956 resultados para Romantic Threat


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Legionnaires' Disease has been a continuing source of concern to researchers and to medical personnel. As a result of the questions regarding how it is spread, innkeepers must take certain precautions to protect their property and their guests. The authors offer several legal cautions as well as background information for everyone in the industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

China's emergence as an economic powerhouse has often been portrayed as threatening to America's economic strength and to its very identity as "the global hegemon." The media's alarmist response to an economic competitor is familiar to those who remember US-Japanese relations in the 1980s. In order to better understand the basis of American threat perception, this study explores the independent and interactive impact of three variables (perceptions of the Other's capabilities, perceptions of the Other as a threat versus as an opportunity, and perceptions of the Other's political culture) on attitudes toward two different economic competitors (Japan 1977-1995 and China 1985-2011). Utilizing four methods (historical process tracing, public polling data analysis, social scientific experimentation, and content analysis), this study demonstrates that increases in the Other's economic capabilities have a much smaller impact on attitudes than is commonly believed. It further shows that while perceptions of threat/opportunity played a significant role in shaping attitudinal response toward Japan, perceptions of political culture are the most important factor driving attitudes toward China today. This study contributes to a better understanding of how states react to threats and construct negative images of their economic rivals. It also helps to explain the current Sino-American relationship and enables better predictions as to its potential future course. Finally, these findings contribute to cultural explanations of the democratic peace phenomenon and provide a boundary condition (political culture) for the liberal proposition that opportunity ameliorates conflict in the economic realm.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Attachment and interpersonal theory suggest a sequential pattern of relationships beginning in the earliest stage of development and progressing to social and eventually romantic relationships. Theoretically, cross-sex experiences have an important role in the progression of interpersonal relationships. Despite the prevalence of these theories about the nature of romantic relationship development, the linkage of cross-sex experience (CSE) to romantic relationships has not been established. Indeed, it is an intuitive assumption, especially within Western society and these theories do not consider socio-cultural factors that may influence CSE and relationship satisfaction. This study addresses the varying contextual factors that may contribute to relationship satisfaction and adjustment, aside from CSE, and is divided into two parts. Study 1, addresses CSE, relationship satisfaction, and adjustment in a unique population, ultra-Orthodox Jews. Among this population, social or romantic CSE is limited and sexes are effectively segregated. Study 2, expanded the study to a larger sample of U.S. college students, to assess the linkage of CSE to romantic relationship satisfaction in a more typical Western population. It included social norm and support variables to address the contextual nature of relationship development and satisfaction. Results demonstrated clear differences in the relation between CSE and relationship satisfaction in the two samples. In the first sample CSE was unrelated to relationship satisfaction; nevertheless, relationship satisfaction was associated with adjustment as it is for more typical populations with greater CSE. These results suggested the importance of specifying how social norms and social support relate to CSE, relationship satisfaction and adjustment. The results from the second sample were consistent with the theoretical framework upon which the social/romantic literature is based. CSE was directly connected to relationship satisfaction. As anticipated, CSE, relationship satisfaction, and adjustment also varied as a function of social norms and support. These findings further validate the influence of socio-cultural factors on relationship satisfaction and adjustment. This study contributes to the romantic relationship literature and broadens our understanding of the complex nature of interpersonal and romantic relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

NEC(ROMANTIC) is a poetry collection thematically linked through images of insects, celestial bodies, bones, and other elements of the supernatural. These images are indicative of spells, but the parenthesis around romantic in the collection’s title also implies idealism. The poems explore the author’s experiences with death, grief, love, oppression, and addiction. NEC(ROMANTIC) employs the use of traditional forms such as the villanelle, sestina, and haiku to organize these experiences. Prose poetry and a peca kucha ground the center of NEC(ROMANTIC) which alternates between lyrical and narrative gestures. NEC(ROMANTIC) is influenced by Sylvia Plath. The author uses Plath’s methods of compression, sound, and rhythm to create a swift, child-like tone when examining emotionally laden topics. Ilya Kaminsky influences lyrical elements of the poems, including surrealism. Spencer Reese’s combination of the natural and personal world is also paramount to this book. Adrienne Rich and Audre Lorde influence NEC(ROMANTIC)’s political poetry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined links between adolescent depressive symptoms, actual pubertal development, perceived pubertal timing relative to one’s peers, adolescent-maternal relationship satisfaction, and couple sexual behavior. Assessments of these variables were made on each couple member separately and then these variables were used to predict the sexual activity of the couple. Participants were drawn from the National Longitudinal Study of Adolescent Health (Add Health; Bearman et al., 1997; Udry, 1997) data set (N = 20,088; aged 12-18 years). Dimensions of adolescent romantic experiences using the total sample were described and then a subsample of romantically paired adolescents (n = 1,252) were used to test a risk and protective model for predicting couple sexual behavior using the factors noted above. Relevant measures from the Wave 1 Add Health measures were used. Most of the items used in Add Health to assess romantic relationship experiences, adolescent depressive symptoms, pubertal development (actual and perceived), adolescent-maternal relationship satisfaction, and couple sexual behavior were drawn from other national surveys or from scales with well documented psychometric properties. Results demonstrated that romantic relationships are part of most adolescents’ lives and that adolescents’ experiences with these relationships differ markedly by age, sex, and race/ethnicity. Further, each respective couple member’s pubertal development, perceived pubertal timing, and maternal relationship satisfaction were useful in predicting sexual risk-promoting and risk-reducing behaviors in adolescent romantic couples. Findings in this dissertation represent an initial step toward evaluating explanatory models of adolescent couple sexual behavior.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stereotype threat (Steele & Aronson, 1995) refers to the risk of confirming a negative stereotype about one’s group in a particular performance domain. The theory assumes that performance in the stereotyped domain is most negatively affected when individuals are more highly identified with the domain in question. As federal law has increased the importance of standardized testing at the elementary level, it can be reasonably hypothesized that the standardized test performance of African American children will be depressed when they are aware of negative societal stereotypes about the academic competence of African Americans. This sequential mixed-methods study investigated whether the standardized testing experiences of African American children in an urban elementary school are related to their level of stereotype awareness. The quantitative phase utilized data from 198 African American children at an urban elementary school. Both ex-post facto and experimental designs were employed. Experimental conditions were diagnostic and non-diagnostic testing experiences. The qualitative phase utilized data from a series of six focus group interviews conducted with a purposefully selected group of 4 African American children. The interview data were supplemented with data from 30 hours of classroom observations. Quantitative findings indicated that the stereotype threat condition evoked by diagnostic testing depresses the reading test performance of stereotype-aware African American children (F[1, 194] = 2.21, p < .01). This was particularly true of students who are most highly domain-identified with reading (F[1, 91] = 19.18, p < .01). Moreover, findings indicated that only stereotype-aware African American children who were highly domain-identified were more likely to experience anxiety in the diagnostic condition (F[1, 91] = 5.97, p < .025). Qualitative findings revealed 4 themes regarding how African American children perceive and experience the factors related to stereotype threat: (1) a narrow perception of education as strictly test preparation, (2) feelings of stress and anxiety related to the state test, (3) concern with what “others” think (racial salience), and (4) stereotypes. A new conceptual model for stereotype threat is presented, and future directions including implications for practice and policy are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The effects of the acidification associated with CO2 leakage from sub-seabed geological storage was studied by the evaluation of the short-term effects of CO2-induced acidification on juveniles of the bivalve Ruditapes philippinarum. Laboratory scale experiments were performed using a CO2-bubbling system designed to conduct ecotoxicological assays. The organisms were exposed for 10 days to elutriates of sediments collected in different littoral areas that were subjected to various pH treatments (pH 7.1; pH 6.6; pH 6.1). The acute pH-associated effects on the bivalves were observed, and the dissolved metals in the elutriates were measured. The median toxic effect pH was calculated, which ranged from 6.33 and 6.45. The amount of dissolved Zn in the sediment elutriates increased in parallel with the pH reductions and was correlated with the proton concentrations. The pH, the pCO2 and the dissolved metal concentrations (Zn and Fe) were linked with the mortality of the exposed bivalves.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

the poetry by J.R. Planché ; composed & arranged with an accompaniment for the piano forte by Carl Maria von Weber.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Book review: Romantic Catholics: France’s Postrevolutionary Generation in Search of a Modern Faith. By Carol E. Harrison. Ithaca: Cornell University Press, 2014. 344 pp., ill.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation examines novels that use terrorism to allegorize the threatened position of the literary author in contemporary culture. Allegory is a term that has been differently understood over time, but which has consistently been used by writers to articulate and construct their roles as authors. In the novels I look at, the terrorist challenge to authorship results in multiple deployments of allegory, each differently illustrating the way that allegory is used and authorship constructed in the contemporary American novel. Don DeLillo’s Mao II (1991), first puts terrorists and authors in an oppositional pairing. The terrorist’s ability to traffic in spectacle is presented as indicative of the author’s fading importance in contemporary culture and it is one way that terrorism allegorizes threats to authorship. In Philip Roth’s Operation Shylock (1993), the allegorical pairing is between the text of the novel and outside texts – newspaper reports, legal cases, etc. – that the novel references and adapts in order to bolster its own narrative authority. Richard Powers’s Plowing the Dark (1999) pairs the story of an imprisoned hostage, craving a single book, with employees of a tech firm who are creating interactive, virtual reality artworks. Focusing on the reader’s experience, Powers’s novel posits a form of authorship that the reader can take into consideration, but which does not seek to control the experience of the text. Finally, I look at two of Paul Auster’s twenty-first century novels, Travels in the Scriptorium (2007) and Man in the Dark (2008), to suggest that the relationship between representations of authors and terrorists changed after 9/11. Auster’s author-figures forward an ethics of authorship whereby novels can use narrative to buffer readers against the portrayal of violent acts in a culture that is suffused with traumatizing imagery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This dissertation is an exploration of how a small but important group of Romantic critics, finding fault in the ideal of three unities developed by neoclassical Academicians and wrongly attributed to Aristotle, turned to the terminology and practices of the fine arts to emphasize their conception of organic unity in literature. The Romantic analogy to painting in particular enables a philosophical criticism of literature to present the aesthetic semblance of painting, the comprehension of a multitude of details in a harmonious whole that is a natural unity to its medium, as a paradigm of modern-romantic poetry and its aspirations to similar complexity, particularity, and imaginative colour. Further, in extension of the French Querelle des anciens et des modernes of the seventeenth century, the division of ancient and romantic art by Romantic critics like August Schlegel, Samuel Taylor Coleridge, and William Hazlitt not only establishes an ethnological and historical difference between the artistic productions of these two cultural periods but also allows, unlike the neoclassical unities, a non-anachronistic philosophical vocabulary of whole and parts or of the general and particular in the criticism of poetry, which involution provides a “rule” more consonant with the laws of the imagination rather than with the rhetorical and absolutist dicta that were thither available in the literary canon.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model (PBSM) for Android does not address this threat, as it is rather limited to mitigating risks due to individual apps. This paper presents a technique for assessing the threat of collusion for apps, which is a first step towards quantifying collusion risk, and allows us to narrow down to candidate apps for collusion, which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29000 Android apps provided by Intel Security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.