نتایج جستجو برای: avoidanceanxiety insecure

تعداد نتایج: 4640  

Journal: :Journal of Organizational Change Management 2015

Journal: :Journal of Attention Disorders 2013

Background and Aim: The obsessive-compulsive disorder is one of the major problems in mental health. Growth experiences such as attachment play an important role in the formation of mental harm. This research has been designed with the aim of investigating schema therapy on attachment styles (secure, insecure anxiety& insecure avoidance) and symptoms of patients with obsessive-compulsive disord...

Journal: :Personality & social psychology bulletin 2005
David P Schmitt

Different evolutionary perspectives offer competing views on short-term mating and attachment. Some theories argue that short-term mating results from insecure attachment, particularly the maladaptive attachment features of low self-esteem, interpersonal distrust, social avoidance, and emotional instability. Other theories posit that short-term mating is adaptive, having evolved as an ecologica...

Journal: :Psychoneuroendocrinology 2009
Anna Buchheim Markus Heinrichs Carol George Dan Pokorny Eva Koops Peter Henningsen Mary-Frances O'Connor Harald Gündel

Repeated interactions between infant and caregiver result in either secure or insecure relationship attachment patterns, and insecure attachment may affect individual emotion-regulation and health. Given that oxytocin enhances social approach behavior in animals and humans, we hypothesized that oxytocin might also promote the subjective experience of attachment security in humans. Within a 3-we...

2017
Sheila Mammen Jean W. Bauer Leslie Richards

Survey data from a USDA-funded multi-state longitudinal project revealed a paradox where rural low-income families from states considered prosperous were persistently more food insecure than similar families from less prosperous states. An examination of quantitative and qualitative data found that families in the food insecure states were more likely to experience greater material hardship and...

1999
Peter Sewell Jan Vitek

Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user’s desktop may now consist of many smaller components that interact in intricate ways. Some components will be downloaded from the network from sources that are only partially trusted. A user would like to know that a number of security properties hold, e.g. that persona...

Journal: :IACR Cryptology ePrint Archive 2009
Yongge Wang

Network coding allows the routers to mix the received information before forwarding them to the next nodes. Though this information mixing has been proven to maximize network throughput, it also introduces security challenges such as pollution attacks. A malicious node could insert a malicious packet into the system and this corrupted packet will propagate more quickly than in traditional copy-...

2012
Taeho Kwon Zhendong Su

Software is commonly built from reusable components that provide desired functionalities. Although component reuse significantly improves software productivity, insecure component usage can lead to security vulnerabilities in client applications. For example, we noticed that widely-used IE-based browsers, such as IE Tab, do not enable important security features that IE enables by default, even...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید