نتایج جستجو برای: retaliation etc in addition
تعداد نتایج: 16998741 فیلتر نتایج به سال:
Security protocols intend to give their parties reasonable assurance that certain security properties will protect their communication session. However, the literature confirms that the protocols may suffer subtle and hidden attacks. Flawed protocols are customarily sent back to the design process, but the costs of reengineering a deployed protocol may be prohibitive. This paper outlines the co...
This study examines ethnic and gender differences in open-ended immediate responses to an online prompt provided by a nationwide sample of 1,559 individuals in the days following the 9/11 terrorist attacks. These responses were used to predict longitudinal outcomes over the following 2 years. Results show that African Americans and women responded with more emotions (e.g., sadness, sympathy) th...
Across and within societies, people vary in their propensities towards exploitative and retaliatory defection in potentially cooperative interaction. We hypothesized that this variation reflects adaptive responses to variation in cues during childhood that life will be harsh, unstable and short--cues that probabilistically indicate that it is in one's fitness interests to exploit co-operators a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید