排序方式: 共有7条查询结果,搜索用时 15 毫秒
1
1.
Individually, both near-misses and losses disguised as wins (LDWs) have been seen to exert pro-motivational effects on gambling. However, it is not clear whether both structural characteristics are effective within the same game. Participants (n = 40) played a slot machine simulation. The simulation delivered near-misses, wins and ‘full-misses’. Half the participants also received LDWs that occurred independently of the outcomes on the payline. Valence and motivation ratings were collected after each round. Results showed that the LDW group reported increased valence ratings compared to the no-LDW group. Within the LDW group, trials with LDWs also resulted in increased enjoyment compared to trials without LDWs. We distinguished near-misses falling either side of the payline. Near-misses before the payline (NMB) were rated as more motivational than near-misses after the payline (NMA), whereas NMAs were rated as more aversive than NMBs. These differences between the two near-miss types were exacerbated by LDWs. Results demonstrate LDWs increase the trial-by-trial enjoyment of non-win outcomes. The motivational and hedonic effects of near-misses differed for events either side of the payline, and these differences were exaggerated by the presence of LDWs. Thus, near-misses can retain their effectiveness in complex forms of gambling that also deliver LDWs. 相似文献
2.
Criminals have at their disposal a variety of technologies for hiding communications and evidence stored on computers from law enforcement. These include encryption, passwords, digital compression, steganography, remote storage, and audit disabling. They can also hide crimes through anonymity tools and techniques such as anonymous remailers, anonymous digital cash, looping, cloned cellular phones, and cellular phone cards. This paper discusses use of these technologies by criminals and terrorists, and how that use has affected investigations and prosecutions. Options available to law enforcement for dealing with the technologies, especially encryption, are also discussed. Numerous case studies are presented for illustration. 相似文献
3.
Katheryne Baugh 《Social Studies》2013,104(1):15-16
The purpose of the study was to examine if and how elementary preservice teachers’ perceptions about history were changed upon their completion of a class project that engaged them in a discipline-specific inquiry as a method of teaching history. Surveys were administered to assess any changes in their perception of the history before and after they participated in the class project. The preservice teachers’ reflective writings were used to explore any themes that emerged about historical inquiry as well as to understand their development of pedagogical knowledge about teaching history. The study results provide implications for inquiry-based teaching in social studies education. 相似文献
4.
ABSTRACTFew studies have examined the influence that parenting style has on the contraceptive use of college students. The current study explored the relationships between perceived parenting style, contraceptive attitudes, contraceptive self-efficacy, and contraceptive use in 270 college students. Analyses revealed that perceived parenting style had a relationship with contraceptive attitudes and when combined with contraceptive self-efficacy predicted contraceptive use. Findings suggest that for college students, both internal and external influences on beliefs contribute to contraceptive use and the parent–child relationship remains influential. Further research should explore specific aspects of parent–child communication that increase self-efficacy and subsequent contraceptive use. The implications of current results could inform the delivery of parent education and student sexual health programs. 相似文献
5.
Take a look at nine important factors that contribute to a successful case management program. Discover why it's imperative to design the program to fit the unique population and meet the organizational needs and objectives. 相似文献
6.
7.
1