期刊文献+
共找到894篇文章
< 1 2 45 >
每页显示 20 50 100
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
1
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
Food and Nutritional Security in the Refugee Women’s Life Narratives
2
作者 Juliana Vidal Vieira Guerra Valdecyr Herdy Alves +5 位作者 Brenda Caroline Martins da Silva Tatiana do Socorro dos Santos Calandrini Giovanna Rosario Soanno Marchiori Ediane de Andrade Ferreira Maria Bertilla Lutterbach Riker Branco Diego Pereira Rodrigues 《Food and Nutrition Sciences》 2023年第11期1031-1042,共12页
Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with... Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with 11 participants, refugee women residing in the state of Rio de Janeiro, Brazil. Results: The meanings and feelings evidenced in the life narratives of refugee women expressed the insecurities and weaknesses with food in the resettlement. Final Considerations: Given the meanings and feelings regarding food in the refuge, it is expected that the present study will contribute to the elaboration of new action plans and intersectoral public policies of agile action to meet the demands of the refugee population, in the attempt to mitigate starvation, poverty, social differences and the compromised health status of the refugee population. 展开更多
关键词 Food security Feeding behavior Refugees Human Migration Human Right to Adequate Food
下载PDF
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior 被引量:1
3
作者 Faisal Alghayadh Debatosh Debnath 《Advances in Internet of Things》 2021年第1期10-25,共16页
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ... With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique. 展开更多
关键词 Anomaly Detection Smart Home Systems behavioral Patterns security Threats
下载PDF
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
4
作者 Mohamed Shohoud 《Journal of Information Security》 2023年第2期152-180,共29页
As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could h... As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could have devastating effects on the operations and reputation of these companies. Preventing such cyberattacks is crucial. Especially, with the significance of the Egyptian oil and gas downstream sector to the local economy and the fact that many of these connected systems are sometimes managed remotely. This paper examines the value of the ISO 27001 standard in mitigating the effect of cyber threat and seeks to inspire decision-makers to the importance of the proactive measures to strengthen their organization’s cybersecurity posture and protect information critical assets. The study stresses the importance of improving the local educational system to bridge the gap between supply and demand for cybersecurity specialists by implementing a structured approach that emphasizes behavior modification to get a high return on investment in cybersecurity awareness. 展开更多
关键词 DOWNSTREAM Cyberattack Cyber security Mitigate Decision-Makers Proac-tive Measure Critical Assets behavior Modification
下载PDF
Study on the Use of Artificial Intelligence for Cybersecurity in Companies: Case of Companies in Burkina Faso
5
作者 Yanogo Kiswendsida Jean Hermann Ouedraogo Tounwendyam Frederic 《Engineering(科研)》 2023年第12期798-809,共12页
Poorly secured connected objects can compromise the security of an entire company, or even paralyze others. As useful as they are, they can be open doors for computer attacks against the company. To protect themselves... Poorly secured connected objects can compromise the security of an entire company, or even paralyze others. As useful as they are, they can be open doors for computer attacks against the company. To protect themselves, large companies set up expensive infrastructures to analyze the data that circulates inside and outside the company. They install a SOC, a Security Operation Center whose objective is to identify and analyze, using various tools, the level of protection of a company and, if necessary, to alert on vulnerabilities and leaks of security data. However, the attack detection capabilities of traditional systems are based on a base of known signatures. Problem is that it is increasingly rare to have to face threats whose signature is unknown. Artificial intelligence, on the contrary, does not look for fingerprints in the packets carrying the attack, but rather analyzes how these packets are arranged. The objective of this study is to show that the use of artificial intelligence in companies may be low and to show the positive impacts of its use compared to the traditional system used in companies. We also simulate an attack on a system equipped with artificial intelligence to highlight the advantages of AI in a computer attack. This research is important because it highlights the risks that companies expose themselves to by always remaining secure in their systems based on traditional techniques. The aim of this research is to show the advantages that AI offers on cyber security compared to the traditional security system. The expected result is to show the existing issues regarding the rate of use of AI on cybersecurity in Burkina Faso. . 展开更多
关键词 CYBERsecurity Artificial Intelligence Computer System Computer Attack in-formation security
下载PDF
How Perceived Benefits and Barriers Affect Millennial Professionals’ Online Security Behaviors
6
作者 Fabrice Djatsa 《Journal of Information Security》 2019年第4期278-301,共24页
Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an i... Over the past decade, there has been an increase in cybersecurity breaches through identity theft, hacking, phishing attacks, and the use of malware such as viruses, worms, or trojans. The breaches have triggered an increase in investment in information security in organizations. As technology continues to improve, the risks of having cybersecurity incidents also increase. Cybersecurity firms reported that in 2016, there were 1209 total breaches with 1.1 billion identities exposed. Most experts agree that human vulnerability is a significant factor in cybersecurity. Most issues related to advanced threats come from human nature and ignorance. For the study, the researcher examined the relationship between Millennial professionals’ perceptions of cybersecurity risks and users’ online security behaviors. The study focused on two elements of perception which are perceived benefits and perceived barriers. The researcher administered a survey to 109 participants randomly selected among Survey Monkey audience members. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between each of the independent variables and the dependent variable. The results from the statistical test provided enough evidence to reject each of the null hypothesis tested in this study. There were significant correlations between each of the independent variables, Perceived Benefits (PBE) and Perceived Barriers (PBA) and the dependent variable Online Security Behaviors (OSB). 展开更多
关键词 PERCEPTIONS Barriers BENEFITS ONLINE security behaviorS Millennial
下载PDF
Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations
7
作者 Fabrice Djatsa 《Journal of Information Security》 2020年第1期19-45,共27页
As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despit... As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO. 展开更多
关键词 Millennial PERCEPTIONS THREAT AVOIDANCE MOTIVATION Online security behaviorS
下载PDF
An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid Security
8
作者 Ding Daoqi State Grid Information & Telecommunication Co.,Ltd.Zhao Fang 《Electricity》 2009年第2期45-51,共7页
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The... In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS. 展开更多
关键词 EMS 2003 WAMS An In-Depth Study of Complex Power System Dynamic behavior Characteristics for Chinese UHV Power Grid security
下载PDF
Security enhancement of artificial neural network using physically transient form of heterogeneous memristors with tunable resistive switching behaviors
9
作者 Jing Sun Zhan Wang +6 位作者 Xinyuan Wang Ying Zhou Yanting Wang Yunlong He Yimin Lei Hong Wang Xiaohua Ma 《Science China Materials》 SCIE EI CAS CSCD 2024年第9期2856-2865,共10页
As a critical command center in organisms,the brain can execute multiple intelligent interactions through neural networks,including memory,learning and cognition.Recently,memristive-based neuromorphic devices have bee... As a critical command center in organisms,the brain can execute multiple intelligent interactions through neural networks,including memory,learning and cognition.Recently,memristive-based neuromorphic devices have been widely developed as promising technologies to build artificial synapses and neurons for neural networks.However,multiple information interactions in artificial intelligence devices potentially pose threats to information security.Herein,a transient form of heterogeneous memristor with a stacked structure of Ag/MgO/SiN_(x)/W is proposed,in which both the reconfigurable resistive switching behavior and volatile threshold switching characteristics could be realized by adjusting the thickness of the SiN_(x)layer.The underlying resistive switching mechanism of the device was elucidated in terms of filamentary and interfacial effects.Representative neural functions,including short-term plasticity(STP),the transformation from STP to long-term plasticity,and integrate-and-fire neuron functions,have been successfully emulated in memristive devices.Moreover,the dissolution kinetics associated with underlying transient behaviors were explored,and the water-assisted transfer printing technique was exploited to build transient neuromorphic device arrays on the water-dissolvable poly(vinyl alcohol)substrate,which were able to formless disappear in deionized water after 10-s dissolution at room temperature.This transient form of memristive-based neuromorphic device provides an important step toward information security reinforcement for artificial neural network applications. 展开更多
关键词 MEMRISTOR physically transient controlled resistive switching behavior information security
原文传递
Gender Differences in Information Security Management 被引量:1
10
作者 Fayez Alotaibi Aziz Alshehri 《Journal of Computer and Communications》 2020年第3期53-60,共8页
A wide and increasing range of different technologies, devices, platforms, applications and services are being used every day by home users. In parallel, home users are also experiencing a range of different online th... A wide and increasing range of different technologies, devices, platforms, applications and services are being used every day by home users. In parallel, home users are also experiencing a range of different online threats and attacks. Indeed, home users are increasingly being targeted as they lack the knowledge and awareness about potential threats and how to protect themselves. The increase in technologies and platforms also increases the burden upon a user to understand how to apply and manage security across the differing technologies, operating systems and applications. Different factors such as age, education, age and gender can have an impact on information security management and awareness. This research tries to investigate and examine the effect of gender differences on information security management and online safety for internet users. An online questionnaire has been conducted and collected 434 participants (311 males and 132 females). The results show that there is a significant difference between males and females in four of the eight identified security practices and aspects. The findings show that males are likely to have better information security behaviour and being protected online more than females. 展开更多
关键词 INFORMATION security CYBER security security behavior GENDER
下载PDF
Personality Traits and Cognitive Determinants——An Empirical Investigation of the Use of Smartphone Security Measures 被引量:6
11
作者 Jorg Uffen Nico Kaemmerer Michael H.Breitner 《Journal of Information Security》 2013年第4期203-212,共10页
In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and... In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model;cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed. 展开更多
关键词 security Measures PERSONALITY TRAITS behaviorAL Models Mobile security Smartphones
下载PDF
Study on Architecture-Oriented Information Security Management Model for Using Mobile Devices Control
12
作者 Wei-ming Ma 《Chinese Business Review》 2018年第9期442-464,共23页
The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:th... The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:the lack of accurate use of resources,the lack of protection of the mobile device from the overall point of view,the unclear division of responsibility among specialized agencies,and unclear members’responsibilities for their own duties.This study applies the structure behavior coalescence(SBC)methodology to integrate the organizational structure of the participating management and control units with effective management behaviors in a visualized and useful manner.The units can effectively communicate with each other and solve the four issues faced by the military barrack-areas for the control of mobile devices.This research fulfills improving the lack of control of the military mobile devices by using of management resources effectively and the establishment of mobile devices management with the overall concept,and strengthening the rights and responsibilities and information security awareness,through the logical verification and enterprise interview results. 展开更多
关键词 information security management structure behavior COALESCENCE MOBILE devices MILITARY ARMY
下载PDF
Which Aspects of Big Data Usage is Creating Information Security Concern?
13
作者 Hira Batool DU Rong 《Proceedings of Business and Economic Studies》 2018年第4期35-41,共7页
The present research study proposed some of the big data usage perspectives for testing either they have a role in creating information security concern or not.The researchers first dig out some of the theoretical sup... The present research study proposed some of the big data usage perspectives for testing either they have a role in creating information security concern or not.The researchers first dig out some of the theoretical support for filling the gap regarding big data and information security bridge that was previously noted in literature.The present researches approached big data analytics manager in the Pakistani banking industries for validating the proposed model.The data were analyzed using SPSS Andrews approach due to the nature of the research study.The findings revealed that the proposed perspective including perceived benefits,cloud storage,and online behavior monitoring should be tested in the future studies by proposing their indirect affect in the creation of information security issue.The study brings a new aspect in literature of management regarding big data usage practices. 展开更多
关键词 BIG data security CLOUD storage behavior monitoring
下载PDF
面向高性能计算环境的多维自适应授权访问策略
14
作者 和荣 王小宁 +3 位作者 肖海力 卢莎莎 赵一宁 迟学斌 《高技术通讯》 CAS 北大核心 2024年第4期331-341,共11页
高性能计算能力是国家综合实力和创新能力的重要体现,是支撑我国科技持续发展的关键技术之一。随着高性能计算的发展,越来越多领域的科研人员开始关注并使用高性能计算环境。高性能计算环境目前面临资源有限、用户数目增多等挑战。为保... 高性能计算能力是国家综合实力和创新能力的重要体现,是支撑我国科技持续发展的关键技术之一。随着高性能计算的发展,越来越多领域的科研人员开始关注并使用高性能计算环境。高性能计算环境目前面临资源有限、用户数目增多等挑战。为保证环境的安全性、提高环境资源的利用率,需设置一定的授权访问策略来约束用户的访问行为。本文针对高性能计算环境服务对象用户和应用社区或业务平台,基于机器学习算法对用户行为进行分析获取相关属性,设计并实现了一种多维自适应授权访问策略(MAAC)。实验表明,MAAC可实现对环境资源有效和灵活访问控制,同时该策略的决策时间可控制在1 ms内,与策略响应时间相比可忽略不计。 展开更多
关键词 高性能计算环境 授权 属性 用户行为 安全
下载PDF
行为经济学视角下担保型以物抵债的界定 被引量:3
15
作者 汪洋 刘冲 《云南社会科学》 CSSCI 北大核心 2024年第1期13-23,共11页
《合同编通则司法解释》所采取的“债务履行期届满前/后”之标准无法清楚界定担保型以物抵债。界定担保型以物抵债的意义在于准确适用流担保禁止规则,无法清楚界定的深层次原因在于对流担保禁止规则的正当性基础存在认识偏差。从行为经... 《合同编通则司法解释》所采取的“债务履行期届满前/后”之标准无法清楚界定担保型以物抵债。界定担保型以物抵债的意义在于准确适用流担保禁止规则,无法清楚界定的深层次原因在于对流担保禁止规则的正当性基础存在认识偏差。从行为经济学和心理学的研究来看,流担保禁止规则的正当性基础应当是避免债务人因过度自信和盲目乐观而受损。从这个角度出发,可以对以物抵债协议进行再类型化:若债务人最终给付内容不是由其的履行能力决定,或债务人最终给付内容的不确定不会对其造成损失,则以物抵债协议不需要被限制;在其他情况下,有必要对以物抵债协议的效力予以限制。若当事人存在担保的意思,则应通过流担保禁止规则限制以物抵债协议的效力,否则就适用违约金酌减规则。 展开更多
关键词 《合同编通则司法解释》 行为经济学 担保型以物抵债 流担保禁止规则 违约金酌减规则
下载PDF
新型配电系统分布式经济调度信息安全问题研究综述
16
作者 乐健 郎红科 +3 位作者 谭甜源 綦淦 王靖 汪维豪 《电力系统自动化》 EI CSCD 北大核心 2024年第12期177-191,共15页
随着大规模高比例的分布式电源接入电网运行,分布式经济调度系统因其优势显著受到更多的关注。但是,该系统特有的分布式通信构架、优化问题迭代求解过程和多利益主体参与模式为从系统内部和外部实施网络攻击提供了更宽广的时空条件,攻... 随着大规模高比例的分布式电源接入电网运行,分布式经济调度系统因其优势显著受到更多的关注。但是,该系统特有的分布式通信构架、优化问题迭代求解过程和多利益主体参与模式为从系统内部和外部实施网络攻击提供了更宽广的时空条件,攻击模式和手段更加复杂多样,解决信息安全问题是提高分布式经济调度系统实用化程度的重要前提和基础。文中对分布式经济调度系统可能出现的信息安全问题及应对措施的研究现状进行了综述。首先,讨论了电力系统各种通信技术对分布式经济调度系统的适应性以及通信技术本身存在的安全风险;其次,介绍了外部网络攻击和内部恶意行为两类典型的信息安全问题,并进行了相关的特点分析和影响评估;然后,归纳和分析了两类信息安全问题的检测、预防、抑制措施和方法;最后,对信息安全问题模型的建立和综合安全防御体系构建进行了探讨。 展开更多
关键词 分布式经济调度 信息安全 外部网络攻击 内部恶意行为 信息物理系统 区块链
下载PDF
多模态情感视角:民航旅客异常行为预警研究
17
作者 付永华 司俊勇 《郑州航空工业管理学院学报》 2024年第3期39-46,共8页
通过构建基于多模态情感计算的民航旅客异常行为预警模型,使用GEMEP语料库中音视频数据模拟旅客可能出现的异常行为,在对面部表情、肢体姿态和语音三模态数据识别后,采取赋予各模态情感识别模型权重和赋予各模态情感识别模型中不同情感... 通过构建基于多模态情感计算的民航旅客异常行为预警模型,使用GEMEP语料库中音视频数据模拟旅客可能出现的异常行为,在对面部表情、肢体姿态和语音三模态数据识别后,采取赋予各模态情感识别模型权重和赋予各模态情感识别模型中不同情感权重两种决策级融合方法,感知旅客生气、厌恶、焦虑、害怕、悲伤等5类情感,并依据判定结果实现异常行为分级预警。研究发现,赋予各模态情感识别模型中不同情感权重的方法为最优情感计算模型,能够有效识别旅客存在潜在异常行为的相关情感,其整体识别准确率达到了82.76%。其中,生气、厌恶、焦虑、害怕、悲伤5类情感识别准确率分别为81.9%、78.5%、81.3%、83.2%、81.7%。 展开更多
关键词 多模态数据 情感计算 航空安全 民航安检 异常行为预警
下载PDF
父母养育心理灵活性与幼儿问题行为的关系--基于心理安全感和教养效能感的链式中介作用
18
作者 余璐 郑沄 雷静 《河南科技学院学报(社会科学版)》 2024年第6期76-84,共9页
为了探究父母养育心理灵活性与幼儿问题行为的关系,以及幼儿心理安全感和父母教养效能感在其中的作用,采用父母养育心理灵活性量表、学前儿童困难与长处问卷、幼儿心理安全感量表和幼儿父母教养效能感量表对重庆市355名幼儿进行问卷调... 为了探究父母养育心理灵活性与幼儿问题行为的关系,以及幼儿心理安全感和父母教养效能感在其中的作用,采用父母养育心理灵活性量表、学前儿童困难与长处问卷、幼儿心理安全感量表和幼儿父母教养效能感量表对重庆市355名幼儿进行问卷调查。结果显示,幼儿问题行为在父母学历和家庭结构中差异显著,幼儿心理安全感在家庭结构中差异显著和父母教养效能感在填表人上差异显著;父母养育心理灵活性、幼儿问题行为、幼儿心理安全感和父母教养效能感两两显著相关;父母养育心理灵活性能显著负向预测幼儿问题行为;幼儿心理安全感、父母教养效能感在父母养育心理灵活性对幼儿问题行为的影响中起链式中介作用。具体而言,父母养育心理灵活性通过三条路径影响幼儿问题行为、幼儿心理安全感和父母教养效能感:幼儿心理安全感的中介作用、父母教养效能感的中介作用以及两者的链式中介作用。因此,提高父母养育心理灵活性、激发父母教养效能感和重视幼儿心理安全感发展可以减少幼儿问题行为的产生。 展开更多
关键词 父母养育心理灵活性 幼儿问题行为 心理安全感 父母教养效能感
下载PDF
“土地换社保”能改变老年人的传统养老观念和养老行为吗?——来自征地养老保险政策实验的证据
19
作者 李琴 罗序亮 张同龙 《南开经济研究》 CSSCI 北大核心 2024年第1期184-204,共21页
“养儿防老”和“土地是命根子”塑造了中国农村社会千百年来不变的传统观念和养老模式,也构成了现代化转型的瓶颈。着眼于破解后者的“土地换社保”政策能否“一石两鸟”,既冲击“养儿防老”的传统观念,又能改变养老行为呢?本文从征地... “养儿防老”和“土地是命根子”塑造了中国农村社会千百年来不变的传统观念和养老模式,也构成了现代化转型的瓶颈。着眼于破解后者的“土地换社保”政策能否“一石两鸟”,既冲击“养儿防老”的传统观念,又能改变养老行为呢?本文从征地养老保险的政策实验安排出发,使用2011—2018年CHARLS数据,考察征地养老保险对传统养老观念和养老行为的影响。研究结果表明,征地养老保险使得农村老年人“养儿防老”的概率显著降低28.7%,减少了来自子女的代际经济支持,增加了对子女的经济支持力度,促进了社交活动参与,而对居住方式、劳动参与和孙子女照料没有显著影响。而一次性征地货币补偿等替代方案均不具备类似功能。本文还进行了异质性分析和稳健性检验,发现征地养老保险对老年人养老观念和养老行为的影响在高水平的征地养老保险地区和三个以上子女的家庭的影响更大。本文的结果表明,提供高水平稳定收入流的征地养老保险不但能弥补征地对农民造成的损失,还能改变农村传统养老观念和养老行为。 展开更多
关键词 征地养老保险 传统养老观念 养老行为 土地换社保
下载PDF
基于行为心理调查的大学校园景观问题研究 被引量:2
20
作者 吴雨阳 郭杨纯子 +1 位作者 赵杰 钟琦 《山西建筑》 2024年第5期25-28,共4页
疗愈性的景观空间可以有效疏解精神压力,当今校园景观存在一系列问题,无法满足学生心理健康需求,通过收集大学生对于校园景观评价和行为心理的相关数据,并以华东理工大学校园环境为例进行景观分析,解决当前大学生景观心理健康需求欠缺... 疗愈性的景观空间可以有效疏解精神压力,当今校园景观存在一系列问题,无法满足学生心理健康需求,通过收集大学生对于校园景观评价和行为心理的相关数据,并以华东理工大学校园环境为例进行景观分析,解决当前大学生景观心理健康需求欠缺的问题,达到营造符合当今大学校园景观设计理念的安全健康校园景观环境的效果。 展开更多
关键词 校园景观 行为心理 安全 健康
下载PDF
上一页 1 2 45 下一页 到第
使用帮助 返回顶部