首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
管理学   1篇
社会学   6篇
  2013年   3篇
  2003年   1篇
  2001年   1篇
  1999年   1篇
  1994年   1篇
排序方式: 共有7条查询结果,搜索用时 125 毫秒
1
1.
Individually, both near-misses and losses disguised as wins (LDWs) have been seen to exert pro-motivational effects on gambling. However, it is not clear whether both structural characteristics are effective within the same game. Participants (n = 40) played a slot machine simulation. The simulation delivered near-misses, wins and ‘full-misses’. Half the participants also received LDWs that occurred independently of the outcomes on the payline. Valence and motivation ratings were collected after each round. Results showed that the LDW group reported increased valence ratings compared to the no-LDW group. Within the LDW group, trials with LDWs also resulted in increased enjoyment compared to trials without LDWs. We distinguished near-misses falling either side of the payline. Near-misses before the payline (NMB) were rated as more motivational than near-misses after the payline (NMA), whereas NMAs were rated as more aversive than NMBs. These differences between the two near-miss types were exacerbated by LDWs. Results demonstrate LDWs increase the trial-by-trial enjoyment of non-win outcomes. The motivational and hedonic effects of near-misses differed for events either side of the payline, and these differences were exaggerated by the presence of LDWs. Thus, near-misses can retain their effectiveness in complex forms of gambling that also deliver LDWs.  相似文献   
2.
Criminals have at their disposal a variety of technologies for hiding communications and evidence stored on computers from law enforcement. These include encryption, passwords, digital compression, steganography, remote storage, and audit disabling. They can also hide crimes through anonymity tools and techniques such as anonymous remailers, anonymous digital cash, looping, cloned cellular phones, and cellular phone cards. This paper discusses use of these technologies by criminals and terrorists, and how that use has affected investigations and prosecutions. Options available to law enforcement for dealing with the technologies, especially encryption, are also discussed. Numerous case studies are presented for illustration.  相似文献   
3.
The purpose of the study was to examine if and how elementary preservice teachers’ perceptions about history were changed upon their completion of a class project that engaged them in a discipline-specific inquiry as a method of teaching history. Surveys were administered to assess any changes in their perception of the history before and after they participated in the class project. The preservice teachers’ reflective writings were used to explore any themes that emerged about historical inquiry as well as to understand their development of pedagogical knowledge about teaching history. The study results provide implications for inquiry-based teaching in social studies education.  相似文献   
4.
ABSTRACT

Few studies have examined the influence that parenting style has on the contraceptive use of college students. The current study explored the relationships between perceived parenting style, contraceptive attitudes, contraceptive self-efficacy, and contraceptive use in 270 college students. Analyses revealed that perceived parenting style had a relationship with contraceptive attitudes and when combined with contraceptive self-efficacy predicted contraceptive use. Findings suggest that for college students, both internal and external influences on beliefs contribute to contraceptive use and the parent–child relationship remains influential. Further research should explore specific aspects of parent–child communication that increase self-efficacy and subsequent contraceptive use. The implications of current results could inform the delivery of parent education and student sexual health programs.  相似文献   
5.
Take a look at nine important factors that contribute to a successful case management program. Discover why it's imperative to design the program to fit the unique population and meet the organizational needs and objectives.  相似文献   
6.
7.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号