Güvensiz Bağlanma İle Psikolojik Flört Şiddeti Uygulama Arasındaki İlişki İlişki Doyumunun Aracı Rolü

2016-09-04
Toplu Demirtaş, Ezgi
Sümer, Zeynep

Suggestions

Güvenli Yaşamak Afetlerden Korunmayı Öğreniyoruz Aile Afete Hazırlık El Kitabı
Başbuğ Erkan, Berna Burçak; Karancı, Ayşe Nuray (ODTÜ, Afet Yönetim Uygulama ve Araştırma Merkezi, 2013-01-01)
The Effect of intranasal oxytocin on pupil dilation during trustworthiness evaluation and facial expression recognition tasks
Saraçaydın, Fatma Gülhan; Gökçay, Didem; Department of Cognitive Sciences (2015)
Our ability to recognize facial expressions and emotions can be modulated by both external and internal factors. One of these internal factors is the neuropeptide “oxytocin”. Many studies have highlighted the involvement of oxytocin in recognition of facial expressions and approach-related trusting behaviors. In the current study, we investigated the effects of oxytocin on recognition accuracy and trustworthiness judgements using facial expressions. We used a subset of expressions and images from the Karoli...
The Role of expertise on code review for security: an eye tracking study
Kaplan, Utku; Acartürk, Cengiz; Department of Cyber Security (2019)
To improve the quality of the software and find security vulnerabilities, code review is usually performed during software development activities. The experience of software developers reviewing the code may affect the quality of the code review. This study investigates whether differences between novices and experts in the detection of vulnerabilities in the code can be identified by eye tracking. Participants’ eye movements were recorded by an eye tracker while they investigated program codes for security...
Multi-camera video surveillance : detection, occlusion handling, tracking and event recognition
Akman, Oytun; Alatan, Abdullah Aydın; Department of Electrical and Electronics Engineering (2007)
In this thesis, novel methods for background modeling, tracking, occlusion handling and event recognition via multi-camera configurations are presented. As the initial step, building blocks of typical single camera surveillance systems that are moving object detection, tracking and event recognition, are discussed and various widely accepted methods for these building blocks are tested to asses on their performance. Next, for the multi-camera surveillance systems, background modeling, occlusion handling, tr...
Secure exploration :conceptualization, types, and relationship with secure attachment, self-construals and other self-related variables
İmamoğlu, Selen; İmamoğlu, Emine Olcay; Department of Psychology (2005)
The aim of the present study was to enhance understanding of secure exploration within the perspective of attachment theory and Imamoglu's (2003) Balanced Integration-Differentiation (BID) model. A two-dimensional model of exploration was proposed consisting of trust for self and approaching the unknown, and scales were developed to study exploration separately from attachment both as a general and a domain-specific (i.e., cognitive, relational, self-related, spatial, and time-related) orientation. A questi...
Citation Formats
E. Toplu Demirtaş and Z. Sümer, “Güvensiz Bağlanma İle Psikolojik Flört Şiddeti Uygulama Arasındaki İlişki İlişki Doyumunun Aracı Rolü,” 2016, Accessed: 00, 2021. [Online]. Available: www.psikoloji2016.org.