نتایج جستجو برای: emotional security
تعداد نتایج: 283587 فیلتر نتایج به سال:
Information and communication service providers (ICSP) that are significant in size and provide Internet-based services take administrative, technical, and physical protection measures via the information security check service (ISCS). These protection measures are the minimum action necessary to secure the stability and continuity of the information and communication services (ICS) that they p...
As a key part of reverse engineering, decompilation plays a very important role in software security and maintenance. Many decompilation techniques and tools have been developed while all of them have defects in different aspects. For example, IDA Hex rays generates pseudocodes with poor readability, and Boomerang is unable to identify composite structures such as Classes and multidimensional a...
Information and communication service providers (ICSP) that are significant in size and provide Internet-based services take administrative, technical, and physical protection measures via the information security check service (ISCS). These protection measures are the minimum action necessary to secure the stability and continuity of the information and communication services (ICS) that they p...
A database intrusion detection system (DIDS) is used to detect potential violations in database security. DIDS follows other traditional database security mechanisms and network security mechanisms such as firewall and network intrusion detection. Therefore, it faces the intrusion from internal users or the intrusion that can be passed through other security layers. This means that the number o...
BACKGROUND Although delineating the processes by which children appraise the family as a source of security from their collective experiences in the family subsystem has assumed center stage in many conceptualizations of child development, the dearth of measures of child adaptation in the family system has hindered empirical advances. Therefore, this study introduced and tested the psychometric...
We examined the joint role of constructive and destructive interparental conflict in predicting children’s emotional insecurity and psychological problems. In Study 1, 250 early adolescents (M = 12.6 years) and their primary caregivers completed assessments of family and child functioning. In Study 2, 201 mothers and their two-year old children participated in a multi-method, longitudinal desig...
INTRODUCTION This research examines the interrelations of attachment security, feelings towards the self, and attributions about others in middle childhood. METHODS Five-to nine-year-old children (n=176) completed the Separation Anxiety Test, which provided a measure of attachment security and a puppet interview was used to assess feelings towards the self. A subset of 89 participants receive...
This study aims to investigate certain communication dimensions to assess the impact of Computer Mediated Communication (CMC) tendencies of students on ubiquitous environments. Communication dimensions were determined as message content, message interaction, semantic of message, emotional situation, and security. Message content was used as a determiner indicator to measure the effectiveness of...
Even though Privacy concerns (PC) and security concerns (SC) are acknowledged as separate constructs, many studies argue that they are related or, even worse, confused. Building upon the non-overlapping SC and PC dimensions, we propose Internet Users Information Transmission Security Concern (IUITSC) scale. We argue that the scale when used in conjunction with PC scale would cover the entire ga...
The use of Internet for sharing health-related information has served to empower patients, improve self-health management knowledge and provide emotional support to patients. This paper investigates the factors that influence the use of Internet to share health-related information by patients covered under Medicare, especially, the impact of security and privacy concern. This paper adapts the I...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید