Results 101 to 110 of about 2,203,161 (323)

Can Interpersonal Trust Predict and Account for Symptom Change During Group Cognitive Processing Therapy for PTSD? An Investigation of the Iterated Trust Game

open access: yesJournal of Clinical Psychology, EarlyView.
ABSTRACT Objective Group cognitive processing therapy (GCPT) is frequently utilized to treat PTSD within the VA healthcare system, but its mechanisms are not well understood. Interpersonal trust could be an important change process in GCPT given its relevance to group‐based therapy and its role in CPT, but self‐report measures are inadequate for ...
M. Wright Williams   +7 more
wiley   +1 more source

Structure and satisfaction: Social support networks among older grandparents raising adolescent grandchildren

open access: yesJournal of Elder Policy, EarlyView.
Abstract Older custodial grandparents raising adolescent grandchildren are often underprepared to parent adolescent grandchildren with complex biological, psychological, and social needs. Greater understanding of social support networks may contribute to enhancing the well‐being and longevity of these caregivers.
Tina Peterson
wiley   +1 more source

New Estimates of Federal Government Tangible Capital and Net Investment [PDF]

open access: yes
Government capital formation raises a number of issues important to national economic well-being, yet the U.S., unlike most advanced countries, does not account for capital in its formal budget documents.
John M. Roberts   +2 more
core  

You, Me, and the AI: The Role of Third‐Party Human Teammates for Trust Formation Toward AI Teammates

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT As artificial intelligence (AI) becomes increasingly integrated in teams, understanding the factors that drive trust formation between human and AI teammates becomes crucial. Yet, the emergent literature has overlooked the impact of third parties on human‐AI teaming.
Türkü Erengin   +2 more
wiley   +1 more source

Cyber Technology and Arms Race

open access: yes, 2017
Cyber technology represents digital military capability with the purpose of causing damage to the military strength and the social infrastructure of a potential enemy.
Kanniainen, Vesa
core  

Labor Rights in the Generalized System of Preferences: A 20-Year Review [PDF]

open access: yes, 2001
[Excerpt]In the fall of 1982, a small group of labor, religious, and human rights activists began charting a new course for human rights and workers\u27 rights in American trade policy. The principles of these labor rights advocates were straightforward:
Compa, Lance A, Vogt, Jeffrey S
core   +1 more source

Mountainous vegetation succession and land use during the last millennium in the Peloponnese (southern Greece): Environmental change and economic development in an isolated periphery

open access: yesJournal of Quaternary Science, EarlyView.
ABSTRACT Mediterranean mountainous areas and their valuable natural resources have long been attractive to human societies. The Peloponnese (southern Greece), with its complex topographic and climatic variability, has been the scenery for the development of numerous human communities.
Katerina Kouli   +11 more
wiley   +1 more source

The Palestinian Conflict and the Further IT Use From the Greek and Turkish Hotels

open access: yesStrategic Change, EarlyView.
ABSTRACT The current conflict in Palestine substantially affects tourism and hotel operations in the Eastern Mediterranean. The study examines the Palestinian conflict's effect on the hotel industry's willingness to further use information technology (IT) as a means for handling the crisis.
Serkan Uzunogullari   +2 more
wiley   +1 more source

Federal Employees’ Retirement System: The Role of the Thrift Savings Plan [PDF]

open access: yes, 2015
[Excerpt] Federal employees participate in one of two retirement systems. The Civil Service Retirement System (CSRS) was established in 1920 and covers only employees hired before 1984.
Isaacs, Katelin P
core   +2 more sources

Home - About - Disclaimer - Privacy