نتایج جستجو برای: social threat

تعداد نتایج: 655959  

2017
Tianyang Zhang Sisi Xi Yan Jin Yanhong Wu

Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-eval...

Journal: :Archives of general psychiatry 2009
Philippe R Goldin Tali Manber Shabnam Hakimi Turhan Canli James J Gross

CONTEXT Social anxiety disorder is thought to involve emotional hyperreactivity, cognitive distortions, and ineffective emotion regulation. While the neural bases of emotional reactivity to social stimuli have been described, the neural bases of emotional reactivity and cognitive regulation during social and physical threat, and their relationship to social anxiety symptom severity, have yet to...

2015
Johanna U. Frisch Jan A. Häusser Andreas Mojzisch

In our lives, we face countless situations in which we are observed and evaluated by our social interaction partners. Social-evaluative threat is frequently associated with strong neurophysiological stress reactions, in particular, an increase in cortisol levels. Yet, social variables do not only cause stress, but they can also buffer the neurophysiological stress response. Furthermore, social ...

Journal: :CoRR 2016
Krzysztof Szczypiorski

In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a ...

Journal: :Journal of child psychology and psychiatry, and allied disciplines 2015
Daniel Ewon Choe Daniel S Shaw Erika E Forbes

BACKGROUND Maladaptive social information processing, such as hostile attributional bias and aggressive response generation, is associated with childhood maladjustment. Although social information processing problems are correlated with heightened physiological responses to social threat, few studies have examined their associations with neural threat circuitry, specifically amygdala activation...

Journal: :Behaviour research and therapy 2012
Alexandre Heeren Hannah E Reese Richard J McNally Pierre Philippot

Social phobics exhibit an attentional bias for threat in probe detection and probe discrimination paradigms. Attention training programs, in which probes always replace nonthreatening cues, reduce attentional bias for threat and self-reported social anxiety. However, researchers have seldom included behavioral measures of anxiety reduction, and have never taken physiological measures of anxiety...

2016
Nathalie Baracaldo Balaji Palanisamy James Joshi

Insider attacks are among the most dangerous and costly attacks to organizations. These attacks are carried out by individuals who are legitimately authorized to access the system. Preventing insider attacks is a daunting task. The recent proliferation of social media and mobile devices offer new opportunities to collect geo-social information that can help in detecting and deterring insider at...

2013
Jennifer S. Beer David S. Chester Brent L. Hughes

In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit: • We tested competing views about the processes underlying self-serving social comparisons. • Self-esteem threat and cogniti...

Journal: :CoRR 2012
Manoj Rameshchandra Thakur Sugata Sanyal

The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social networking platform [5]. Almost 33% of the crimes on the in...

2001
Arijit Mukherjee Enrico Pennings

Once a new technology has been invented, there is a credible threat of imitation when patent protection is strong and imitation cost is low. Within the area of credible imitation, the innovator has an incentive to postpone technology adoption when the cost of imitation is relatively high. The possibility of licensing, however, eliminates or at least reduces the incentive for delayed technology ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید