نتایج جستجو برای: avoidanceanxiety insecure
تعداد نتایج: 4640 فیلتر نتایج به سال:
Katri Kanninen, Raija-Leena Punamäki, and Samir Qouta The association between attachment styles and emotional responses to traumatic memories was examined among 153 Palestinian former political prisoners. Self-report tools revealing adult attachment and intensity and valence of emotional responses were applied. As hypothesized, a high intensity of cognitive appraisal and a low intensity of affe...
This study's purpose was to determine whether the influence of combined parental disorders can cause greater frequency in the occurrence of insecure child attachment and dysfunctions in self-regulation as opposed to the influence of one parent having a disorder. The research design is a quantitative meta-analysis that combined effects from 10 studies to establish differences in the frequency of...
This study investigated adrenocortical activity in response to different challenging and positive affect emotional contexts in child-mother dyads, as function of attachment security (children's secure base behaviors and mothers' attachment representations). Fifty-one children ranging in age from 18 to 26 months and their mothers participated in this study. Secure children showed significant inc...
Enterprise policy management is challenging and errorprone. Compared to existing work that focused on analyzing misconfigurations, our work is the first to address the issues that arose during policy deployment, i.e., effecting policy changes. In this paper, we demonstrate that naive approaches to policy deployment can easily create security vulnerabilities, such as granting access of sensitive...
This paper presents a simple conceptual framework to inform the understanding, scope and modalities for the Rome-based Agencies (RBAs) 1 to support the resilience of food-insecure people in relation to shocks that affect their livelihoods and food systems. The framework provides a way for the agencies to seek and build complementary alignment across existing agency-specific approaches to suppor...
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The present paper extends Shannon’s notion of perfect secrecy to ad hoc wireless networks of computers. All of the wireless transmissions are insecure. This paper assumes a secure base-station communicating wirelessly using...
We specify an information flow analysis for a simple imperative language, using a Hoare-like logic. The logic facilitates static checking of a larger class of programs than can be checked by extant type-based approaches in which a program is deemed insecure when it contains an insecure subprogram. The logic is based on an abstract interpretation of program traces that makes independence between...
A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1...
BACKGROUND Avoidance coping (e.g. sealing over) is common in people recovering from psychosis, but it is not understood why some individuals 'seal over'. AIMS We examined the hypothesis that individuals who 'seal over' do not have the personal resilience to withstand this major life event. METHOD Fifty participants were interviewed during an acute episode of psychosis and reassessed at 3-mo...
In 2013 nearly 8.6 million U.S. children lived in households in which one or more child was food insecure. The National School Lunch Program (NSLP) is one of the largest federally funded food and nutrition assistance programs that aims to provide nutritious, well-balanced lunches for school-age children. Given the important role this program plays on food and nutrient intake of school-age child...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید