950 resultados para Attachment security
Resumo:
The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.
Resumo:
In the struggle to assert and consolidate its power, the Hamas movement of the Palestinian territories has devised several strategies for control. In recognition that control of security remains a key goal for any power-seeker, following its election victory in January 2006, Hamas entered into a fierce and ultimately successful conflict with Fatah for control of the Palestinian Authority Ministry of Interior and Palestinian Security Forces (PSF) in the Gaza Strip. One way in which Hamas was able to achieve this objective was through the creation of its own internal ‘police’ force called the Tanfithya (Executive Force or EF). This article details an anatomy of the EF and the implications of this force in terms of Hamas' confrontation with opponents and its attempts at governance. It also examines the extent to which the EF can be considered to be a model of Islamic policing and its impact on secular rivals in the Gaza Strip.
Resumo:
We study the process of low-energy electron capture by the SF(6) molecule. Our approach is based on the model of Gauyacq and Herzenberg [J. P. Gauyacq and A. Herzenberg, J. Phys. B 17, 1155 (1984)] in which the electron motion is coupled to the fully symmetric vibrational mode through a weakly bound or virtual s state. By tuning the two free parameters of the model, we achieve an accurate description of the measured electron attachment cross section and good agreement with vibrational excitation cross sections of the fully symmetric mode. An extension of the model provides a limit on the characteristic time of intramolecular vibrational relaxation in highly excited SF(6)(-). By evaluating the total vibrational spectrum density of SF(6)(-), we estimate the widths of the vibrational Feshbach resonances of the long-lived negative ion. We also analyze the possible distribution of the widths and its effect on the lifetime measurements, and investigate nonexponential decay features in metastable SF(6)(-).
Resumo:
This article presents an overview of current understanding of the interaction of low-energy positrons with molecules with emphasis on resonances, positron attachment, and annihilation. Measurements of annihilation rates resolved as a function of positron energy reveal the presence of vibrational Feshbach resonances (VFRs) for many polyatomic molecules. These resonances lead to strong enhancement of the annihilation rates. They also provide evidence that positrons bind to many molecular species. A quantitative theory of VFR-mediated attachment to small molecules is presented. It is tested successfully for selected molecule (e.g., methyl halides and methanol) where all modes couple to the positron continuum. Combination and overtone resonances are observed and their role is elucidated. Molecules that do not bind positrons and hence do not exhibit such resonances are discussed. In larger molecules, annihilation rates from VFR far exceed those explicable on the basis of single-mode resonances. These enhancements increase rapidly with the number of vibrational degrees of freedom, approximately as the fourth power of the number of atoms in the molecule. While the details are as yet unclear, intramolecular vibrational energy redistributio (IVR) to states that do not couple directly to the positron continuum appears to be responsible for these enhanced annihilation rates. In connection with IVR, experimental evidence indicates that inelastic positron escape channels are relatively rare. Downshifts of the VFR from the vibrational mode energies, obtained by measuring annihilate rates as a function of incident positron energy, have provided binding energies for 30 species. Their dependence upon molecular parameters and their relationship to positron-atom and positron-molecule binding-energy calculations are discussed. Feshbach resonances and positron binding to molecules are compared with the analogous electron-molecul (negative-ion) cases. The relationship of VFR-mediated annihilation to other phenomena such as Doppler broadening of the gamma-ray annihilation spectra, annihilation of thermalized positrons in gases, and annihilation-induced fragmentation of molecules is discussed. Possible areas for future theoretical and experimental investigation are also discussed.
Resumo:
This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better adaptation of watermark distortions to the host media. Two methods of deriving visual models for the watermarking system are adapted to the complex wavelet transforms and their performances are compared. To produce improved capacity a spread transform embedding algorithm is devised, this combines the robustness of spread spectrum methods with the high capacity of quantization based methods. Using established information theoretic methods, limits of watermark capacity are derived that demonstrate the superiority of complex wavelets over discretely sampled wavelets. Finally results for the algorithm against commonly used attacks demonstrate its robustness and the improved performance offered by complex wavelet transforms.
Resumo:
This study explores identification with one's national group using two distinct but interrelated concepts: identity content and relational orientation. Theoretical distinctions were drawn between two forms of identity content: traditional-cultural and civic, and between two forms of relational orientation: blind and constructive. The multidimensionality of both identity content and relational orientation and the relationships amongst these components were examined in a British sample: positive relationships were hypothesized between blind orientation and traditional-cultural content and between constructive orientation and civic content. Principal components analyses confirmed the hypothesized factor structures, and the resulting scales were highly reliable. Relationships amongst the resulting factors were explored using regression analyses. The overall results indicate support for the orthogonality of both the two orientation dimensions and the two content dimensions. Moreover, the hypothesized relationships between forms of orientation and content were largely supported. In conclusion, this study highlights the importance of looking at the relationship between identity content and relational orientation. The implications of these observations for theory and research are discussed with reference to using categories to
Resumo:
The article suggests that while the report of the Independent Commission on Policing (ICP) provides a police reform blueprint for Northern Ireland and elsewhere, it can also be seen as an attempt to engage more elliptically with contemporary debates in security governance vis-a-vis the increasingly fragmented nature of late-modern policing and the role of the state. A decade into the reform process in Northern Ireland and in spite of the networked approach postulated by the ICP, the public police continue to enjoy a pre-eminent place and little evidence exists of any significant weakening of state steering and rowing of security. The discussion proposes a tentative typology explaining the continued colonization of security spaces by the State using constituent attendant processes of compartmentalizing, crowding out and corralling.