Emotional Control of Wideband Mobile Communication

Author(s):  
Vadim L. Stefanuk ◽  
Ludmila V. Savinitch
Crisis ◽  
2020 ◽  
pp. 1-7
Author(s):  
Laura R. Umphrey ◽  
John C. Sherblom ◽  
Paulina Swiatkowski

Abstract. Background: Cultivating positive feelings of self in relationships with others can affect perceptions of belongingness and burdensomeness. Aims: The present study examines the relationships of self-compassion, hope, and emotional control to thwarted belongingness, perceived burdensomeness, and suicidal ideation. Method: Participants were 481 college students who completed scales measuring self-compassion, hope, emotional control, thwarted belongingness, perceived burdensomeness, and suicidal ideation. Results: Correlation and parallel mediation analysis results show relationships between self-compassion, hope, and emotional control with perceived burdensomeness, thwarted belongingness, and suicidal ideation. Limitations: The study is limited by its cross-sectional design, sample demographics, and inability to distinguish between individuals with suicidal ideation and those who attempt suicide. Conclusion: The results show that the relationships of self-compassion, hope, and emotional control to perceived burdensomeness, thwarted belongingness, and suicidal ideation are worth further investigation.


PsycCRITIQUES ◽  
2009 ◽  
Vol 54 (19) ◽  
Author(s):  
Stuart Fischoff

Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


Sign in / Sign up

Export Citation Format

Share Document