Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 10,700

Optimized short-forms of the Cognitive Distortions Questionnaire

https://scholarshare.temple.edu/server/api/core/bitstreams/b8c68eb7-7227-412d-9637-3af5c6f17386/content

1. Introduction Cognitive distortions are erroneous, irrational, or exaggerated ways of thinking that are thought to play a key role in the development and persistence of many mental disorders. In Beck’s (1976) cognitive theory of depression, which informs modern cognitive behavioral therapy (CBT), cognitive distortions are seen as stemming from rigidly-held beliefs about the self, world ...

Firewalls, IDS and IPS - Temple University

https://community.mis.temple.edu/mis5214sec702spring2021/files/2021/02/06_S21_MIS5214_Unit6_Firewalls-IDS-IPS.pdf

You may use app.diagrams.net, Visio, or Cyber Security Evaluation Tool (available here: CSET) CSET’s Diagram Tool, to draw the logical network diagram of the information system infrastructure Use appropriate network symbols and annotation in your architectural diagram, include:

EXPERT OR LAY OPINION – WHERE IS THE LINE?

https://law.temple.edu/aer/2019/06/19/expert-or-lay-opinion-where-is-the-line/

“The DNA profile from the crime scene shares the same alleles as the DNA from the accused.” That is a statement of fact or an expert opinion, but whatever it is it is not lay opinion. “I ride bicycles a lot. When the brake pads start to wear down, it’s riskier to ride in the rain.” Now, what is that? Expert or lay opinion? And why do we care? Because to proffer expert opinion ...

Internal Control Using COBIT 5 - Temple University

https://community.mis.temple.edu/mis5202online2016/files/2016/03/Internal-Control-Using-COBIT-5_whp_eng_0316.pdf

Internal Control in COBIT In COBIT® terms, a control can be any enabler that supports the achievement of one or more objectives (control objectives). These objectives are the desired result or purpose from the implementation of a relevant process, practice, principle, tool, organizational unit, symbol or other capability. A control practice is a key mechanism that supports the achievement of ...

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...

Microsoft Word - Article B Bricker.doc

https://sites.temple.edu/ticlj/files/2017/02/27.1.Bricker-TICLJ.pdf

Long ago, American legislatures and courts rejected such a defense for various reasons that make sense under both a utilitarian and retributivist model of punishment.2 Prior to developments in modern medicine, many injuries that are treatable today led to death3 and were treated as murder under different theories such as depraved heart murder. Further, based on the immutable facts in the above ...

Mutual Risk Sharing and Fintech: The Case of Xiang Hu Bao

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf

The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...

How Online Communication Platforms Facilitated Human ... - Sites

https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/

By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...