نتایج جستجو برای: impersonal md
تعداد نتایج: 43350 فیلتر نتایج به سال:
This paper argues that the term ‘passive’ has been systematically misapplied to a class of impersonal constructions that suppress the realization of a syntactic subject. The reclassification of these constructions highlights a typological contrast between two types of verbal diathesis and clarifies the status of putative ‘passives of unaccusatives ’ and ‘transitive passives’ in Balto-Finnic and...
This paper reports the relative contributions of several facets of subclinical psychopathy (i.e., callous affect, erratic lifestyle, interpersonal manipulation), subclinical narcissism (i.e., entitlement, exploitation), and trait aggression (i.e., anger) to the prediction of four enduring attitudes towards women and sexual assault (i.e., hostility towards women, negative attitudes regarding wom...
What causes distinct trajectories of market development? Why did the modern market economy, characterized by impersonal exchange, first emerge in the West? This paper presents a theory of market development and evaluates it based on the histories of England, China, and Japan. The analysis focuses on how distinct coercion-constraining institutions that secure property rights differentially inter...
This paper investigates the role of moral norms as a social institution in anonymous interactions trust games. We argue that morality functions norm and therefore comes with specific punishments rewards. Since these incentives are confounded material game, an augmented version game is used, which communication without consequences possible. conduct experiment offers participants opportunity to ...
Nowadays psychologists have decisively shifted their focus to well-being as a component of school life. Hence, this study was carried out to examine the mediating role of general causality orientation (and its three components, i.e., autonomy, control and impersonal) in the relationship between parental bonding and school well-being. The statistical population of the study was comprised of all ...
Traditional methods of user authentication in distributed systems suuer from an important weakness which is due to the low degree of randomness in secrets that human beings can use for identiication. Even though weak secrets (passwords and PINs) are typically not exposed in the clear over the communication lines, they can be discovered with oo-line brute force attacks based on exhaustive trials...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید