and MathematicsMitigating DDoS attacksCloud burstingData miningCluster analysisWeight based dosingcomputerSoftwareAddress clusteringMitigation techniquesConcurrency and Computation: Practice and Experience
researchProduct