نتایج جستجو برای: intimidation

تعداد نتایج: 519  

2008
AARON J. WIRSING MICHAEL R. HEITHAUS

The notion that predators can affect their prey without killing them is widely supported in the ecological literature yet rarely applied by marine mammal studies. We present three case studies in which patterns of time allocation by individual marine mammal foragers were used to index the sublethal effects of predators on bottlenose dolphins (Tursiops sp.), harbor seals (Phoca vitulina), and du...

2015
Chandeep Singh Vishal Walia

MANET is a self-configuring infrastructure less network. The lacks of an infrastructure in ad hoc networks pose large challenges in the functionality of these networks. Mobile Ad Hoc Network has number of security problems that exists due to the self-configuring nature of nodes. The black hole attack is one of the well known security intimidation in wireless mobile ad hoc networks. The intruder...

2012
Andrés Monroy-Hernández Emre Kiciman

In this paper, we describe how people living in armedconflict environments use social media as a participatory news platform. We investigate this by analyzing the microblogging practices of people living amid the Mexican Drug War. This paper provides a descriptive analysis of the phenomenon by mixing quantitative observations, content analysis, interviews, and case studies. We characterize the ...

Journal: :Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) 2022

Internet users in Indonesia is increasing every year. The increase caused by several factors, such as the increasingly even distribution of internet infrastructure Indonesia. has a positive impact facilitating communication between individuals, while negative intimidation to someone or known cyberbullying. Cyberbullying huge on mental health person, causing victim be angry, depressed, and anxio...

Journal: :The Spanish journal of psychology 2013
Estefanía Estévez Teresa I Jiménez David Moreno Gonzalo Musitu

Previous studies have identified two subgroups of school violence victims: submissive and aggressive. Submissive victims are characterized by their withdrawal in violent situations, while aggressive victims combine hostile behavior with victimization. This study focuses on the second subgroup and aims to analyze possible factors influencing the transition from passive victimization to involveme...

Journal: :Journal of traumatic stress 2012
Anthony Feinstein

Mexican journalists are frequently the victims of violence, often drug related. The purpose of the study was to assess their mental well-being. Of 104 journalists recruited from 3 news organizations, those who had stopped working on drug-related stories because of intimidation from the criminal drug cartels (n = 26) had significantly greater social dysfunction (p = .024); and more depressive (p...

Journal: :Family process 2010
Michele Scheinkman Denise Werneck

Jealousy is a powerful emotional force in couples' relationships. In just seconds it can turn love into rage and tenderness into acts of control, intimidation, and even suicide or murder. Yet it has been surprisingly neglected in the couples therapy field. In this paper we define jealousy broadly as a hub of contradictory feelings, thoughts, beliefs, actions, and reactions, and consider how it ...

2010

Jealousy is a powerful emotional force in couples’ relationships. In just seconds it can turn love into rage and tenderness into acts of control, intimidation, and even suicide or murder. Yet it has been surprisingly neglected in the couples therapy field. In this paper we define jealousy broadly as a hub of contradictory feelings, thoughts, beliefs, actions, and reactions, and consider how it ...

Journal: :IJIRR 2013
Baramee Navanopparatskul Sukree Sinthupinyo Pirongrong Ramasoota

Following the enactment of computer crime law in Thailand, online service providers are compelled to control illegal content including content that is deemed harmful or problematic. This situation leads to self-censorship of intermediaries, often resulting in overblocking to avoid violating the law. Such filtering flaw both infringes users’ freedom of expression and impedes the business of OSPs...

2017
Fawaz Alsaade Al-Amin Bhuiyan

Digital watermarking has attained a position of overwhelming interest in image processing research as a new method of protecting multimedia content from unauthorized copying, as the informal transmission and manipulation of digital data creates intimidation for inventors and providers. This paper presents a new watermarking system employing five bit LSB strategy for copyright protection of imag...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید