نتایج جستجو برای: horneyan defensive strategies

تعداد نتایج: 395881  

2015
Bernhard Leidner Mengyao Li Peter Kardos

Intergroup violence can profoundly affect the health of involved parties. Complementing existing research on ingroup-suffered violence and health, this paper proposes an integrative framework explicating how and why ingroup-committed violence can positively or negatively affect the health of ingroup members. Based on different models of social identity and health, we argue that ingroup identifi...

The armed forces and the army are main elements of national power. Military readiness gives real significance to the geography, natural resources, and industrial power. Military elements of national power include military purposes, military doctrines, military strategies and policies (defensive and non-defensive), forces, training, command, military technology, weapons and equipment, military o...

Journal: :Creativity and Innovation Management 2022

Many articles in the open innovation literature studied link between intellectual property protection mechanisms and openness, obtaining contrasting results. This paper bridges on one strategy. It leverages three high-level strategies—defensive, collaborative impromptu—recently defined to identify how they entail different approaches outbound innovation. The article advances that defensive, imp...

1994
Joseph H Davis B Christopher Philips

Executive summary. Conventional wisdom maintains that investors can improve their portfolio's performance during bad times by shifting their equity exposure defensively toward less-cyclical, lower-beta sectors. This paper investigates the strengths and weaknesses of defensive equity investing by focusing on the historical performance of defensive sectors during two periods: U.S. equity bear mar...

2016
Andrew Fielder Tingting Li Chris Hankin

Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use of modern IT technologies enables cyber attacks to disrupt the operation of ICS. Advanced Persistent Threats (APT) are the most threatening attacks to ICS due to their long persistence and destructive cyberphysical effects to ICS. This paper considers a simulation of attackers and defenders of an...

Journal: :American journal of psychotherapy 2009
L Van Henricus Jack Dekker Jaap Peen Robert E Abraham Robert Schoevers

This study explored the predictive value of observer-rated and self-reported defensive functioning on the outcome of psychotherapy for the treatment of depression. Defense styles were measured according to the Developmental Profile (DP) and the Defense Style Questionnaire (DSQ) in 81 moderately severely depressed patients. All patients were treated with Short-term Psychodynamic Supportive Psych...

Journal: :J. Systems Science & Complexity 2013
Luís Vilar Duarte Araújo Keith Davids Yaneer Bar-Yam

Luís Vilar, Duarte Araújo, Keith Davids and Yaneer Bar-Yam 1 Lusófona University of Humanities and Technologies, Lisbon, Portugal 2 Technical University of Lisbon, Lisbon, Portugal 3 Queensland University of Technologies, Brisbane, Queensland, Australia 4 New England Complex Systems Institute, Cambridge, Massachusetts, USA Abstract Quantitative analysis is increasingly being used in team sports...

2015
Hamit Cihan

The purpose of this study was to investigate the effects of alterations in the defensive strategies on physiological responses and time-motion characteristics during 3 × 4 min small-sided games (SSGs) in young soccer players. Eighteen young soccer players (age 19.6±0.5 years, body height 178.3±4.6 cm, body mass 71.9±7.5 kg and VO2max 49.51±2.44 ml·kg-1·min-1) voluntarily participated in SSGs wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید