scholarly journals Counter-Argument Self-Efficacy Predicts Choice of Belief-Defense Strategies

2019 ◽  
Author(s):  
Matthew Goldberg ◽  
Cheryl L Carmichael ◽  
Curtis D. Hardin

Research has identified many strategies people use to defend against belief-inconsistent information. However, little research has identified factors that predict which defense strategy people will use when more than one is available. Two experiments tested whether people choose to counter-argue belief-inconsistent information because they believe arguing will be successful, but resort to weaker defense strategies because they believe arguing will be unsuccessful. Exposure to strong versus weak belief-inconsistent information caused a decrease in counter- arguing and an increase in ignoring (Experiment 1) or claiming a belief to be a matter of opinion (untestable) rather than a matter of fact (testable; Experiment 2). Consistent with self-efficacy theory, expectations of successful counter-arguing was the mechanism responsible for both effects. When people feel less capable of successfully counter-arguing because the information is too difficult to refute, they resort to epistemically weaker defense strategies in order to preserve their belief.

2019 ◽  
Vol 50 (2) ◽  
pp. 438-447 ◽  
Author(s):  
Matthew H. Goldberg ◽  
Cheryl L. Carmichael ◽  
Curtis D. Hardin

2020 ◽  
Vol 28 (4) ◽  
pp. 608-635
Author(s):  
Shagini Udayar ◽  
Nimrod Levin ◽  
Yuliya Lipshits-Braziler ◽  
Shékina Rochat ◽  
Annamaria Di Fabio ◽  
...  

This meta-analysis examined the association between two types of difficulties in career decision making—indecision and indecisiveness—and four types of self-evaluations: generalized self-efficacy, process-related self-efficacy, content-related self-efficacy, and self-esteem. Analyses were conducted on data from 86 studies ( N = 54,160): Process-related self-efficacy showed stronger negative associations with career indecision than did generalized self-efficacy, content-related self-efficacy, or self-esteem. In contrast, self-esteem showed stronger negative associations with indecisiveness than with career indecision. The second part of this meta-analysis focused on differential associations between two types of self-evaluations (process-related self-efficacy and self-esteem) and the three major clusters of difficulties in career decision making (lack of readiness, lack of information, and inconsistent information). Based on 19 studies ( N = 7,953), the findings showed that process-related self-efficacy was strongly and negatively associated with lack of information and inconsistent information. In contrast, self-esteem was only weakly related to the three major clusters of difficulties in career decision making. In showing that each type of self-evaluation was more strongly associated with certain types and causes of difficulties in career decision making, the present article highlighted the importance of self-evaluations in the career decision-making process.


2019 ◽  
Vol 11 (1) ◽  
pp. 149
Author(s):  
Indra Pandapotan ◽  
Subhilhar Subhilhar ◽  
Heri Kusmanto

As a country whose waters are wider than the land, Indonesia must deal with threats that occur in Indonesian waters. In 2009, the Indonesian EEZ in the Natuna Islands was unilaterally claimed by the Chinese government on a map containing nine imaginary lines. The focus of this research is the analysis of threats that occur in the Natuna Islands and the Indonesian government's strategies in maintaining the sovereignty of the Natuna Islands. This type of research is descriptive-analytical, that trying to describe various situations, conditions that exist in society that are the object of research. In this study also uses theories and concepts that can be used as a guide in conducting research. These theories are Morgenthau's National Interest Theory, Soft Power Theory put forward by Nye, and the Concept of Defense and Security. The results of this study are that in maintaining the sovereignty of the Natuna Islands, the Indonesian government applies two strategies, namely diplomatic and defense strategies. Among these two strategies, a strategy that is quite successful in maintaining the sovereignty of the Natuna Islands is a defense strategy.


2020 ◽  
Vol 76 ◽  
pp. 69-91
Author(s):  
Andrzej Dawidczyk

The overall objective of undertaken research is to present national reflection on defense in Poland, in particular an image of the defense planning culture. The article focuses on issues of defense strategy planning as a part of the complete state defensive strategy and indicates the necessary directions for changes in the essence of defense planning in the light of changes in the security and defense environment of Poland in the 21st century. In the study use has been made of an analysis and a critical review of normative documents, strategies and doctrines. The collected data allow the indication of changes of an application nature (projection method) to the theory of strategic planning in the field of national defense. This allowed proving that the future desired position of Poland in regional and even continental Europe depends on the anticipated direction of development of Polish defense potential, defense system, and of course, a clearly expressed strategy. The most important element of the three listed ones is naturally the strategy, the preparation of which requires regular cycles of strategic reviews, which are unfortunately not feasible in Poland. The article also emphasizes the importance of assuring the stability of the planning system, the basic element of which are experts, and whose regular fluctuation as a result of constant political changes causes a considerable destabilization of the planning system. Finally, attention is drawn to the fact that the defense strategy must take into account the complexity and unpredictability of the security environment – which are its basic features today.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Frank Yeong-Sung Lin ◽  
Yu-Shun Wang ◽  
Ming-Yang Huang

Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Endah Palupi ◽  
◽  
Suhirwan Suhirwan ◽  
Deni DAR ◽  
Edi Suhardono ◽  
...  

One of the sea defense strategies in the scope of deterrence is by presenting the Indonesian Navy force in the sea. This demands the readiness of the Indonesian Naval Vessel includes the platform material readiness and its personnel. The Indonesian Naval Vessel unit is generally different from the land unit makes it difficult the crew and need the health manipulation to avoid health problems or diseases that can interfere with their performance. Research errors regarding the implementation of the Indonesian Naval Vessel crew/soldier medical checks at the 1st Fleet Command Health office for readiness in order to support the defense task, the factors that influence and what is the effort supposed to do. The aim of the study was to analyze the implementation of the Indonesian Naval Vessel crew checks at the 1st Fleet Command Health Office what factors influenced and the best strategies implemented to obtain optimal results of the implementation of the Indonesian Naval Vessel crew soldier medical checks. This study uses a qualitative method. The analysis uses the theory of policy implementation from George Edward III. Data were obtained from informants related to the implementation of medical checks for Indonesian Naval Vessel crew in 1st Fleet Command which were then analyzed using qualitative. The results showed that the implementation of medical checks for Indonesian Naval Vessel crew was not optimal. Efforts are being made to coordinate at the planning stage, it is necessary to make a policy that requires Indonesian Naval Vessel crew to carry out medical checks without exception and provide Covid-19 vaccinations. So that soldiers can serve optimally.


2020 ◽  
Vol 3 (14) ◽  
pp. 162-172
Author(s):  
Nur Azreen Md Sanusi ◽  
Zanariah Ismail

The purpose of this study is to determine the relationship between negative career thoughts and self-efficacy with career decision-making difficulties among first-year undergraduate students of UPM. The sample for this study consisted of 368 first-year undergraduate students of UPM and participants were recruited using stratified random sampling. A self-administered questionnaire was used to collect information. Career Thoughts Inventory was utilized in this study to measure negative career thoughts. General Self-efficacy Scale was utilized to measure self-efficacy. Other than that, the Career Decision-Making Difficulties Questionnaire was utilized to measure career decision-making difficulties. The results revealed that most of the respondents had a high level of self-efficacy (62.2%). Pearson correlation analysis demonstrated that there was a positive significant relationship between negative career thoughts (decision-making confusion) and career decision-making difficulties (lack of information; r = 0.595, p < 0.01 and inconsistent information; r = 0.579, p < 0.01). Besides, there was also a significant positive relationship between negative career thoughts (commitment anxiety) and career decision-making difficulties (lack of information; r = 0.588, p < 0.01 and inconsistent information; r = 0.572, p < 0.01). In addition, there was a significant negative relationship between self-efficacy and career decision-making difficulties (lack of information; r = -0.388, p < 0.01, inconsistent information; r = -0.298, p < 0.01). Therefore, the findings of this study concluded that negative career thoughts and self-efficacy are important to understand the patterns of difficulties in career decision-making among first-year undergraduate students of UPM. Furthermore, further research could be expanded in different academic institutions in another region with a bigger sample to promote a better generalization of findings and yield more reliable data.


2020 ◽  
Vol 10 (2) ◽  
pp. 672
Author(s):  
Xin-Rui Liu ◽  
Hao Wang ◽  
Qiu-Ye Sun ◽  
Peng Jin

With the continuous development of the active distribution network (ADN), the problem of security and stability has become increasingly prominent. From the perspective of improving the defense capability of ADN, a new a multi-angle dynamic risk assessment index system based on the comprehensive vulnerability rate model is proposed in this paper. Risk threshold is used to monitor the status of the distribution network, which determine whether ADN needs to enter the active defense period. The minimum amount of load shedding outside the fault isolation region is regarded as the objective function, considering other constraints such as limited resources, the coordinated active defense strategy (CADS) is formed in this paper. Finally, the accuracy of the comprehensive vulnerability rate and the risk assessment value are verified by example analysis, and the superiority of the CADS is verified by comparing different defense strategies.


2021 ◽  
Vol 7 (1) ◽  
pp. 89
Author(s):  
Angkasa Dipua ◽  
Lukman Yudho Prakoso ◽  
Dikry Rizanny Nurdiansyah

<p>Several countries have implemented the diplomacy model using second-track diplomacy in solving various problems. With the dynamics of global, regional, and national strategic environmental conditions, the second track diplomacy model is a step that is considered to be effective and efficient in finding solutions to every problem between countries. The Indonesian Navy, which, according to Kent Booth, has one of its functions in carrying out diplomacy, has carried out several diplomatic steps. As an archipelago that has land and sea borders with ten neighboring countries, prioritizing this second track diplomacy model is necessary. The purpose of this study is to find a marine defense strategy in dealing with the potential impacts of the conflict that occurred in the South China Sea. Considering the vast territory of Indonesia's territorial sea, a method of sea defense strategies can apply this diplomacy model. This study uses a literature study by gathering various information from various sources, then the theory used in conducting discussions and analysis with the theory of Barry Buzan. This study concludes an input and recommendations for policymakers to prioritize second-track diplomacy in solving various existing problems, especially in Indonesia's sea border region with neighboring countries.</p>


2019 ◽  
Vol 2019 ◽  
pp. 1-14
Author(s):  
Xiaohu Liu ◽  
Hengwei Zhang ◽  
Yuchen Zhang ◽  
Lulu Shao ◽  
Jihong Han

Most network security research studies based on signaling games assume that either the attacker or the defender is the sender of the signal and the other party is the receiver of the signal. The attack and defense process is commonly modeled and analyzed from the perspective of one-way signal transmission. Aiming at the reality of two-way signal transmission in network attack and defense confrontation, we propose a method of active defense strategy selection based on a two-way signaling game. In this paper, a two-way signaling game model is constructed to analyze the network attack and defense processes. Based on the solution of a perfect Bayesian equilibrium, a defense strategy selection algorithm is presented. The feasibility and effectiveness of the method are verified using examples from real-world applications. In addition, the mechanism of the deception signal is analyzed, and conclusions for guiding the selection of active defense strategies are provided.


Sign in / Sign up

Export Citation Format

Share Document