Search results for "Threat"

showing 10 items of 318 documents

Cuffaro, Pirandello e Schillaci: forse i siciliani non sono tutti uguali. L’effetto dell’entitatività percepita sulla minaccia indotta dallo stereoti…

2008

The goal of this study was to test the role of perceived entitativity as a potential moderator of underperformance typically associated with stereotype threat. The results of two experiments confirmed our hypotheses: Study 1 showed a lesser decrease in performance in a task of syllogistic abilities when the threat was directed to Sicilians (social category, low entitativity) rather than to their family (intimate group, high entitativity). Study 2 confirmed and extended these results through a direct measure of entitativity. Theoretical implications of these results are discussed.

stereotype threat entitativity test performanceSettore M-PSI/05 - Psicologia Sociale
researchProduct

Perfectionism and performance-related psychobiosocial states: The mediating role of competition appraisals.

2022

Using the multi-states (MuSt) theory as a framework, the present study focused on the individual (personality) antecedents of psychobiosocial states. Psychobiosocial states comprise emotional subjective experiences and their correlates (cognitive, motivational, volitional, bodily, motor-behavioural, operational, and communicative), that can be functional for performance (helpful) or dysfunctional (harmful). Specifically, we examined the relationships between two perfectionism dimensions (perfectionistic strivings and concerns) and functional and dysfunctional psychobiosocial states. The hypothesised mediational role of competitive appraisals was also tested. Participants (N = 271, 138 femal…

suorituskykychallenge appraisalsitseluottamustoimintahäiriötthreat appraisalsperfektionismiPhysical Therapy Sports Therapy and Rehabilitationpsykobiososiaalinen tilahuolestuneisuusGeneral Medicinestructural equation modellingpsychobiosocial states scaletavoitteettunteetMuSt theoryOrthopedics and Sports MedicineurheilijatEuropean journal of sport science
researchProduct

Employees’ adherence to information security policies: An exploratory field study

2014

The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…

ta113Cognitive evaluation theoryInformation Systems and Managementbusiness.industryInformation securityPublic relationsSecurity policyManagement Information SystemsThreatTheory of reasoned actionInformation security managementInformation security standardsSecurity managementBusinessMarketingInformation SystemsInformation & Management
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

Health care and cyber threats

2019

ta113critical infrastructurecyber threatkyberuhkaterveydenhuoltocyber securitykyberturvallisuushealth carekriittinen infrastruktuuriFinnish Journal of eHealth and eWelfare
researchProduct

Face-work in intimate public conversation : men and women's talk in Ricki Lake show

2000

talk showface threatening actpolitenessfacegenderembarrassmentface-maintenance
researchProduct

Cyberagresja jako zjawisko zagrażające bezpieczeństwu cyfrowemu dzieci i młodzieży

2019

Artykuł dotyczy rozważań nad zjawiskiem cyberagresji w kontekście zagrożenia bezpieczeństwa cyfrowego dzieci i młodzieży. Jest to problem, którego muszą być świadome wszystkie osoby korzystające z internetu, w tym nauczyciele, aby mogli skutecznie realizować działania zwiększające kompetencje cyfrowe młodego pokolenia. Głównym celem opracowania było przedstawienie skali zjawiska cyberagresji oraz zaprezentowanie badań dotyczących świadomości występowania tego problemu wśród nauczycieli szkół gimnazjalnych z terenu miasta Opole.

teachersbezpieczeństwo cyfrowecyberagresjadigital safetychildren and youththreatzagrożenie dzieci i młodzieżynauczycielecyberbullyingAnnales Universitatis Mariae Curie-Skłodowska. Sectio J, Paedagogia-Psychologia
researchProduct

Perceived threat and prejudice towards immigrants and Russian minorities living in Finland

2017

This study is an attempt to better understand the relationship between Finns and Russian minorities living in Finland. This study considers the role of perceived threats to the attitudes of Finnish adolescents towards Russian minorities. The theoretical framework for this study was the integrated threat theory (ITT). Even though ITT has been revised and threats have been reduced to two major threats (realistic and symbolic threats) (Stephan et al., 2015), this study utilized the original conceptualization of ITT which stipulates that prejudice and negative attitudes towards minorities can be explained by four types of threats that are: realistic threats, symbolic threats, negative stereotyp…

teini-ikäisetRussiansvähemmistötuhatikäryhmätasenteetvarhaisnuoretintegrated threatprejudicemaahanmuuttajatryhmien väliset suhteetvenäläisetennakkoluulotnuoretmaahanmuuttoSuomiadolescentsstereotypiatuhkakuvatFinland
researchProduct

FRIGHTENING OF CHILDREN BY PARENTS AND ITS CONSEQUENCES

2018

The article attempts to generalize data on such a complex pedagogical and psychological phenomenon as the deliberate frightening of children by adults. Despite an obvious or apparent harm, it is still included in the established set of methods of family education. In our study, we studied the origins of this phenomenon, the degree of its prevalence in the practice of family education at the present time, and the consequences of using threats in the process of education in the assessments of the adults who were brought up in this way.To achieve the research objectives, a number of former children who were frightened in childhood by their parents, the content of adults’ threats, the motives f…

the image of the world; the frightening of children in the process of education; the content of adults’ threats to children in the process of educationHarmFamily educationPhenomenonPsychologySet (psychology)Research objectivesDevelopmental psychologyEducation Reform in Comprehensive School: Education Content Research and Implementation Problems
researchProduct