نتایج جستجو برای: program misuse
تعداد نتایج: 469764 فیلتر نتایج به سال:
BACKGROUND The U.S. prevalence of misuse of prescription opioid analgesics has increased substantially over the past decade but research on the factors influencing misuse of these medications remains preliminary. In the literature on alcohol, marijuana and stimulants, substance-related expectancies have been found to predict level of substance use. A similar line of research is needed to better...
OBJECTIVE Data on use and misuse of six classes of illicit substances by male twin pairs were used to examine whether genetic and shared environmental risk factors for substance use disorders are substance-specific or -nonspecific in their effect. METHOD Lifetime history of use and abuse/dependence of cannabis, cocaine, hallucinogens, sedatives, stimulants, and opiates was assessed at persona...
The automotive industry’s future trends, such as automated driving or advanced driver assistance, require large bandwidths to handle massive data streams and strongly depend on well timed communication. The Ethernet technology is seen as a suitable candidate to cover those needs for vehicle-internal networks; however, Ethernet involves security issues. Thus, by discussing automotive Ethernet at...
Substance misuse is usually associated with poorer psychiatric medication adherence among psychiatric patients. Identifying predictors of medication adherence among patients with dual psychiatric and substance misuse problems is important because poor adherence is associated with relapse and re-hospitalization. The subjects were patients newly admitted to a psychiatric outpatient program who we...
Programmers often consult an online Q&A forum such as Stack Overflow to learn new APIs. This paper presents an empirical study on the prevalence and severity of API misuse on Stack Overflow. To reduce manual assessment effort, we design Maple, an API usage mining approach that extracts patterns from over 380K Java repositories on GitHub and subsequently reports potential API usage violations in...
General deterrence theory suggests that deterrent security countermeasures (e.g., security policies, security awareness programs, security software) can be used to control IS misuse in organizations. However, empirical studies that have examined the effectiveness of such techniques have produced inconclusive results. A limitation of these studies is that they ignore the impacts of sanction perc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید