Help


[permalink] [id link]
+
Page "Cognitive behavioral therapy" ¶ 22
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

two-factor and model
At lower levels of Maslow's hierarchy of needs, such as physiological needs, money is a motivator, however it tends to have a motivating effect on staff that lasts only for a short period ( in accordance with Herzberg's two-factor model of motivation ).
However, Herzberg added a new dimension to this theory by proposing a two-factor model of motivation, based on the notion that the presence of one set of job characteristics or incentives lead to worker satisfaction at work, while another and separate set of job characteristics lead to dissatisfaction at work.
The two-factor Hull – White model contains an additional disturbance term whose mean reverts to zero, and is of the form:

two-factor and is
When elements representing two factors are required for identification, the term two-factor authentication is applied — e. g. a bankcard ( something the user has ) and a PIN ( something the user knows ).
Access to a very-high-security system might require a mantrap screening of height, weight, facial, and fingerprint checks ( several inherence factor elements ) plus a PIN and a day code ( knowledge factor elements ), but this is still a two-factor authentication.
Frederick Herzberg's two-factor theory, a. k. a. intrinsic / extrinsic motivation, concludes that certain factors in the workplace result in job satisfaction, but if absent, they don't lead to dissatisfaction but no satisfaction. The factors that motivate people can change over their lifetime, but " respect for me as a person " is one of the top motivating factors at any stage of life.
After two-factor authentication involving a PIN and One-Time-Password, the consumer's mobile account is charged for the purchase.
SecurID, now known as RSA SecurID, is a mechanism developed by Security Dynamics ( later RSA Security and now RSA, The Security Division of EMC ) for performing two-factor authentication for a user to a network resource.
A simple setting in which interactions can arise is a two-factor experiment analyzed using Analysis of Variance ( ANOVA ).
The mere-exposure effect has been explained by a two-factor theory that posits that repeated exposure of a stimulus increases perceptual fluency which is the ease with which a stimulus can be processed.
With two-factor authentication, something the user ' has ' is also used ( e. g. a security token or ' dongle ', an ATM card, or a mobile phone ); and with three-factor authentication, something the user ' is ' is also used ( e. g. a fingerprint or retinal scan ).
Critics of Herzberg's theory argue that the two-factor result is observed because it is natural for people to take credit for satisfaction and to blame dissatisfaction on external factors.
An alternative option available to users interested in using Steam Guard is two-factor, risk-based authentication, through the use of a one-time verification code sent to a verified email address associated with the Steam account.
Soliciting multiple answers to challenge questions may be considered strong authentication but, unless the process also retrieves " something the user has " or " something the user is ", it would not be considered two-factor authentication.
As a result of challenges with integration and user acceptance, true two-factor authentication is not yet widespread, although it can be found in certain sectors requiring additional security ( e. g. banking, military ).
Often, strong authentication is associated with two-factor authentication or more generally multi-factor authentication.
Schachter & Singer ( 1962 ) The two-factor theory of emotion, or Schachter – Singer theory, states that emotion is a function of both cognitive factors and physiological arousal.
Most of the published literature uses a simplified two-factor definition ; i. e., dermatillomania is 1 ) repetitive picking at the skin that 2 ) results in significant distress or social or occupational impairment.
The CAC is designed to provide two-factor authentication: what you have ( the physical card ) and what you know ( the PIN ).

two-factor and often
More often than not, one-time passwords are an embodiment of two-factor authentication ( T-FA ).
In addition to deployment costs, two-factor authentication often carries significant additional support costs.

two-factor and .
uses two-way ( two-factor ) analysis.
Inglehart's two-factor solution took the form of Ferguson's original Religionism and Humanitarianism dimensions ; Inglehart labelled them " secularism – traditionalism ", which covered issues of tradition and religion, like patriotism, abortion, euthanasia and the importance of obeying the law and authority figures, and " survivalism – self expression ", which measured issues like everyday conduct and dress, acceptance of diversity ( including foreigners ) and innovation, and attitudes towards people with specific controversial lifestyles such as homosexuality and vegetarianism, as well as willingness to partake in political activism.
To prevent this, two-factor authentication can be used.
User-created remote access VPNs may use passwords, biometrics, two-factor authentication or other cryptographic methods.
This two-factor approach, as some have also called it, provides a balanced definition that seems to be capable of dealing with limits of defining self-esteem primarily in terms of competence or worth alone.
The content theory includes the hierarchy of needs from Abraham Maslow and the two-factor theory from Herzberg.
It uses time and / or challenge based two-factor authentication and can be used to sign electronic transactions.
To this end, a 1957 study compared the relative effectiveness of three different psychotherapies in treating alcoholics who had been committed to a state hospital for sixty days: a therapy based on two-factor learning theory, client-centered therapy, and psychoanalytic therapy.
Though the authors expected the two-factor theory to be the most effective, it actually proved to be deleterious in outcome.
It has been argued, however, these findings may be attributable to the profound difference in therapist outlook between the two-factor and client-centered approaches, rather than to client-centered techniques per se.
The authors note two-factor theory involves stark disapproval of the clients ’ “ irrational behavior ” ( p. 350 ); this notably negative outlook could explain the results.

model and is
The Glazer-Fine Arts edition ( Concert-Disc ) is a model of lucidity and organization.
The interlocking frame we built at the model railroader workshop and then installed on Paul Larson's railroad follows the Fig. 1 scheme and is shown beginning in Fig. 7, page 65, and in the photos.
Stock design is excellent, and this model is a good first gun.
Another boy's model is the
Either model is a very good dollar value.
The drill press should be leveled and, depending on whether it is a bench or floor model, bolted securely to a sturdy bench or stand or screwed to the floor with lag or expansion screws.
We devote a chapter to the binomial distribution not only because it is a mathematical model for an enormous variety of real life phenomena, but also because it has important properties that recur in many other probability models.
that is, we may discuss the phenomenon in terms of its departures from the binomial model.
While some regression is inevitable, it is discouraged rather than encouraged so that the transference does not follow the stages of planned regression associated with certain casework adaptations of the psychoanalytic model for insight therapy.
While there may be several such industries to which the model of this paper is applicable, the authors make particular claim of relevance to the explanation of the course of wages and prices in the steel industry of the United States since World War 2.
The model of this paper considers an industry which is not characterized by vigorous price competition, but which is so basic that its wage-price policies are held in check by continuous critical public scrutiny.
For expository purposes, this is best treated as a model which spells out the conditions under which an important industry affected with the public interest would find it profitable to raise wages even in the absence of union pressures for higher wages.
The industry with which this model is concerned is a basic industry, producing a substantial share of gross national product.
The industry of this model is so important that its wage and price policies are affected with a public interest.
In this model, then, the industry is presumed to realize that they could successfully resist a change in the basic wage rate, but since such a change is the only effective means to raising prices they may, in circumstances to be spelled out in Part 2, below, find it to their advantage to allow the wage rise.
From this presumption it is an easy step to the conclusion that any observed increases in the basic wage rate must be due to union behavior different and more aggressive than assumed in our model.
Eichmann himself is a model of how the myth of the enemy-Jew can be used to transform the ordinary man of present-day society into a menace to all his neighbors.
New York State has what is probably the most advanced of these co-operative systems, so well developed that it has become a model for others to follow.
# As exploratory data analysis, an ANOVA is an organization of an additive data decomposition, and its sums of squares indicate the variance of each component of the decomposition ( or, equivalently, each set of terms of a linear model ).
# Closely related to the ANOVA is a linear model fit with coefficient estimates and standard errors.

0.669 seconds.