نتایج جستجو برای: avoidanceanxiety insecure
تعداد نتایج: 4640 فیلتر نتایج به سال:
Background and Aim: The obsessive-compulsive disorder is one of the major problems in mental health. Growth experiences such as attachment play an important role in the formation of mental harm. This research has been designed with the aim of investigating schema therapy on attachment styles (secure, insecure anxiety& insecure avoidance) and symptoms of patients with obsessive-compulsive disord...
Different evolutionary perspectives offer competing views on short-term mating and attachment. Some theories argue that short-term mating results from insecure attachment, particularly the maladaptive attachment features of low self-esteem, interpersonal distrust, social avoidance, and emotional instability. Other theories posit that short-term mating is adaptive, having evolved as an ecologica...
Repeated interactions between infant and caregiver result in either secure or insecure relationship attachment patterns, and insecure attachment may affect individual emotion-regulation and health. Given that oxytocin enhances social approach behavior in animals and humans, we hypothesized that oxytocin might also promote the subjective experience of attachment security in humans. Within a 3-we...
Survey data from a USDA-funded multi-state longitudinal project revealed a paradox where rural low-income families from states considered prosperous were persistently more food insecure than similar families from less prosperous states. An examination of quantitative and qualitative data found that families in the food insecure states were more likely to experience greater material hardship and...
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user’s desktop may now consist of many smaller components that interact in intricate ways. Some components will be downloaded from the network from sources that are only partially trusted. A user would like to know that a number of security properties hold, e.g. that persona...
Network coding allows the routers to mix the received information before forwarding them to the next nodes. Though this information mixing has been proven to maximize network throughput, it also introduces security challenges such as pollution attacks. A malicious node could insert a malicious packet into the system and this corrupted packet will propagate more quickly than in traditional copy-...
Software is commonly built from reusable components that provide desired functionalities. Although component reuse significantly improves software productivity, insecure component usage can lead to security vulnerabilities in client applications. For example, we noticed that widely-used IE-based browsers, such as IE Tab, do not enable important security features that IE enables by default, even...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید