WorldWideScience

Sample records for maximize returns victimizing

  1. Maximizing ROI (return on information)

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, B.

    2000-05-01

    The role and importance of managing information are discussed, underscoring the importance by quoting from the report of the International Data Corporation, according to which Fortune 500 companies lost $ 12 billion in 1999 due to inefficiencies resulting from intellectual re-work, substandard performance , and inability to find knowledge resources. The report predicts that this figure will rise to $ 31.5 billion by 2003. Key impediments to implementing knowledge management systems are identified as : the cost and human resources requirement of deployment; inflexibility of historical systems to adapt to change; and the difficulty of achieving corporate acceptance of inflexible software products that require changes in 'normal' ways of doing business. The author recommends the use of model, document and rule-independent systems with a document centered interface (DCI), employing rapid application development (RAD) and object technologies and visual model development, which eliminate these problems, making it possible for companies to maximize their return on information (ROI), and achieve substantial savings in implementation costs.

  2. Maximizing your return on people.

    Science.gov (United States)

    Bassi, Laurie; McMurrer, Daniel

    2007-03-01

    Though most traditional HR performance metrics don't predict organizational performance, alternatives simply have not existed--until now. During the past ten years, researchers Laurie Bassi and Daniel McMurrer have worked to develop a system that allows executives to assess human capital management (HCM) and to use those metrics both to predict organizational performance and to guide organizations' investments in people. The new framework is based on a core set of HCM drivers that fall into five major categories: leadership practices, employee engagement, knowledge accessibility, workforce optimization, and organizational learning capacity. By employing rigorously designed surveys to score a company on the range of HCM practices across the five categories, it's possible to benchmark organizational HCM capabilities, identify HCM strengths and weaknesses, and link improvements or back-sliding in specific HCM practices with improvements or shortcomings in organizational performance. The process requires determining a "maturity" score for each practice, based on a scale of 1 (low) to 5 (high). Over time, evolving maturity scores from multiple surveys can reveal progress in each of the HCM practices and help a company decide where to focus improvement efforts that will have a direct impact on performance. The authors draw from their work with American Standard, South Carolina's Beaufort County School District, and a bevy of financial firms to show how improving HCM scores led to increased sales, safety, academic test scores, and stock returns. Bassi and McMurrer urge HR departments to move beyond the usual metrics and begin using HCM measurement tools to gauge how well people are managed and developed throughout the organization. In this new role, according to the authors, HR can take on strategic responsibility and ensure that superior human capital management becomes central to the organization's culture.

  3. Maximizing the return on taxpayers' investments in fundamental biomedical research.

    Science.gov (United States)

    Lorsch, Jon R

    2015-05-01

    The National Institute of General Medical Sciences (NIGMS) at the U.S. National Institutes of Health has an annual budget of more than $2.3 billion. The institute uses these funds to support fundamental biomedical research and training at universities, medical schools, and other institutions across the country. My job as director of NIGMS is to work to maximize the scientific returns on the taxpayers' investments. I describe how we are optimizing our investment strategies and funding mechanisms, and how, in the process, we hope to create a more efficient and sustainable biomedical research enterprise.

  4. Protecting biodiversity when money matters: maximizing return on investment.

    Directory of Open Access Journals (Sweden)

    Emma C Underwood

    Full Text Available BACKGROUND: Conventional wisdom identifies biodiversity hotspots as priorities for conservation investment because they capture dense concentrations of species. However, density of species does not necessarily imply conservation 'efficiency'. Here we explicitly consider conservation efficiency in terms of species protected per dollar invested. METHODOLOGY/PRINCIPAL FINDINGS: We apply a dynamic return on investment approach to a global biome and compare it with three alternate priority setting approaches and a random allocation of funding. After twenty years of acquiring habitat, the return on investment approach protects between 32% and 69% more species compared to the other priority setting approaches. To correct for potential inefficiencies of protecting the same species multiple times we account for the complementarity of species, protecting up to three times more distinct vertebrate species than alternate approaches. CONCLUSIONS/SIGNIFICANCE: Incorporating costs in a return on investment framework expands priorities to include areas not traditionally highlighted as priorities based on conventional irreplaceability and vulnerability approaches.

  5. Net returns, fiscal risks, and the optimal patient mix for a profit-maximizing hospital.

    Science.gov (United States)

    Ozatalay, S; Broyles, R

    1987-10-01

    As is well recognized, the provisions of PL98-21 not only transfer financial risks from the Medicare program to the hospital but also induce institutions to adjust the diagnostic mix of Medicare beneficiaries so as to maximize net income or minimize the net loss. This paper employs variation in the set of net returns as the sole measure of financial risk and develops a model that identifies the mix of beneficiaries that maximizes net income, subject to a given level of risk. The results indicate that the provisions of PL98-21 induce the institution to deny admission to elderly patients presenting conditions for which the net return is relatively low and the variance in the cost per case is large. Further, the paper suggests that the treatment of beneficiaries at a level commensurate with previous periods or the preferences of physicians may jeopardize the viability and solvency of Medicare-dependent hospitals.

  6. Potential benefits of maximal exercise just prior to return from weightlessness

    Science.gov (United States)

    Convertino, Victor A.

    1987-01-01

    The purpose of this study was to determine whether performance of a single maximal bout of exercise during weightlessness within hours of return to earth would enhance recovery of aerobic fitness and physical work capacities under a 1G environment. Ten healthy men were subjected to a 10-d bedrest period in the 6-deg headdown position. A graded maximal supine cycle ergometer test was performed before and at the end of bedrest to simulate exercise during weightlessness. Following 3 h of resumption of the upright posture, a second maximal exercise test was performed on a treadmill to measure work capacity under conditions of 1G. Compared to before bedrest, peak oxygen consumption, V(O2), decreased by 8.7 percent and peak heart rate (HR) increased by 5.6 percent in the supine cycle test at the end of bedrest. However, there were no significant changes in peak V(O2) and peak HR in the upright treadmill test following bedrest. These data suggest that one bout of maximal leg exercise prior to return from 10 d of weightlessness may be adequate to restore preflight aerobic fitness and physical work capacity.

  7. Return to work of road accident victims claiming compensation for personal injury.

    Science.gov (United States)

    Cornes, P

    1992-01-01

    Road accidents resulting in personal injury are an increasing cost to society. This study is based on 609 accident victims (of whom 521 survived injury) who were in employment when injured and whose claims for personal injury were settled for 5000 pounds or more by one insurance company over 2 years. It examines survivors' residual disablement, return to work and involvement with rehabilitation services. Data on a representative sample of 101 cases are analysed in more detail to identify possible 'predictors' of return to work. Both univariate and stepwise logistic regression analysis suggest that return to work is less associated with clinical variables, on which much medical advice on return to work is based, than with such other variables as time off work, absence of psychological problems and younger age. Very low rates of referral to rehabilitation may indicate that a rehabilitative approach to cost containment is underutilized in comparison with the traditional emphasis on preventive measures and enhanced medical treatment. More effective rehabilitation, however, may require new approaches to clinical case management, especially in orthopaedic departments where most personal injury claimants are treated.

  8. From Passive Victims to Partners in Their Own Reintegration: Civil society’s role in empowering returned Thai fishermen

    Directory of Open Access Journals (Sweden)

    David Rousseau

    2018-04-01

    Full Text Available Despite the significant international attention to human trafficking in the fishing industry in Southeast Asia, victims continue to experience poor outcomes after their return to Thailand. The Labour Rights Promotion Network (LPN has assisted many returned fishermen in the difficult journey that begins after their rescue and repatriation. In this paper, we argue that the poor outcomes are the product of systemic failures in the aftercare processes, which are not sufficiently victim-centred and discourage trafficked fishermen’s participation in prosecutions. This is the case in the criminal justice system, where flaws in victim identification and evidence collection can undermine trafficked persons’ rights and make it extremely difficult for them to obtain compensation—a significant factor in their recovery and reintegration. This same cycle of disenfranchisement is pervasive in reintegration services at large in Thailand, many of which are overly paternalistic and neglect survivors’ individual needs and interests. Civil society organisations can remediate these problems by supporting the government in its efforts to strengthen prosecutions and make the criminal justice system more victim-friendly. More broadly, civil society can contribute to a victim-centred approach that places aftercare in a larger perspective—one that extends beyond the purview of the criminal justice system. This paper will examine two emerging models in post-trafficking service provision: Unconditional Cash Transfers (UCTs and volunteer social networks, which recognise victim empowerment not just as a means towards better law enforcement, but as an end in itself.

  9. Perceptions of Domestic Violence: The Effects of Domestic Violence Myths, Victim's Relationship with Her Abuser, and the Decision to Return to Her Abuser

    Science.gov (United States)

    Yamawaki, Niwako; Ochoa-Shipp, Monica; Pulsipher, Craig; Harlos, Andrew; Swindler, Scott

    2012-01-01

    Researchers in this study examined the attitudes toward domestic violence, the victim, and her perpetrator. A total of 194 participants were randomly assigned to one of 4 hypothetical scenarios to evaluate how observers' perceptions were influenced by their own sex and myths about domestic violence, by the victim's decision to return to the…

  10. Factors associated with non-return to work in the severely injured victims 3 years after a road accident: A prospective study.

    Science.gov (United States)

    Pélissier, C; Fort, E; Fontana, L; Charbotel, B; Hours, M

    2017-09-01

    Road accidents may impact victims' physical and/or mental health and socio-occupational life, particularly the capacity to return to work. The purpose of our study is to assess modifiable medical and socio-occupational factors of non-return to work in the severely injured 3 years after a road accident. Among1,168 road accidents casualties in the Rhône administrative Département of France followed for five years, 141 of the 222 severely injured (Maximal Abbreviated Injury Scale ≥ 3) aged more than 16 years who were in work at the time of the accident, reported whether they had returned to work in the 3 years following the accident. The subgroups of those who had (n=113) and had not returned to work (n=28) were compared for socio-occupational (gender, age, educational level, marital status, socio-occupational group) accident-related medical factors (type of road user, type of journey, responsibility in the accident, initial care) and post-accident medical factors (pain intensity, post-traumatic stress disorder, physical sequelae, quality of life) by using standardized tools. Severity of initial head, face and lower-limb injury, intense persistent pain, post-traumatic stress disorder, poor self-assessed quality of life and health status at 3 years were associated with non-return to work on univariate analysis. On multivariate analysis, severity of initial head and lower-limb injury, intense persistent pain at 3 years and post-traumatic stress disorder were significantly associated with non-return to work 3 years following severe road-accident injury. Post-traumatic stress disorder and chronic pain were essential modifiable medical determinants of non-return to work in the severely injured after a road accident: early adapted management could promote return to work in the severely injured. Improve early adapted treatment of pain and PTSD in the rehabilitation team should help the severely injured return to work following a road accident. Copyright © 2017 Elsevier

  11. Preservation of Multiple Mammalian Tissues to Maximize Science Return from Ground Based and Spaceflight Experiments.

    Science.gov (United States)

    Choi, Sungshin; Ray, Hami E; Lai, San-Huei; Alwood, Joshua S; Globus, Ruth K

    2016-01-01

    Even with recent scientific advancements, challenges posed by limited resources and capabilities at the time of sample dissection continue to limit the collection of high quality tissues from experiments that can be conducted only infrequently and at high cost, such as in space. The resources and time it takes to harvest tissues post-euthanasia, and the methods and duration of long duration storage, potentially have negative impacts on sample quantity and quality, thereby limiting the scientific outcome that can be achieved. The goals of this study were to optimize methods for both sample recovery and science return from rodent experiments, with possible relevance to both ground based and spaceflight studies. The first objective was to determine the impacts of tissue harvest time post-euthanasia, preservation methods, and storage duration, focusing on RNA quality and enzyme activities in liver and spleen as indices of sample quality. The second objective was to develop methods that will maximize science return by dissecting multiple tissues after long duration storage in situ at -80°C. Tissues of C57Bl/6J mice were dissected and preserved at various time points post-euthanasia and stored at -80°C for up to 11 months. In some experiments, tissues were recovered from frozen carcasses which had been stored at -80°C up to 7 months. RNA quantity and quality was assessed by measuring RNA Integrity Number (RIN) values using an Agilent Bioanalyzer. Additionally, the quality of tissues was assessed by measuring activities of hepatic enzymes (catalase, glutathione reductase and GAPDH). Fresh tissues were collected up to one hour post-euthanasia, and stored up to 11 months at -80°C, with minimal adverse effects on the RNA quality of either livers or RNAlater-preserved spleens. Liver enzyme activities were similar to those of positive controls, with no significant effect observed at any time point. Tissues dissected from frozen carcasses that had been stored for up to 7

  12. Science Goal Driven Observing: A Step towards Maximizing Science Returns and Spacecraft Autonomy

    Science.gov (United States)

    Koratkar, Anuradha; Grosvenor, Sandy; Jones, Jeremy E.; Memarsadeghi, Nargess; Wolf, Karl R.

    2002-12-01

    In the coming decade, the drive to increase the scientific returns on capital investment and to reduce costs will force automation to be implemented in many of the scientific tasks that have traditionally been manually overseen. Thus, spacecraft autonomy will become an even greater part of mission operations. While recent missions have made great strides in the ability to autonomously monitor and react to changing health and physical status of spacecraft, little progress has been made in responding quickly to science driven events. The new generation of space-based telescopes/observatories will see deeper, with greater clarity, and they will generate data at an unprecedented rate. Yet, while onboard data processing and storage capability will increase rapidly, bandwidth for downloading data will not increase as fast and can become a significant bottleneck and cost of a science program. For observations of inherently variable targets and targets of opportunity, the ability to recognize early if an observation will not meet the science goals of variability or minimum brightness, and react accordingly, can have a major positive impact on the overall scientific returns of an observatory and on its operational costs. If the observatory can reprioritize the schedule to focus on alternate targets, discard uninteresting observations prior to downloading, or download them at a reduced resolution its overall efficiency will be dramatically increased. We are investigating and developing tools for a science goal monitoring (SGM) system. The SGM will have an interface to help capture higher-level science goals from scientists and translate them into a flexible observing strategy that SGM can execute and monitor. SGM will then monitor the incoming data stream and interface with data processing systems to recognize significant events. When an event occurs, the system will use the science goals given it to reprioritize observations, and react appropriately and/or communicate with

  13. Biospecimen Retrieval from NASA's Rodent Research-1: Maximizing Science Return from Flight Missions

    Science.gov (United States)

    Choi, Sungshin Y.; Chen, Yi-Chun; Reyes, America; Verma, Vandana; Dinh, Marie; Globus, Ruth K.

    2016-01-01

    Rodent Research (RR)-1 was conducted to validate flight hardware, operations, and science capabilities that were developed to support long duration missions on the International Space Station. After 37 days in microgravity twenty mice were euthanized and frozen on orbit. Upon return to Earth the carcasses were dissected and yielded 32 different types of tissues from each mouse and over 3200 tissue aliquots. Many tissues were distributed to the Space Life and Physical Sciences (SLPS) Biospecimen Sharing Program (BSP) Principal Investigators (PIs) through the Ames Life Science Data Archive (ALSDA). A second round of dissections was performed to collect additional tissues from the remaining carcasses thawed for a second time for additional BSP PIs. Tissues retrieved included vaginal walls, aorta, pelvis, brown adipose tissue, tail, spine and forearms. Although the analyses are still in progress, some of the PIs have reported that the quality of the tissues was acceptable for their study. In a separate experiment we tested the RNA quality of the tissues that were dissected from frozen carcasses that were subjected to euthanasia, freezing, first and second thaw dissections. Timelines simulated the on-orbit RR-1 procedures to assess the quality of the tissues retrieved from the second thaw dissections. We analyzed the RIN values of select tissues including kidney, brain, white adipose tissue (WAT) and brown adipose tissue (BAT). Overall the RIN values from the second thaw were lower compared to those from the first by about a half unit; however, the tissues yielded RNA that are acceptable quality for some quantitative gene expression assays. Interestingly, RIN values of brain tissues were 8.4+/-0.6 and 7.9+/-0.7 from first and second round dissections, respectively (n5). Kidney and WAT yielded RIN values less than 8 but they can still be used for qPCR. BAT yielded higher quality RNA (8.2+/-0.5) than WAT (5.2+/-20.9), possibly due to the high fat content. Together, these

  14. Maximizing Science Return from Future Rodent Experiments on the International Space Station (ISS): Tissue Preservation

    Science.gov (United States)

    Choi, S. Y.; Lai, S.; Klotz, R.; Popova, Y.; Chakravarty, K.; Beegle, J. E.; Wigley, C. L.; Globus, R. K.

    2014-01-01

    To better understand how mammals adapt to long duration habitation in space, a system for performing rodent experiments on the ISS is under development; Rodent Research-1 is the first flight and will include validation of both on-orbit animal support and tissue preservation. To evaluate plans for on-orbit sample dissection and preservation, we simulated conditions for euthanasia, tissue dissection, and prolonged sample storage on the ISS, and we also developed methods for post-flight dissection and recovery of high quality RNA from multiple tissues following prolonged storage in situ for future science. Mouse livers and spleens were harvested under conditions that simulated nominal, on-orbit euthanasia and dissection operations including storage at -80 C for 4 months. The RNA recovered was of high quality (RNA Integrity Number, RIN(is) greater than 8) and quantity, and the liver enzyme contents and activities (catalase, glutathione reductase, GAPDH) were similar to positive controls, which were collected under standard laboratory conditions. We also assessed the impact of possible delayed on-orbit dissection scenarios (off-nominal) by dissecting and preserving the spleen (RNAlater) and liver (fast-freezing) at various time points post-euthanasia (from 5 min up to 105 min). The RNA recovered was of high quality (spleen, RIN (is) greater than 8; liver, RIN (is) greater than 6) and liver enzyme activities were similar to positive controls at all time points, although an apparent decline in select enzyme activities was evident at the latest time (105 min). Additionally, various tissues were harvested from either intact or partially dissected, frozen carcasses after storage for approximately 2 months; most of the tissues (brain, heart, kidney, eye, adrenal glands and muscle) were of acceptable RNA quality for science return, whereas some tissues (small intestine, bone marrow and bones) were not. These data demonstrate: 1) The protocols developed for future flight

  15. Maximizing the science return of interplanetary missions using nuclear electric power

    International Nuclear Information System (INIS)

    Zubrin, R.M.

    1995-01-01

    The multi-kilowatt power sources on the spaecraft also enables active sensing, including radar, which could be used to do topographic and subsurface studies of clouded bodies such as Titan, ground pentrating sounding of Pluto, the major planet's moons, and planetoids, and topside sounding of the electrically conductive atmospheres of Jupiter, Saturn, Uranus and Neptune to produce profiles of fluid density, conductivity, and horizontal and vertical velocity as a function of depth and global location. Radio science investigations of planetary atmospheres and ring systems would be greatly enhanced by increased transmitter power. The scientific benefits of utilizing such techniques are discussed, and a comparison is made with the quantity and quality of science that a low-powered spacecraft employing RTGs could return. It is concluded that the non-propulsive benefits of nuclear power for spacecraft exploring the outer solar system are enormous, and taken together with the well documented mission enhancements enabled by electric propulsion fully justify the expanditures needed to bring a space qualified nuclear electric power source into being. copyright 1995 American Institute of Physics

  16. Chasing the deal with the money: Measuring the required risk premium and expected abnormal returns of private equity funds to maximize their internal rate of return

    Directory of Open Access Journals (Sweden)

    Fernando Scarpati

    2013-09-01

    Full Text Available A number of scholars of private equity (“PE” have attempted to assess the ex-post returns, or performance, of PEs by adopting an ex-post perspective of asset pricing. In doing so a set of phenomena has been recognized that is thought to be specific to the PE sector, such as “money-chasing deal phenomenon” (Gompers and Lerner, 2000 and “performance persistence” (Lerner and Schoar, 2005. However, based on their continuing use of an ex-post perspective, few scholars have paid attention to the possible extent to which these and other PE phenomena may affect expected returns from PE investments. To address this problem this article draws on an ex-ante perspective of investment decision-making in suggesting how a number of drivers and factors of PE phenomena may produce “abnormal returns”, and that each of those drivers and factors should therefore be considered in accurately assessing the required risk premium and expected abnormal returns of PE investments. In making these contributions we examined a private equity investment of a regional PE in Italy and administered a telephone questionnaire to 40 PEs in Italy and the UK and found principally that while size is the most important driver in producing abnormal returns illiquidity alone cannot explain the expected returns of PE investments (cf. Franzoni et al., 2012. Based on our findings we developed a predictive model of PE decision-making that draws on an ex-ante perspective of asset pricing and takes into account PE phenomena and abnormal returns. This model extends the work of Franzoni et al. (2012, Jegadeesh et al. (2009, and Korteweg and Sorensen (2010 who did not consider the possible influence of PE phenomena in decision-making and will also help PE managers in making better-informed decisions.

  17. Childhood Victimization and Crime Victimization

    Science.gov (United States)

    McIntyre, Jared Kean; Widom, Cathy Spatz

    2011-01-01

    The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…

  18. Understanding victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn

    2007-01-01

    This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime...

  19. Entropy maximization

    Indian Academy of Sciences (India)

    Abstract. It is shown that (i) every probability density is the unique maximizer of relative entropy in an appropriate class and (ii) in the class of all pdf f that satisfy. ∫ fhi dμ = λi for i = 1, 2,...,...k the maximizer of entropy is an f0 that is pro- portional to exp(. ∑ ci hi ) for some choice of ci . An extension of this to a continuum of.

  20. Entropy Maximization

    Indian Academy of Sciences (India)

    It is shown that (i) every probability density is the unique maximizer of relative entropy in an appropriate class and (ii) in the class of all pdf that satisfy ∫ f h i d = i for i = 1 , 2 , … , … k the maximizer of entropy is an f 0 that is proportional to exp ⁡ ( ∑ c i h i ) for some choice of c i . An extension of this to a continuum of ...

  1. Cyberstalking victimization

    Directory of Open Access Journals (Sweden)

    Vilić Vida

    2013-01-01

    Full Text Available Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.

  2. Why firms should not always maximize profits

    OpenAIRE

    Kolstad, Ivar

    2006-01-01

    Though corporate social responsibility (CSR) is on the agenda of most major corporations, corporate executives still largely support the view that corporations should maximize the returns to their owners. There are two lines of defence for this position. One is the Friedmanian view that maximizing owner returns is the corporate social responsibility of corporations. The other is a position voiced by many executives, that CSR and profits go together. This paper argues that the first position i...

  3. Profit maximization mitigates competition

    DEFF Research Database (Denmark)

    Dierker, Egbert; Grodal, Birgit

    1996-01-01

    We consider oligopolistic markets in which the notion of shareholders' utility is well-defined and compare the Bertrand-Nash equilibria in case of utility maximization with those under the usual profit maximization hypothesis. Our main result states that profit maximization leads to less price...... competition than utility maximization. Since profit maximization tends to raise prices, it may be regarded as beneficial for the owners as a whole. Moreover, if profit maximization is a good proxy for utility maximization, then there is no need for a general equilibrium analysis that takes the distribution...... of profits among consumers fully into account and partial equilibrium analysis suffices...

  4. Secondary victims of rape

    DEFF Research Database (Denmark)

    Christiansen, Dorte Mølgaard; Bak, Rikke; Elklit, Ask

    2012-01-01

    secondary victims, including family members, partners, and friends of male and female rape victims. We found that many respondents found it difficult to support the PV and that their relationship with the PV was often affected by the assault. Furthermore, the sample showed significant levels...... of social support for the respondent, and feeling let down by others. The respondents were generally interested in friend-, family-, and partner-focused interventions, particularly in receiving education about how best to support a rape victim...

  5. Victimization of Obese Adolescents

    Science.gov (United States)

    Robinson, Sabrina

    2006-01-01

    Peer victimization of obese adolescents has been associated with low self-esteem, body dissatisfaction, social isolation, marginalization, poor psychosocial adjustment, depression, eating disorders, and suicidal ideation and attempts, not to mention poor academic performance. Weight-based peer victimization is defined as unsolicited bullying and…

  6. Sudden death victims

    NARCIS (Netherlands)

    Ceelen, Manon; van der Werf, Christian; Hendrix, Anneke; Naujocks, Tatjana; Woonink, Frits; de Vries, Philip; van der Wal, Allard; Das, Kees

    2015-01-01

    The goal of this study was to ascertain accordance between cause of death established by the forensic physician and autopsy results in young sudden death victims in the Netherlands. Sudden death victims aged 1-45 years examined by forensic physicians operating in the participating regions which also

  7. Sexual Victimization of Youth

    Science.gov (United States)

    Small, Kevonne; Zweig, Janine M.

    2007-01-01

    An estimated 7.0% to 8.1% of American youth report being sexually victimized at some point in their life time. This article presents a background to youth sexual victimization, focusing on prevalence data, challenging issues when studying this problem, risk factors, and common characteristics of perpetrators. Additionally, a type of sexual…

  8. Maximally incompatible quantum observables

    Energy Technology Data Exchange (ETDEWEB)

    Heinosaari, Teiko, E-mail: teiko.heinosaari@utu.fi [Turku Centre for Quantum Physics, Department of Physics and Astronomy, University of Turku, FI-20014 Turku (Finland); Schultz, Jussi, E-mail: jussi.schultz@gmail.com [Dipartimento di Matematica, Politecnico di Milano, Piazza Leonardo da Vinci 32, I-20133 Milano (Italy); Toigo, Alessandro, E-mail: alessandro.toigo@polimi.it [Dipartimento di Matematica, Politecnico di Milano, Piazza Leonardo da Vinci 32, I-20133 Milano (Italy); Istituto Nazionale di Fisica Nucleare, Sezione di Milano, Via Celoria 16, I-20133 Milano (Italy); Ziman, Mario, E-mail: ziman@savba.sk [RCQI, Institute of Physics, Slovak Academy of Sciences, Dúbravská cesta 9, 84511 Bratislava (Slovakia); Faculty of Informatics, Masaryk University, Botanická 68a, 60200 Brno (Czech Republic)

    2014-05-01

    The existence of maximally incompatible quantum observables in the sense of a minimal joint measurability region is investigated. Employing the universal quantum cloning device it is argued that only infinite dimensional quantum systems can accommodate maximal incompatibility. It is then shown that two of the most common pairs of complementary observables (position and momentum; number and phase) are maximally incompatible.

  9. Maximally incompatible quantum observables

    International Nuclear Information System (INIS)

    Heinosaari, Teiko; Schultz, Jussi; Toigo, Alessandro; Ziman, Mario

    2014-01-01

    The existence of maximally incompatible quantum observables in the sense of a minimal joint measurability region is investigated. Employing the universal quantum cloning device it is argued that only infinite dimensional quantum systems can accommodate maximal incompatibility. It is then shown that two of the most common pairs of complementary observables (position and momentum; number and phase) are maximally incompatible.

  10. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  11. Victim-induced criminality.

    Science.gov (United States)

    Fooner, M

    1966-09-02

    In summary, there are certain issues that need to be dealt with if a coherent system of victim compensation is to be created. 1) Is the victim's entitlement to compensation qualified by his behavior in connection with the crime? If a Texas tycoon visits a clip joint, flashes a fat roll of bills, and gets hit on the head and rolled, is he entitled to compensation? If a man enters into a liaison with another's wife and gets shot by the husband, should his dependents be compensated? If a woman goes walking alone in a disreputable neighborhood and is assaulted, is she entitled to compensation? Unless the answer to such questions is a flat "yes," the adjudication of victim compensation as a "right" would be embarkation upon a vast sea of confusion. On the surface it may seem simpler to bypass the issue of "right" and declare for victim compensation as a matter of social policy-a logical extension of the welfare state approach. But the apparent simplicity may quickly prove illusory, in light of the second issue. 2) Is the victim's entitlement to compensation on the basis of indigency to be qualified by the requirement that an offender be apprehended and his guilt determined by a court? There are two levels to this problem. First, if a severely injured man reports to police that he has been mugged and robbed and if the police cannot apprehend a suspect, how is the administrator of compensation to know that the man is in fact the victim of a crime? The administrator of compensation must determine whether the episode was a criminal act or an argument-and who started it, and who precipitated the violence. What shall be the role of the witnesses, and of investigators? More important is the second level of the problem: How will law-enforcement of ficials and the courts evaluate the testimony of the victim if compensation of the victim may be at stake? In the evaluation of proposals for victim compensation, criminologists may need to think very hard about such questions and

  12. Maximizers versus satisficers

    OpenAIRE

    Andrew M. Parker; Wandi Bruine de Bruin; Baruch Fischhoff

    2007-01-01

    Our previous research suggests that people reporting a stronger desire to maximize obtain worse life outcomes (Bruine de Bruin et al., 2007). Here, we examine whether this finding may be explained by the decision-making styles of self-reported maximizers. Expanding on Schwartz et al. (2002), we find that self-reported maximizers are more likely to show problematic decision-making styles, as evidenced by self-reports of less behavioral coping, greater dependence on others when making decisions...

  13. Maximal combustion temperature estimation

    International Nuclear Information System (INIS)

    Golodova, E; Shchepakina, E

    2006-01-01

    This work is concerned with the phenomenon of delayed loss of stability and the estimation of the maximal temperature of safe combustion. Using the qualitative theory of singular perturbations and canard techniques we determine the maximal temperature on the trajectories located in the transition region between the slow combustion regime and the explosive one. This approach is used to estimate the maximal temperature of safe combustion in multi-phase combustion models

  14. Same- and Other-Sex Victimization : Are the Risk Factors Similar?

    NARCIS (Netherlands)

    Sainio, Miia; Veenstra, René; Huitsing, Gijs; Salmivalli, Christina

    2012-01-01

    Risk factors for same- and other-sex victimization were examined in a longitudinal data set involving 9- to 14-year-old students. The findings regarding same-sex victimization supported the view that bullies select personally and interpersonally vulnerable targets in order to maximize their gains in

  15. Maximally multipartite entangled states

    Science.gov (United States)

    Facchi, Paolo; Florio, Giuseppe; Parisi, Giorgio; Pascazio, Saverio

    2008-06-01

    We introduce the notion of maximally multipartite entangled states of n qubits as a generalization of the bipartite case. These pure states have a bipartite entanglement that does not depend on the bipartition and is maximal for all possible bipartitions. They are solutions of a minimization problem. Examples for small n are investigated, both analytically and numerically.

  16. Maximizers versus satisficers

    Directory of Open Access Journals (Sweden)

    Andrew M. Parker

    2007-12-01

    Full Text Available Our previous research suggests that people reporting a stronger desire to maximize obtain worse life outcomes (Bruine de Bruin et al., 2007. Here, we examine whether this finding may be explained by the decision-making styles of self-reported maximizers. Expanding on Schwartz et al. (2002, we find that self-reported maximizers are more likely to show problematic decision-making styles, as evidenced by self-reports of less behavioral coping, greater dependence on others when making decisions, more avoidance of decision making, and greater tendency to experience regret. Contrary to predictions, self-reported maximizers were more likely to report spontaneous decision making. However, the relationship between self-reported maximizing and worse life outcomes is largely unaffected by controls for measures of other decision-making styles, decision-making competence, and demographic variables.

  17. Maximizing Return From Sound Analysis and Design Practices

    International Nuclear Information System (INIS)

    Bramlette, J.D.

    2002-01-01

    With today's tightening budgets computer applications must provide ''true'' long-term benefit to the company. Businesses are spending large portions of their budgets ''Re-Engineering'' old systems to take advantage of ''new'' technology. But what they are really getting is simply a new interface implementing the same incomplete or poor defined requirements as before. ''True'' benefit can only be gained if sound analysis and design practices are used. WHAT data and processes are required of a system is not the same as HOW the system will be implemented within a company. It is the System Analyst's responsibility to understand the difference between these two concepts. The paper discusses some simple techniques to be used during the Analysis and Design phases of projects, as well as the information gathered and recorded in each phase and how it is transformed between these phases. The paper also covers production application generated using Oracle Designer. Applying these techniques to ''real world'' problems, the applications will meet the needs for today's business and adapt easily to ever-changing business environments

  18. Is CP violation maximal

    International Nuclear Information System (INIS)

    Gronau, M.

    1984-01-01

    Two ambiguities are noted in the definition of the concept of maximal CP violation. The phase convention ambiguity is overcome by introducing a CP violating phase in the quark mixing matrix U which is invariant under rephasing transformations. The second ambiguity, related to the parametrization of U, is resolved by finding a single empirically viable definition of maximal CP violation when assuming that U does not single out one generation. Considerable improvement in the calculation of nonleptonic weak amplitudes is required to test the conjecture of maximal CP violation. 21 references

  19. Adolescent sexual victimization

    DEFF Research Database (Denmark)

    Bramsen, Rikke Holm; Lasgaard, Mathias; Koss, Mary P

    2012-01-01

    at baseline and first time APSV during a 6-month period. Data analysis was a binary logistic regression analysis. Number of sexual partners and displaying sexual risk behaviors significantly predicted subsequent first time peer-on-peer sexual victimization, whereas a history of child sexual abuse, early......The present study set out to investigate predictors of first time adolescent peer-on-peer sexual victimization (APSV) among 238 female Grade 9 students from 30 schools in Denmark. A prospective research design was utilized to examine the relationship among five potential predictors as measured...... sexual onset and failing to signal sexual boundaries did not. The present study identifies specific risk factors for first time sexual victimization that are potentially changeable. Thus, the results may inform prevention initiatives targeting initial experiences of APSV....

  20. Victimization and pain

    Directory of Open Access Journals (Sweden)

    Małgorzata K. Szerla

    2013-12-01

    Full Text Available Pain has several causes. It can be caused not only by operative trauma or cancer. Some patients suffer from pain as a result of being victims of violence. The aim of the study was to introduce diagnosis and treatment of pain problems in patients who are victims of violence, from a physician’s and a psychologist’s common perspective. Physical pain-related primary effects experienced by the victims of domestic violence go far beyond the results which are noticeable directly and confirmed visually in a forensic examination. In the present paper we introduce an ‘invisible’ group of secondary effects of violence. They appear in time, often after several years, in the form of a variety of psychosomatic disorders. The body is devastated insidiously and the secondary effects are visible as vegetative symptoms, a variety of psychosomatic disorders and pain, difficult to diagnose and treat.

  1. Between "Victims" and "Criminals"

    DEFF Research Database (Denmark)

    Plambech, Sine

    2014-01-01

    This article is about the lives of Nigerian sex workers after deportation from Europe, as well as the institutions that intervene in their migration trajectories. In Europe, some of these women's situations fit the legal definitions of trafficking, and they were categorized as “victims of human...... trafficking”; others were categorized as undocumented migrants—“criminals” guilty of violating immigration laws. Despite the growing political attention devoted to protecting victims of trafficking, I argue that in areas of Nigeria prone to economic insecurity and gender-based violence, the categories...

  2. Perpetrator or victim?

    DEFF Research Database (Denmark)

    Hansen, Helle Rabøl

    Paper 3: HAN091384 Victim, Perpetrator and Pupil - Teacher Perspectives on Peer Bullying Helle Rabøl Hansen, University of Aarhus This paper investigates the approaches and strategies taken up by two crucial actors in relation to bullying in schools: 1. documents indicating school policies...... and identifies a legally informed matrix, which points out unequivocal positions of perpetrators and victims. The policy document mixes the definition practices, which derive from the Olweus tradition on bullying research, into a law informed kind of discourse. Subsequently the policy document iterates...

  3. Gold Returns

    OpenAIRE

    Robert J. Barro; Sanjay P. Misra

    2013-01-01

    From 1836 to 2011, the average real rate of price change for gold in the United States is 1.1% per year and the standard deviation is 13.1%, implying a one-standard-deviation confidence band for the mean of (0.1%, 2.1%). The covariances of gold's real rate of price change with consumption and GDP growth rates are small and statistically insignificantly different from zero. These negligible covariances suggest that gold's expected real rate of return--which includes an unobserved dividend yiel...

  4. Returning home

    DEFF Research Database (Denmark)

    Agergaard, Jytte; Brøgger, Ditte

    2016-01-01

    flows. By focusing on these educational migrants, this paper explores how they connect to their rural homes. Guided by a critical reading of the migration-development scholarship, the paper examines how migrants and their relatives make sense of educational migrants’ remitting and returning practices......, and by comparing three groups of educational migrants, the migrants’ reasons for staying connected and sending remittances are scrutinized. The paper finds that although educational migrants do not generate extensive economic remittances for local development in Nepal, they stay connected to their rural homes...

  5. Attracting Assault: Victims' Nonverbal Cues.

    Science.gov (United States)

    Grayson, Betty; Stein, Morris I.

    1981-01-01

    Describes a study in which prison inmates convicted of assault identified potential victims from videotapes. A lab analysis code was used to determine which nonverbal body movement categories differentiated victims and nonvictims. (JMF)

  6. Childhood Sexual Victimization, Educational Attainment, and the Returns to Schooling

    Science.gov (United States)

    Robst, John

    2010-01-01

    Numerous studies show that survivors of childhood sexual abuse suffer as adults from depression, post-traumatic stress disorder, alcohol and drug abuse, and other mental illnesses. As such, the effect of experiencing traumatic events during childhood including sexual abuse can have lasting implications. The purpose of this paper is to examine…

  7. Victims and Heroes

    DEFF Research Database (Denmark)

    Højbjerg, Christian K.

    2010-01-01

    Victimization, autochthony and citizenship, power and nation-building constitute recurrent, interrelated themes in post-war Manding historical memory in the border area between Liberia and Guinea. While the perceived history of the Manding diverges from academic, historical knowledge as well...

  8. Victim Simulator for Victim Detection Radar

    Science.gov (United States)

    Lux, James P.; Haque, Salman

    2013-01-01

    Testing of victim detection radars has traditionally used human subjects who volunteer to be buried in, or climb into a space within, a rubble pile. This is not only uncomfortable, but can be hazardous or impractical when typical disaster scenarios are considered, including fire, mud, or liquid waste. Human subjects are also inconsistent from day to day (i.e., they do not have the same radar properties), so quantitative performance testing is difficult. Finally, testing a multiple-victim scenario is difficult and expensive because of the need for multiple human subjects who must all be coordinated. The solution is an anthropomorphic dummy with dielectric properties that replicate those of a human, and that has motions comparable to human motions for breathing and heartbeat. Two airfilled bladders filled and drained by solenoid valves provide the underlying motion for vinyl bags filled with a dielectric gel with realistic properties. The entire assembly is contained within a neoprene wetsuit serving as a "skin." The solenoids are controlled by a microcontroller, which can generate a variety of heart and breathing patterns, as well as being reprogrammable for more complex activities. Previous electromagnetic simulators or RF phantoms have been oriented towards assessing RF safety, e.g., the measurement of specific absorption rate (SAR) from a cell phone signal, or to provide a calibration target for diagnostic techniques (e.g., MRI). They are optimized for precise dielectric performance, and are typically rigid and immovable. This device is movable and "positionable," and has motion that replicates the small-scale motion of humans. It is soft (much as human tissue is) and has programmable motions.

  9. Guinea pig maximization test

    DEFF Research Database (Denmark)

    Andersen, Klaus Ejner

    1985-01-01

    Guinea pig maximization tests (GPMT) with chlorocresol were performed to ascertain whether the sensitization rate was affected by minor changes in the Freund's complete adjuvant (FCA) emulsion used. Three types of emulsion were evaluated: the oil phase was mixed with propylene glycol, saline...

  10. Immigrants as crime victims: Experiences of personal nonfatal victimization.

    Science.gov (United States)

    Wheeler, Krista; Zhao, Weiyan; Kelleher, Kelly; Stallones, Lorann; Xiang, Huiyun

    2010-04-01

    Immigrants to the United States are disproportionately victims of homicide mortality in and outside the workplace. Examining their experiences with nonfatal victimization may be helpful in understanding immigrant vulnerability to violence. We compared the annual prevalence of nonfatal personal victimization experienced by immigrant and US-born adults by sociodemographics, employment, occupation, industry, smoking, alcohol and drug use using data from Wave 1 National Epidemiologic Survey on Alcohol and Related Conditions. The prevalence of victimization among immigrants was comparable to that among US-born adults [3.84% (95% CI: 3.18-4.63) vs. 4.10% (95% CI: 3.77-4.44)]. Lower percentages of victimization experienced by immigrants were seen among the unmarried, those age 30-44 years, and among residents of central city areas as compared to those groups among the US-born. For immigrants entering the US as youth, the victimization prevalence declines with greater years of residency in US. Multivariate logistic regression models suggest that, the odds of victimization was significantly associated with age, family income, marital status, central city residency, smoking, and drug use while employment status was not a significant factor. Immigrant workers with farming/forestry occupations might face a higher risk of being victims of violence than their US-born counterparts. The prevalence of victimization among immigrants was comparable to that among US-born adults. Employment status and industry/occupation overall were not significant risk factors for becoming victims of violence. (c) 2010 Wiley-Liss, Inc.

  11. Tri-maximal vs. bi-maximal neutrino mixing

    International Nuclear Information System (INIS)

    Scott, W.G

    2000-01-01

    It is argued that data from atmospheric and solar neutrino experiments point strongly to tri-maximal or bi-maximal lepton mixing. While ('optimised') bi-maximal mixing gives an excellent a posteriori fit to the data, tri-maximal mixing is an a priori hypothesis, which is not excluded, taking account of terrestrial matter effects

  12. Is sexual victimization gender specific?

    DEFF Research Database (Denmark)

    Sundaram, Vanita; Laursen, Bjarne; Helweg-Larsen, Karin

    2008-01-01

    The present study investigates the prevalence of sexual victimization and correlations between sexual victimization and indicators of poor health in two representative samples of men and women in Denmark. Specifically, the authors explore the prevalence of self-reported victimization among...... adolescents (N = 5,829) and adults (N = 3,932) and analyze differences in self-reported health outcomes between male and female victims and corresponding controls. Gender differences are found in the reported prevalence of sexual victimization. Significantly more females than males reported forced sexual...... experiences in both samples. Associations between sexual victimization and poor health outcomes are found for both genders. Comparable patterns of association for men and women are found on a number of variables, particularly those pertaining to risk behavior....

  13. Return models and dynamic asset allocation strategies

    OpenAIRE

    Shi, Wyanet Wen

    2017-01-01

    This thesis studies the design of optimal investment strategies. A strategy is considered optimal when it minimizes the variance of terminal portfolio wealth for a given level of expected terminal portfolio wealth, or equivalently, maximizes an investor's utility. We study this issue in two particular situations: when asset returns follow a continuous-time path-independent process, and when they follow a discrete-time path-dependent process. Continuous-time path-independent return mode...

  14. MAXIM: The Blackhole Imager

    Science.gov (United States)

    Gendreau, Keith; Cash, Webster; Gorenstein, Paul; Windt, David; Kaaret, Phil; Reynolds, Chris

    2004-01-01

    The Beyond Einstein Program in NASA's Office of Space Science Structure and Evolution of the Universe theme spells out the top level scientific requirements for a Black Hole Imager in its strategic plan. The MAXIM mission will provide better than one tenth of a microarcsecond imaging in the X-ray band in order to satisfy these requirements. We will overview the driving requirements to achieve these goals and ultimately resolve the event horizon of a supermassive black hole. We will present the current status of this effort that includes a study of a baseline design as well as two alternative approaches.

  15. Social group utility maximization

    CERN Document Server

    Gong, Xiaowen; Yang, Lei; Zhang, Junshan

    2014-01-01

    This SpringerBrief explains how to leverage mobile users' social relationships to improve the interactions of mobile devices in mobile networks. It develops a social group utility maximization (SGUM) framework that captures diverse social ties of mobile users and diverse physical coupling of mobile devices. Key topics include random access control, power control, spectrum access, and location privacy.This brief also investigates SGUM-based power control game and random access control game, for which it establishes the socially-aware Nash equilibrium (SNE). It then examines the critical SGUM-b

  16. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  17. Magellan Project: Evolving enhanced operations efficiency to maximize science value

    Science.gov (United States)

    Cheuvront, Allan R.; Neuman, James C.; Mckinney, J. Franklin

    1994-01-01

    Magellan has been one of NASA's most successful spacecraft, returning more science data than all planetary spacecraft combined. The Magellan Spacecraft Team (SCT) has maximized the science return with innovative operational techniques to overcome anomalies and to perform activities for which the spacecraft was not designed. Commanding the spacecraft was originally time consuming because the standard development process was envisioned as manual tasks. The Program understood that reducing mission operations costs were essential for an extended mission. Management created an environment which encouraged automation of routine tasks, allowing staff reduction while maximizing the science data returned. Data analysis and trending, command preparation, and command reviews are some of the tasks that were automated. The SCT has accommodated personnel reductions by improving operations efficiency while returning the maximum science data possible.

  18. The dilemmas of victim positioning

    Directory of Open Access Journals (Sweden)

    Dorte Marie Søndergaard

    2015-08-01

    Full Text Available This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases of bullying because the victim has 'participated in' or 'laughed at' some of the bullies' initiatives, or when a rape victim's status as a victim is questioned because, in the lead up to the assault, she was supposedly friendly to the rapist. In these cases, it could be useful to explore the reason for the bullying victim's apparent collusion or to better understand the premises for the rape victim's positioning options in relation to the perpetrator. In other words, it could be fruitful to explore the dynamics and dilemmas of the victim position. In this article, I aim to reflect on the motivational conditions of the victim phenomenon. These reflections are based on an analysis of qualitative data produced through interviews with school children as well as on relevant secondary literature.

  19. Victims of Bullying in Schools

    Science.gov (United States)

    Graham, Sandra

    2016-01-01

    This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…

  20. Victims, civil society and transitional justice in Bosnia and Herzegovina

    Directory of Open Access Journals (Sweden)

    Humphrey Michael

    2012-01-01

    Full Text Available The role of victim organizations in the transitional justice process is examined in postwar Bosnia and Herzegovina (BiH. These organizations emerged in the context of the top-down accountability agenda driven by the international crisis intervention in the Balkan wars and the International Criminal Tribunal for the former Yugoslavia (ICTY. By contrast, in Latin America victim organizations emerged as a self-conscious movements of individuals galvanized by their traumatic experience of state repression and demanding accountability from the bottom-up. In BiH accountability became a condition for re-establishing state political and legal authority but also international financing for reconstruction and progress towards EU accession. Victim organizations were part of the NGO sector which grew rapidly in response to the neoliberal governance model of selforganizing civil society to transform post-socialist and postwar BiH. Non-governmental organizations (NGOs, run largely by professional middle class displaced from careers in the downsized state bureaucracy, became intermediaries between external donors and war affected populations. Victim organizations participated in the transitional justice process by supporting victims/witnesses in international and national prosecutions, tracing the missing persons and supporting the right of return of displaced populations. In BiH, victims’ organizations did not emerge as social movements advocating for citizenship and social justice, but became incorporated in the neoliberal governance model, sponsored by international agendas for stabilization, democratization and EU accession.

  1. Return Predictability, Model Uncertainty, and Robust Investment

    DEFF Research Database (Denmark)

    Lukas, Manuel

    Stock return predictability is subject to great uncertainty. In this paper we use the model confidence set approach to quantify uncertainty about expected utility from investment, accounting for potential return predictability. For monthly US data and six representative return prediction models, we...... find that confidence sets are very wide, change significantly with the predictor variables, and frequently include expected utilities for which the investor prefers not to invest. The latter motivates a robust investment strategy maximizing the minimal element of the confidence set. The robust investor...... allocates a much lower share of wealth to stocks compared to a standard investor....

  2. Cyberbullying victimization in adolescents’ population

    Directory of Open Access Journals (Sweden)

    Nešić Marija

    2016-01-01

    Full Text Available With the rapid development of communication technology and its wide use by the adolescents, cyberspace became a new risky environment for bullying manifestation and victimization. The significance of the problem lies in the fact that, unlike the traditional bullying, the cyberbullying victimization occurs also out of the school surroundings, it’s characterized by the possible anonymity of the bully, it’s harder to discover it and it could have a much bigger audience. Results of numerous studies show that the prevalence of cyberbullying victimization is 10% to 40% during one school year and that it is related to different negative outcomes - from problems of lower self-esteem to severe psychological and behavioral problems. The aim of the paper is to present basic characteristics and negative outcomes of cyberbullying victimization and also to summarize possible factors which are associated with this form of bullying. Lastly, possible ways of preventive action and coping with cyberbullying victimization will be reviewed.

  3. Can monkeys make investments based on maximized pay-off?

    Directory of Open Access Journals (Sweden)

    Sophie Steelandt

    2011-03-01

    Full Text Available Animals can maximize benefits but it is not known if they adjust their investment according to expected pay-offs. We investigated whether monkeys can use different investment strategies in an exchange task. We tested eight capuchin monkeys (Cebus apella and thirteen macaques (Macaca fascicularis, Macaca tonkeana in an experiment where they could adapt their investment to the food amounts proposed by two different experimenters. One, the doubling partner, returned a reward that was twice the amount given by the subject, whereas the other, the fixed partner, always returned a constant amount regardless of the amount given. To maximize pay-offs, subjects should invest a maximal amount with the first partner and a minimal amount with the second. When tested with the fixed partner only, one third of monkeys learned to remove a maximal amount of food for immediate consumption before investing a minimal one. With both partners, most subjects failed to maximize pay-offs by using different decision rules with each partner' quality. A single Tonkean macaque succeeded in investing a maximal amount to one experimenter and a minimal amount to the other. The fact that only one of over 21 subjects learned to maximize benefits in adapting investment according to experimenters' quality indicates that such a task is difficult for monkeys, albeit not impossible.

  4. Victims of cyberstalking in Serbia

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina

    2009-01-01

    Full Text Available The aim of this paper is to present research findings on prevalence and characteristics of cyberstalking in Serbia. A web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 237 respondents completed the online questionnaire. The aim of the first part of this paper is to determine the notion of cyberstalking as well as, to review research about the prevalence and the nature of stalking. The main results are the following: 39,6 % of respondents reported stalking; every fourth stalking victim is a victims of cyberstalking; mostly, cyberstalking victims were female and perpetrators were male. Victims were stalked by: persistent sending of unwanted e-mails and telephone calls, spreading rumors, abusive and negative comments and threats, encouraged other users to harass, threaten or insult, manipulating with victim's personal data, sending malicious programs and files, etc. In Serbia, cyberstalking is not criminalized yet and there are no organizations to whom victims may appeal and ask for help. We are hoping that this research will raise the awareness on cyberstalking and serve as a base for further research and legal reforms regarding cyberstalking victimization in Serbia.

  5. Maximal Bell's inequality violation for non-maximal entanglement

    International Nuclear Information System (INIS)

    Kobayashi, M.; Khanna, F.; Mann, A.; Revzen, M.; Santana, A.

    2004-01-01

    Bell's inequality violation (BIQV) for correlations of polarization is studied for a product state of two two-mode squeezed vacuum (TMSV) states. The violation allowed is shown to attain its maximal limit for all values of the squeezing parameter, ζ. We show via an explicit example that a state whose entanglement is not maximal allow maximal BIQV. The Wigner function of the state is non-negative and the average value of either polarization is nil

  6. Predicting Rape Victim Empathy Based on Rape Victimization and Acknowledgment Labeling.

    Science.gov (United States)

    Osman, Suzanne L

    2016-06-01

    Two studies examined rape victim empathy based on personal rape victimization and acknowledgment labeling. Female undergraduates (Study 1, n = 267; Study 2, n = 381) from a Northeast U.S. midsize public university completed the Rape-Victim Empathy Scale and Sexual Experiences Survey. As predicted, both studies found that acknowledged "rape" victims reported greater empathy than unacknowledged victims and nonvictims. Unexpectedly, these latter two groups did not differ. Study 1 also found that acknowledged "rape" victims reported greater empathy than victims who acknowledged being "sexually victimized." Findings suggest that being raped and acknowledging "rape" together may facilitate rape victim empathy. © The Author(s) 2015.

  7. Punishment goals of crime victims.

    Science.gov (United States)

    Orth, Uli

    2003-04-01

    Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant's real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.

  8. Supply Chain Management of a Modular Product with Returns

    DEFF Research Database (Denmark)

    Ulku, M. Ali; Hsuan, Juliana; Yu, Dennis

    Modularity and returns relate to sustainability. In a retailer-manufacturer setting and when the demand for a returnable product depends on both price and modularity level, we develop a profit-maximizing stochastic model. The solution includes optimal expressions for the price, and the order...

  9. Maximally Symmetric Composite Higgs Models.

    Science.gov (United States)

    Csáki, Csaba; Ma, Teng; Shu, Jing

    2017-09-29

    Maximal symmetry is a novel tool for composite pseudo Goldstone boson Higgs models: it is a remnant of an enhanced global symmetry of the composite fermion sector involving a twisting with the Higgs field. Maximal symmetry has far-reaching consequences: it ensures that the Higgs potential is finite and fully calculable, and also minimizes the tuning. We present a detailed analysis of the maximally symmetric SO(5)/SO(4) model and comment on its observational consequences.

  10. Victimization Experiences and the Stabilization of Victim Sensitivity

    Directory of Open Access Journals (Sweden)

    Mario eGollwitzer

    2015-04-01

    Full Text Available People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, victim sensitivity predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively - especially in socially uncertain situations. This pattern can be explained with the Sensitivity to Mean Intentions (SeMI model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model’s prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span (ontogenetic stabilization and across social situations (actual-genetic stabilization. Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a how certain contextual cues (e.g., facial expressions become conditioned stimuli that elicit equally strong responses, (b why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c how these cues shape spontaneous social expectations (regarding other people’s intentions. Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.

  11. Principles of maximally classical and maximally realistic quantum ...

    Indian Academy of Sciences (India)

    Principles of maximally classical and maximally realistic quantum mechanics. S M ROY. Tata Institute of Fundamental Research, Homi Bhabha Road, Mumbai 400 005, India. Abstract. Recently Auberson, Mahoux, Roy and Singh have proved a long standing conjecture of Roy and Singh: In 2N-dimensional phase space, ...

  12. Quality of life of victims of traumatic brain injury six months after the trauma

    Directory of Open Access Journals (Sweden)

    Rita de Cássia Almeida Vieira

    2013-07-01

    Full Text Available OBJECTIVE: to describe the quality of life of victims of traumatic brain injury six months after the event and to show the relationship between the results observed and the clinical, sociodemographic and return to productivity data. METHOD: data were analyzed from 47 victims assisted in a trauma reference hospital in the municipality of Aracaju and monitored in an outpatient neurosurgery clinic. The data were obtained through analysis of the patient records and structured interviews, with the application of the World Health Organization Quality of Life, brief version, questionnaire. RESULTS: the victims presented positive perceptions of their quality of life, and the physical domain presented the highest mean value (68.4±22.9. Among the sociodemographic characteristics, a statistically significant correlation was found between marital status and the psychological domain. However, the return to productivity was related to all the domains. CONCLUSION: the return to productivity was an important factor for the quality of life of the victims of traumatic brain injury and should direct the public policies in promoting the health of these victims.

  13. Quality of life of victims of traumatic brain injury six months after the trauma.

    Science.gov (United States)

    Vieira, Rita de Cássia Almeida; Hora, Edilene Curvelo; de Oliveira, Daniel Vieira de; Ribeiro, Maria do Carmo de Oliveira; de Sousa, Regina Márcia Cardoso

    2013-01-01

    to describe the quality of life of victims of traumatic brain injury six months after the event and to show the relationship between the results observed and the clinical, sociodemographic and return to productivity data. data were analyzed from 47 victims assisted in a trauma reference hospital in the municipality of Aracaju and monitored in an outpatient neurosurgery clinic. The data were obtained through analysis of the patient records and structured interviews, with the application of the World Health Organization Quality of Life, brief version, questionnaire. the victims presented positive perceptions of their quality of life, and the physical domain presented the highest mean value (68.4±22.9). Among the sociodemographic characteristics, a statistically significant correlation was found between marital status and the psychological domain. However, the return to productivity was related to all the domains. the return to productivity was an important factor for the quality of life of the victims of traumatic brain injury and should direct the public policies in promoting the health of these victims.

  14. Justice And Legal Certainty For Child Victims

    Directory of Open Access Journals (Sweden)

    Edi Setiadi

    2016-12-01

    Full Text Available Focus of attention in the criminal justice system so far has always been to the perpetrator, whereas parties related to a process of criminal justice encompasses the perpetrator, the victim, and the community. A crime victim, in particular, would suffer more since he/she could experience secondary victimization in the criminal justice system. The law concerning victim and witness protection only states the limitation for the criminal victim to ask for compensation to criminal justice system, either as a victim of direct criminal or a victim of abuse power done by law enforcement officers. Child victims are treated the same way as to adult victims, whilst they have a greater dimension of the problem and effects to be dealt with Mechanism and procedures to be followed are ius constituendum (intended/desirable law, as they only share expectation of indemnity, compensation, and rehabilitation which have not been empirically tested in a real situation.

  15. Exploring the Characteristics of Personal Victims Using the National Crime Victimization Survey

    National Research Council Canada - National Science Library

    Jairam, Shashi

    1998-01-01

    .... Two statistical methods were used to investigate these hypotheses, logistical regression for victimization prevalence, and negative binomial regression for victimization incidence and concentration...

  16. Predictability of Stock Returns

    Directory of Open Access Journals (Sweden)

    Ahmet Sekreter

    2017-06-01

    Full Text Available Predictability of stock returns has been shown by empirical studies over time. This article collects the most important theories on forecasting stock returns and investigates the factors that affecting behavior of the stocks’ prices and the market as a whole. Estimation of the factors and the way of estimation are the key issues of predictability of stock returns.

  17. Bullying and Victimization Among Children

    Science.gov (United States)

    Shetgiri, Rashmi

    2013-01-01

    Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves relational aggression. Cyber bullying is an emerging problem which may be more difficult to identify and intervene with than traditional bullying. Bullies, victims, and bully-victims are at risk for negative short and long-term consequences such as depression, anxiety, low self-esteem, and delinquency. Various individual, parental, and peer factors increase the risk for involvement in bullying. Anti-bullying interventions are predominantly school-based and demonstrate variable results. Healthcare providers can intervene in bullying by identifying potential bullies or victims, screening them for co-morbidities, providing counseling and resources, and advocating for bullying prevention. PMID:24007839

  18. Maximizing and customer loyalty: Are maximizers less loyal?

    Directory of Open Access Journals (Sweden)

    Linda Lai

    2011-06-01

    Full Text Available Despite their efforts to choose the best of all available solutions, maximizers seem to be more inclined than satisficers to regret their choices and to experience post-decisional dissonance. Maximizers may therefore be expected to change their decisions more frequently and hence exhibit lower customer loyalty to providers of products and services compared to satisficers. Findings from the study reported here (N = 1978 support this prediction. Maximizers reported significantly higher intentions to switch to another service provider (television provider than satisficers. Maximizers' intentions to switch appear to be intensified and mediated by higher proneness to regret, increased desire to discuss relevant choices with others, higher levels of perceived knowledge of alternatives, and higher ego involvement in the end product, compared to satisficers. Opportunities for future research are suggested.

  19. Implications of maximal Jarlskog invariant and maximal CP violation

    International Nuclear Information System (INIS)

    Rodriguez-Jauregui, E.; Universidad Nacional Autonoma de Mexico

    2001-04-01

    We argue here why CP violating phase Φ in the quark mixing matrix is maximal, that is, Φ=90 . In the Standard Model CP violation is related to the Jarlskog invariant J, which can be obtained from non commuting Hermitian mass matrices. In this article we derive the conditions to have Hermitian mass matrices which give maximal Jarlskog invariant J and maximal CP violating phase Φ. We find that all squared moduli of the quark mixing elements have a singular point when the CP violation phase Φ takes the value Φ=90 . This special feature of the Jarlskog invariant J and the quark mixing matrix is a clear and precise indication that CP violating Phase Φ is maximal in order to let nature treat democratically all of the quark mixing matrix moduli. (orig.)

  20. Effectiveness of Securities with Fuzzy Probabilistic Return

    Directory of Open Access Journals (Sweden)

    Krzysztof Piasecki

    2011-01-01

    Full Text Available The generalized fuzzy present value of a security is defined here as fuzzy valued utility of cash flow. The generalized fuzzy present value cannot depend on the value of future cash flow. There exists such a generalized fuzzy present value which is not a fuzzy present value in the sense given by some authors. If the present value is a fuzzy number and the future value is a random one, then the return rate is given as a probabilistic fuzzy subset on a real line. This kind of return rate is called a fuzzy probabilistic return. The main goal of this paper is to derive the family of effective securities with fuzzy probabilistic return. Achieving this goal requires the study of the basic parameters characterizing fuzzy probabilistic return. Therefore, fuzzy expected value and variance are determined for this case of return. These results are a starting point for constructing a three-dimensional image. The set of effective securities is introduced as the Pareto optimal set determined by the maximization of the expected return rate and minimization of the variance. Finally, the set of effective securities is distinguished as a fuzzy set. These results are obtained without the assumption that the distribution of future values is Gaussian. (original abstract

  1. Phenomenology of maximal and near-maximal lepton mixing

    International Nuclear Information System (INIS)

    Gonzalez-Garcia, M. C.; Pena-Garay, Carlos; Nir, Yosef; Smirnov, Alexei Yu.

    2001-01-01

    The possible existence of maximal or near-maximal lepton mixing constitutes an intriguing challenge for fundamental theories of flavor. We study the phenomenological consequences of maximal and near-maximal mixing of the electron neutrino with other (x=tau and/or muon) neutrinos. We describe the deviations from maximal mixing in terms of a parameter ε(equivalent to)1-2sin 2 θ ex and quantify the present experimental status for |ε| e mixing comes from solar neutrino experiments. We find that the global analysis of solar neutrino data allows maximal mixing with confidence level better than 99% for 10 -8 eV 2 ∼ 2 ∼ -7 eV 2 . In the mass ranges Δm 2 ∼>1.5x10 -5 eV 2 and 4x10 -10 eV 2 ∼ 2 ∼ -7 eV 2 the full interval |ε| e mixing in atmospheric neutrinos, supernova neutrinos, and neutrinoless double beta decay

  2. Maximal quantum Fisher information matrix

    International Nuclear Information System (INIS)

    Chen, Yu; Yuan, Haidong

    2017-01-01

    We study the existence of the maximal quantum Fisher information matrix in the multi-parameter quantum estimation, which bounds the ultimate precision limit. We show that when the maximal quantum Fisher information matrix exists, it can be directly obtained from the underlying dynamics. Examples are then provided to demonstrate the usefulness of the maximal quantum Fisher information matrix by deriving various trade-off relations in multi-parameter quantum estimation and obtaining the bounds for the scalings of the precision limit. (paper)

  3. Victims of cybercrime in Europe : a review of victim surveys

    NARCIS (Netherlands)

    Reep-van den Bergh, Carin M.M.; Junger, Marianne

    2018-01-01

    Objectives: Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime. Methods: We performed a search in databases, searched online, and contacted several Offices for National Statistics in Europe and selected

  4. Effective return, risk aversion and drawdowns

    Science.gov (United States)

    Dacorogna, Michel M.; Gençay, Ramazan; Müller, Ulrich A.; Pictet, Olivier V.

    2001-01-01

    We derive two risk-adjusted performance measures for investors with risk averse preferences. Maximizing these measures is equivalent to maximizing the expected utility of an investor. The first measure, Xeff, is derived assuming a constant risk aversion while the second measure, Reff, is based on a stronger risk aversion to clustering of losses than of gains. The clustering of returns is captured through a multi-horizon framework. The empirical properties of Xeff, Reff are studied within the context of real-time trading models for foreign exchange rates and their properties are compared to those of more traditional measures like the annualized return, the Sharpe Ratio and the maximum drawdown. Our measures are shown to be more robust against clustering of losses and have the ability to fully characterize the dynamic behaviour of investment strategies.

  5. Maximize x(a - x)

    Science.gov (United States)

    Lange, L. H.

    1974-01-01

    Five different methods for determining the maximizing condition for x(a - x) are presented. Included is the ancient Greek version and a method attributed to Fermat. None of the proofs use calculus. (LS)

  6. Finding Maximal Quasiperiodicities in Strings

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Pedersen, Christian N. S.

    2000-01-01

    of length n in time O(n log n) and space O(n). Our algorithm uses the suffix tree as the fundamental data structure combined with efficient methods for merging and performing multiple searches in search trees. Besides finding all maximal quasiperiodic substrings, our algorithm also marks the nodes......Apostolico and Ehrenfeucht defined the notion of a maximal quasiperiodic substring and gave an algorithm that finds all maximal quasiperiodic substrings in a string of length n in time O(n log2 n). In this paper we give an algorithm that finds all maximal quasiperiodic substrings in a string...... in the suffix tree that have a superprimitive path-label....

  7. On the maximal diphoton width

    CERN Document Server

    Salvio, Alberto; Strumia, Alessandro; Urbano, Alfredo

    2016-01-01

    Motivated by the 750 GeV diphoton excess found at LHC, we compute the maximal width into $\\gamma\\gamma$ that a neutral scalar can acquire through a loop of charged fermions or scalars as function of the maximal scale at which the theory holds, taking into account vacuum (meta)stability bounds. We show how an extra gauge symmetry can qualitatively weaken such bounds, and explore collider probes and connections with Dark Matter.

  8. Responding to Children Victimized by Their Peers

    Science.gov (United States)

    Nickerson, Amanda B.; Brock, Stephen E.; Chang, Yiping; O'Malley, Meagan D.

    2006-01-01

    Because victimization results from the dynamic interplay between the victim and his or her parents, peers, and teachers, responding to this problem should involve both direct and indirect interventions. This paper describes and reviews empirically supported direct interventions with victims, as well as indirect interventions with parents, peers,…

  9. Emotional Problems in Traditional and Cyber Victimization

    Science.gov (United States)

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  10. Sexual victimization, partner aggression and alcohol consumption ...

    African Journals Online (AJOL)

    This paper examines the relationship sexual victimization (both childhood sexual victimization and adult sexual victimization), aggression and alcohol consumption. The data for this research is from the Gender, Alcohol and Culture: an International Study (GENACIS). A random sample of 2070 adults (53.8% males and ...

  11. Prevention of victimization following sexual assaults

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria; Sidenius, Katrine

    2004-01-01

    Centre for Victims of Sexual Assault in Copenhagen is a centre for interdisciplinary research and practice. Goals of the centre are to contribute to the documentation of victimization and to prevent further victimization. Research at the centre aims at the examination of the diversity of conditions...... of women exposed to sexualized coercion and the diversity of perspectives on the events....

  12. Predictable return distributions

    DEFF Research Database (Denmark)

    Pedersen, Thomas Quistgaard

    trace out the entire distribution. A univariate quantile regression model is used to examine stock and bond return distributions individually, while a multivariate model is used to capture their joint distribution. An empirical analysis on US data shows that certain parts of the return distributions......-of-sample analyses show that the relative accuracy of the state variables in predicting future returns varies across the distribution. A portfolio study shows that an investor with power utility can obtain economic gains by applying the empirical return distribution in portfolio decisions instead of imposing...

  13. Victimization Experiences and Adolescent Substance Use: Does the Type and Degree of Victimization Matter?

    OpenAIRE

    Pinchevsky, Gillian M.; Fagan, Abigail A.; Wright, Emily M.

    2013-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only asses...

  14. Maximization

    Directory of Open Access Journals (Sweden)

    A. Garmroodi Asil

    2017-09-01

    To further reduce the sulfur dioxide emission of the entire refining process, two scenarios of acid gas or air preheats are investigated when either of them is used simultaneously with the third enrichment scheme. The maximum overall sulfur recovery efficiency and highest combustion chamber temperature is slightly higher for acid gas preheats but air preheat is more favorable because it is more benign. To the best of our knowledge, optimization of the entire GTU + enrichment section and SRU processes has not been addressed previously.

  15. Enumerating all maximal frequent subtrees in collections of phylogenetic trees.

    Science.gov (United States)

    Deepak, Akshay; Fernández-Baca, David

    2014-01-01

    A common problem in phylogenetic analysis is to identify frequent patterns in a collection of phylogenetic trees. The goal is, roughly, to find a subset of the species (taxa) on which all or some significant subset of the trees agree. One popular method to do so is through maximum agreement subtrees (MASTs). MASTs are also used, among other things, as a metric for comparing phylogenetic trees, computing congruence indices and to identify horizontal gene transfer events. We give algorithms and experimental results for two approaches to identify common patterns in a collection of phylogenetic trees, one based on agreement subtrees, called maximal agreement subtrees, the other on frequent subtrees, called maximal frequent subtrees. These approaches can return subtrees on larger sets of taxa than MASTs, and can reveal new common phylogenetic relationships not present in either MASTs or the majority rule tree (a popular consensus method). Our current implementation is available on the web at https://code.google.com/p/mfst-miner/. Our computational results confirm that maximal agreement subtrees and all maximal frequent subtrees can reveal a more complete phylogenetic picture of the common patterns in collections of phylogenetic trees than maximum agreement subtrees; they are also often more resolved than the majority rule tree. Further, our experiments show that enumerating maximal frequent subtrees is considerably more practical than enumerating ordinary (not necessarily maximal) frequent subtrees.

  16. Enumerating all maximal frequent subtrees in collections of phylogenetic trees

    Science.gov (United States)

    2014-01-01

    Background A common problem in phylogenetic analysis is to identify frequent patterns in a collection of phylogenetic trees. The goal is, roughly, to find a subset of the species (taxa) on which all or some significant subset of the trees agree. One popular method to do so is through maximum agreement subtrees (MASTs). MASTs are also used, among other things, as a metric for comparing phylogenetic trees, computing congruence indices and to identify horizontal gene transfer events. Results We give algorithms and experimental results for two approaches to identify common patterns in a collection of phylogenetic trees, one based on agreement subtrees, called maximal agreement subtrees, the other on frequent subtrees, called maximal frequent subtrees. These approaches can return subtrees on larger sets of taxa than MASTs, and can reveal new common phylogenetic relationships not present in either MASTs or the majority rule tree (a popular consensus method). Our current implementation is available on the web at https://code.google.com/p/mfst-miner/. Conclusions Our computational results confirm that maximal agreement subtrees and all maximal frequent subtrees can reveal a more complete phylogenetic picture of the common patterns in collections of phylogenetic trees than maximum agreement subtrees; they are also often more resolved than the majority rule tree. Further, our experiments show that enumerating maximal frequent subtrees is considerably more practical than enumerating ordinary (not necessarily maximal) frequent subtrees. PMID:25061474

  17. Victimization experiences and adolescent substance use: does the type and degree of victimization matter?

    Science.gov (United States)

    Pinchevsky, Gillian M; Fagan, Abigail A; Wright, Emily M

    2014-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only assess these relationships in the short-term using cross-sectional data. This study uses data from the Project on Human Development in Chicago Neighborhoods (PHDCN) to explore the impact of experiencing only indirect victimization, only direct victimization, both forms of victimization, and no victimization on substance use at two time points during adolescence. We find that of those adolescents who are victimized, the majority experience indirect victimization only, followed by experiencing both forms of victimization, and experiencing direct victimization only. Each of the victimization experiences were associated with increased contemporaneous substance use, with the strongest effects for those experiencing multiple forms of violence. For all victims, however, the impact on substance use declined over time.

  18. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet

  19. Maximizing Entropy over Markov Processes

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Legay, Axel; Nielsen, Bo Friis

    2013-01-01

    The channel capacity of a deterministic system with confidential data is an upper bound on the amount of bits of data an attacker can learn from the system. We encode all possible attacks to a system using a probabilistic specification, an Interval Markov Chain. Then the channel capacity...... as a reward function, a polynomial algorithm to verify the existence of an system maximizing entropy among those respecting a specification, a procedure for the maximization of reward functions over Interval Markov Chains and its application to synthesize an implementation maximizing entropy. We show how...... to use Interval Markov Chains to model abstractions of deterministic systems with confidential data, and use the above results to compute their channel capacity. These results are a foundation for ongoing work on computing channel capacity for abstractions of programs derived from code....

  20. Maximizing entropy over Markov processes

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Legay, Axel; Nielsen, Bo Friis

    2014-01-01

    The channel capacity of a deterministic system with confidential data is an upper bound on the amount of bits of data an attacker can learn from the system. We encode all possible attacks to a system using a probabilistic specification, an Interval Markov Chain. Then the channel capacity...... as a reward function, a polynomial algorithm to verify the existence of a system maximizing entropy among those respecting a specification, a procedure for the maximization of reward functions over Interval Markov Chains and its application to synthesize an implementation maximizing entropy. We show how...... to use Interval Markov Chains to model abstractions of deterministic systems with confidential data, and use the above results to compute their channel capacity. These results are a foundation for ongoing work on computing channel capacity for abstractions of programs derived from code. © 2014 Elsevier...

  1. Classifying Returns as Extreme

    DEFF Research Database (Denmark)

    Christiansen, Charlotte

    2014-01-01

    I consider extreme returns for the stock and bond markets of 14 EU countries using two classification schemes: One, the univariate classification scheme from the previous literature that classifies extreme returns for each market separately, and two, a novel multivariate classification scheme tha...

  2. Imaging findings of avalanche victims

    Energy Technology Data Exchange (ETDEWEB)

    Grosse, Alexandra B.; Grosse, Claudia A.; Anderson, Suzanne [University Hospital of Berne, Inselspital, Department of Diagnostic, Pediatric and Interventional Radiology, Berne (Switzerland); Steinbach, Lynne S. [University of California San Francisco, Department of Radiology, San Francisco, CA (United States); Zimmermann, Heinz [University Hospital of Berne, Inselspital, Department of Trauma and Emergency Medicine, Berne (Switzerland)

    2007-06-15

    Skiing and hiking outside the boundaries remains an attractive wilderness activity despite the danger of avalanches. Avalanches occur on a relatively frequent basis and may be devastating. Musculoskeletal radiologists should be acquainted with these injuries. Fourteen avalanche victims (11 men and 3 women; age range 17-59 years, mean age 37.4 years) were air transported to a high-grade trauma centre over a period of 2 years. Radiographs, CT and MR images were prospectively evaluated by two observers in consensus. Musculoskeletal findings (61%) were more frequent than extraskeletal findings (39%). Fractures were most commonly seen (36.6%), involving the spine (14.6%) more frequently than the extremities (9.8%). Blunt abdominal and thoracic trauma were the most frequent extraskeletal findings. A wide spectrum of injuries can be found in avalanche victims, ranging from extremity fractures to massive polytrauma. Asphyxia remains the main cause of death along with hypoxic brain injury and hypothermia. (orig.)

  3. The dilemmas of victim positioning

    DEFF Research Database (Denmark)

    Søndergaard, Dorte Marie

    2015-01-01

    Based on a conceptualization of bullying and relational aggression in groups as an effect of social dynamics rather than individual deficits – this article reflects upon some of the intricate mechanisms and dilemmas involved in victim positioning. Victims of bullying and relational aggression often....... The hopes of (eventual) social belonging may in that sense work paradoxically as a strong agent in the denial of oppression and marginalization. The article is theoretically informed by poststructuralist conceptualizations and grounded in cases of bullying and marginalization (one of them involving rape......). One case is taken from the empirical data produced by the author and a research project on bullying among children (eXbus: Exploring Bullying in School). Two other cases are borrowed from publications of respectively B. Davies from Australia and A. Evaldsson from Shweden. The article opens insights...

  4. Chamaebatiaria millefolium (Torr.) Maxim.: fernbush

    Science.gov (United States)

    Nancy L. Shaw; Emerenciana G. Hurd

    2008-01-01

    Fernbush - Chamaebatiaria millefolium (Torr.) Maxim. - the only species in its genus, is endemic to the Great Basin, Colorado Plateau, and adjacent areas of the western United States. It is an upright, generally multistemmed, sweetly aromatic shrub 0.3 to 2 m tall. Bark of young branches is brown and becomes smooth and gray with age. Leaves are leathery, alternate,...

  5. Big Five Personality Traits of Cybercrime Victims.

    Science.gov (United States)

    van de Weijer, Steve G A; Leukfeldt, E Rutger

    2017-07-01

    The prevalence of cybercrime has increased rapidly over the last decades and has become part of the everyday life of citizens. It is, therefore, of great importance to gain more knowledge on the factors related to an increased or decreased likelihood of becoming a cybercrime victim. The current study adds to the existing body of knowledge using a large representative sample of Dutch individuals (N = 3,648) to study the relationship between cybercrime victimization and the key traits from the Big Five model of personality (i.e., extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience). First, multinomial logistic regression analyses were used to examine the associations between the personality traits and three victim groups, that is, cybercrime victims versus nonvictims, traditional crime victims versus nonvictims, and cybercrime victims versus traditional crime victims. Next, logistic regression analyses were performed to predict victimization of cyber-dependent crimes (i.e., hacking and virus infection) and cyber-enabled crimes (i.e., online intimidation, online consumer fraud, and theft from bank account). The analyses show that personality traits are not specifically associated with cybercrime victimization, but rather with victimization in general. Only those with higher scores on emotional stability were less likely to become a victim of cybercrime than traditional crime. Furthermore, the results indicate that there are little differences between personality traits related to victimization of cyber-enabled and cyber-dependent crimes. Only individuals with higher scores on openness to experience have higher odds of becoming a victim of cyber-enabled crimes.

  6. Lidar 2009 - All Returns

    Data.gov (United States)

    Kansas Data Access and Support Center — LIDAR-derived binary (.las) files containing classified points of all returns. We have 3 classifications Unclassified, Ground, Low points. The average Ground Sample...

  7. Mean ages of homicide victims and victims of homicide-suicide.

    Science.gov (United States)

    Bridges, F Stephen; Tankersley, William B

    2010-02-01

    Using Riedel and Zahn's 1994 reformatted version of an FBI database, the mean age of homicide victims in 2,175 homicide-suicides (4,350 deaths) was compared with that of all other victims of homicides reported for the USA from 1968 to 1975. The overall mean age of homicide victims in homicide-suicides was 1 yr. greater than for victims of homicides not followed by suicides, whereas the mean age for both male and female homicide-suicide victims was, respectively, 3 yr. less and greater than the other homicide victims. The mean age of Black homicide victims of homicide-suicides was 2.4 yr. less than that for Black victims of other homicides, whereas the means for Black and White male homicide victims in homicide-suicides were, respectively, about 4 and 5 yr. less than for victims of other homicides. Also, the mean age of White female homicide victims in homicide-suicides was more than two years greater than for female victims of homicides not followed by suicides. When both sex and race were considered, the mean age for those killed in homicide-suicides relative to those killed in homicides not followed by suicides may represent subpopulations with different mean ages of victims.

  8. Retorno à atividade produtiva de motociclistas vítimas de acidentes de trânsito Retorno a la actividad productiva de los motociclistas víctimas de acidentes de tránsito Motocyclists victims of traffic accidents return to normal productive activities

    Directory of Open Access Journals (Sweden)

    Nelson Luiz Batista de Oliveira

    2006-09-01

    remunerado, en cuanto que el 29.5% desarrollaban actividades de recreación, y las demás, otras actividades. En cuanto a la actividad productiva de las víctimas antes del accidente, el predominio fue de aquellas que realizaban actividad remunerada (81.9%. En el período entre nueve y doce meses post-trauma, el 20.4% de las víctimas relataron actividad productiva alterada. CONCLUSIÓN: hubo asociación estadísticamente significativa entre la situación de productividad después del accidente y las variables: Injury Severity Score, New Injury Severity Score y la percepción del estado de salud por la víctima.OBJECTIVE: To characterize motorcyclists who have been victims of traffic accidents in Maringá, Paraná regarding their occupation, rehabilitation, or disability. METHODS: A sample of 61 subjects participated in the study. Data were collected in February and March, 1999 though interviews and review of medical records. RESULTS: Prior to the accident, the majority of subjects (45,9% were employed. A great number of them (45.9% were performing work-related activities in the moment of the accident. Among the remainder of victims, 29.5% were performing leisure activities. Nine to twelve months post accident, 20.4% of the victims had altered productive activities. CONCLUSION: There was a significant statistical association between productive activities and injury severity score, between productive activities and new injury severity score, and between productive activities and perception of health.

  9. Victim's Rights - Comparative Approach within EU Legislation

    Directory of Open Access Journals (Sweden)

    Monica Pocora

    2015-12-01

    Full Text Available Usually is talking about offender rights and rarely about victim's rights. This study aims to analyse victim's rights especially in Romanian legislation from all points of view. Having involuntary fallen victim to crime, the person is often unaware of what information is available. It is therefore important that the onus is not put on the victim to request a certain piece of information. Victims of crimes need to have their important role in the criminal proceedings and he or she has to know about the extension of them rights. Not least, the study is focus on the right of the victim to receive information, not to be made responsible for the practicalities surrounding its delivery.

  10. IMNN: Information Maximizing Neural Networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    This software trains artificial neural networks to find non-linear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). As compressing large data sets vastly simplifies both frequentist and Bayesian inference, important information may be inadvertently missed. Likelihood-free inference based on automatically derived IMNN summaries produces summaries that are good approximations to sufficient statistics. IMNNs are robustly capable of automatically finding optimal, non-linear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima.

  11. Is the β phase maximal?

    International Nuclear Information System (INIS)

    Ferrandis, Javier

    2005-01-01

    The current experimental determination of the absolute values of the CKM elements indicates that 2 vertical bar V ub /V cb V us vertical bar =(1-z), with z given by z=0.19+/-0.14. This fact implies that irrespective of the form of the quark Yukawa matrices, the measured value of the SM CP phase β is approximately the maximum allowed by the measured absolute values of the CKM elements. This is β=(π/6-z/3) for γ=(π/3+z/3), which implies α=π/2. Alternatively, assuming that β is exactly maximal and using the experimental measurement sin(2β)=0.726+/-0.037, the phase γ is predicted to be γ=(π/2-β)=66.3 o +/-1.7 o . The maximality of β, if confirmed by near-future experiments, may give us some clues as to the origin of CP violation

  12. Strategy to maximize maintenance operation

    OpenAIRE

    Espinoza, Michael

    2005-01-01

    This project presents a strategic analysis to maximize maintenance operations in Alcan Kitimat Works in British Columbia. The project studies the role of maintenance in improving its overall maintenance performance. It provides strategic alternatives and specific recommendations addressing Kitimat Works key strategic issues and problems. A comprehensive industry and competitive analysis identifies the industry structure and its competitive forces. In the mature aluminium industry, the bargain...

  13. Scalable Nonlinear AUC Maximization Methods

    OpenAIRE

    Khalid, Majdi; Ray, Indrakshi; Chitsaz, Hamidreza

    2017-01-01

    The area under the ROC curve (AUC) is a measure of interest in various machine learning and data mining applications. It has been widely used to evaluate classification performance on heavily imbalanced data. The kernelized AUC maximization machines have established a superior generalization ability compared to linear AUC machines because of their capability in modeling the complex nonlinear structure underlying most real world-data. However, the high training complexity renders the kernelize...

  14. How to become a victim of crime

    OpenAIRE

    Богдан Миколайович Головкін

    2017-01-01

    Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1) the emergence of criminal threats; 2) increasing the degree of social vulnerability to criminal assault; 3) the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations); 4) increase the number of victims of crimes as regis...

  15. Victimization, polyvictimization , and health in Swedish adolescents

    Directory of Open Access Journals (Sweden)

    Aho N

    2016-08-01

    Full Text Available Nikolas Aho, Marie Proczkowska Björklund, Carl Göran Svedin Division of Child and Adolescent Psychiatry, Department of Clinical and Experimental Medicine, Linköping University, Linköping, Sweden Abstract: The main objective of this article was to study the relationship between the different areas of victimization (eg, sexual victimization and psychological symptoms, taking into account the full range of victimization domains. The final aim was to contribute further evidence regarding the bias that studies that focus on just one area of victimization may be introduced into our psychological knowledge. The sample included 5,960 second-year high school students in Sweden with a mean age of 17.3 years (range =16–20 years, standard deviation =0.652, of which 49.6% were females and 50.4% males. The Juvenile Victimization Questionnaire and the Trauma Symptom Checklist for Children were used to assess victimization and psychological problems separately. The results show that a majority of adolescents have been victimized, females reported more total events and more sexual victimization and childhood maltreatment, and males were more often victims of conventional crime. The majority of victimization domains as well as the sheer number of events (polyvictimization [PV] proved to be harmful to adolescent health, affecting females more than males. PV explained part of the health effect and had an impact on its own and in relation to each domain. This suggests the possibility that PV to a large degree explains trauma symptoms. In order to understand the psychological effects of trauma, clinicians and researchers should take into account the whole range of possible types of victimization. Keywords: victimization, childhood trauma, psychological symptoms, JVQ, TSCC

  16. FLOUTING MAXIMS IN INDONESIA LAWAK KLUB CONVERSATION

    Directory of Open Access Journals (Sweden)

    Rahmawati Sukmaningrum

    2017-04-01

    Full Text Available This study aims to identify the types of maxims flouted in the conversation in famous comedy show, Indonesia Lawak Club. Likewise, it also tries to reveal the speakers‘ intention of flouting the maxim in the conversation during the show. The writers use descriptive qualitative method in conducting this research. The data is taken from the dialogue of Indonesia Lawak club and then analyzed based on Grice‘s cooperative principles. The researchers read the dialogue‘s transcripts, identify the maxims, and interpret the data to find the speakers‘ intention for flouting the maxims in the communication. The results show that there are four types of maxims flouted in the dialogue. Those are maxim of quality (23%, maxim of quantity (11%, maxim of manner (31%, and maxim of relevance (35. Flouting the maxims in the conversations is intended to make the speakers feel uncomfortable with the conversation, show arrogances, show disagreement or agreement, and ridicule other speakers.

  17. Bullies and Victims: A Phenomenological Study

    Science.gov (United States)

    Omizo, Michael M.; Omizo, Sharon A.; Baxa, Gari-Vic C. O.; Miyose, Ross J.

    2006-01-01

    This study presents the results of a phenomenological study with sixteen elementary school children identified as bullies or victims. Implications for school counselors and educators are also discussed.

  18. The victim of the nuclear accident

    International Nuclear Information System (INIS)

    Carvalho, A.B. de.

    1990-01-01

    This paper shows the effects of the nuclear accident in the victims, in their lives, changes in the behaviour, neurosis including all the psychological aspects. The author compare the victims with nuclear accident like AIDS patients, in terms of people's discrimination. There is another kind of victims. They are the people who gave helpness, for example physicians, firemen and everybody involved with the first aids that suffer together with the victims trying to safe them and to diminish their suffering, combating the danger, the discrimination and the no information. (L.M.J.)

  19. Identifying bully victims: definitional versus behavioral approaches.

    Science.gov (United States)

    Green, Jennifer Greif; Felix, Erika D; Sharkey, Jill D; Furlong, Michael J; Kras, Jennifer E

    2013-06-01

    Schools frequently assess bullying and the Olweus Bully/Victimization Questionnaire (BVQ; Olweus, 1996) is the most widely adopted tool for this purpose. The BVQ is a self-report survey that uses a definitional measurement method--describing "bullying" as involving repeated, intentional aggression in a relationship where there is an imbalance of power and then asking respondents to indicate how frequently they experienced this type of victimization. Few studies have examined BVQ validity and whether this definitional method truly identifies the repetition and power differential that distinguish bullying from other forms of peer victimization. This study examined the concurrent validity of the BVQ definitional question among 435 students reporting peer victimization. BVQ definitional responses were compared with responses to a behavioral measure that did not use the term "bullying" but, instead, included items that asked about its defining characteristics (repetition, intentionality, power imbalance). Concordance between the two approaches was moderate, with an area under the receiver operating curve of .72. BVQ responses were more strongly associated with students indicating repeated victimization and multiple forms of victimization, than with power imbalance in their relationship with the bully. Findings indicate that the BVQ is a valid measure of repeated victimization and a broad range of victimization experiences but may not detect the more subtle and complex power imbalances that distinguish bullying from other forms of peer victimization. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  20. Bullies, Victims, and Bully/Victims: Distinct Groups of At-Risk Youth.

    Science.gov (United States)

    Haynie, Denise L.; Nasel, Tonja; Eitel, Patricia; Crump, Aria Davis; Saylor, Keith; Yu, Kai; Simons-Morton, Bruce

    2001-01-01

    Surveyed middle school students on incidents of bullying and victimization. Found that psychosocial and behavioral predictors such as problem behaviors, attitudes toward deviance, peer influences, depressive symptoms, school-related functioning, and parenting linearly separated never bullied or victimized students from the victim group, from the…

  1. Moral Reasoning and Emotion Attributions of Adolescent Bullies, Victims, and Bully-Victims

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-01-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents…

  2. Reporting Crime Victimizations to the Police and the Incidence of Future Victimizations: A Longitudinal Study.

    Science.gov (United States)

    Ranapurwala, Shabbar I; Berg, Mark T; Casteel, Carri

    2016-01-01

    Law enforcement depends on cooperation from the public and crime victims to protect citizens and maintain public safety; however, many crimes are not reported to police because of fear of repercussions or because the crime is considered trivial. It is unclear how police reporting affects the incidence of future victimization. To evaluate the association between reporting victimization to police and incident future victimization. We conducted a retrospective cohort study using National Crime Victimization Survey 2008-2012 data. Participants were 12+ years old household members who may or may not be victimized, were followed biannually for 3 years, and who completed at least one follow-up survey after their first reported victimization between 2008 and 2012. Crude and adjusted generalized linear mixed regression for survey data with Poisson link were used to compare rates of future victimization. Out of 18,657 eligible participants, 41% participants reported to their initial victimization to police and had a future victimization rate of 42.8/100 person-years (PY) (95% CI: 40.7, 44.8). The future victimization rate of those who did not report to the police (59%) was 55.0/100 PY (95% CI: 53.0, 57.0). The adjusted rate ratio comparing police reporting to not reporting was 0.78 (95%CI: 0.72, 0.84) for all future victimizations, 0.80 (95% CI: 0.72, 0.90) for interpersonal violence, 0.73 (95% CI: 0.68, 0.78) for thefts, and 0.95 (95% CI: 0.84, 1.07) for burglaries. Reporting victimization to police is associated with fewer future victimization, underscoring the importance of police reporting in crime prevention. This association may be attributed to police action and victim services provisions resulting from reporting.

  3. The Reference Return Ratio

    DEFF Research Database (Denmark)

    Nicolaisen, Jeppe; Faber Frandsen, Tove

    2008-01-01

    The paper introduces a new journal impact measure called The Reference Return Ratio (3R). Unlike the traditional Journal Impact Factor (JIF), which is based on calculations of publications and citations, the new measure is based on calculations of bibliographic investments (references) and returns...... (citations). A comparative study of the two measures shows a strong relationship between the 3R and the JIF. Yet, the 3R appears to correct for citation habits, citation dynamics, and composition of document types - problems that typically are raised against the JIF. In addition, contrary to traditional...

  4. The Returns to Entrepreneurship

    DEFF Research Database (Denmark)

    Van Praag, Mirjam; Raknerud, Arvid

    Empirical studies show low pecuniary returns of switching from wage employment to entrepreneurship. We reconsider the pecuniary gains of this switching by employing a two-stage procedure, where the randomness in the timing of inheritance transfers is used as an exclusion restriction to identify...... causal effects. The model is estimated on data covering the whole Norwegian population of individuals matched to the entire population of firms established in the period 2002-2011. The results indicate that the average returns to entrepreneurship are significantly negative for individuals entering...... entrepreneurship through self-employment and modest, but significantly positive, for incorporated startups....

  5. Return to nucleate boiling

    International Nuclear Information System (INIS)

    Shumway, R.W.

    1985-01-01

    This paper presents a collection of TMIN (temperature of return to nucleate boiling) correlations, evaluates them under several conditions, and compares them with a wide range of data. Purpose is to obtain the best one for use in a water reactor safety computer simulator known as TRAC-B. Return to nucleate boiling can occur in a reactor accident at either high or low pressure and flow rates. Most of the correlations yield unrealistic results under some conditions. A new correlation is proposed which overcomes many of the deficiencies

  6. Symbolic Victimization and Real World Fear.

    Science.gov (United States)

    Morgan, Michael

    1983-01-01

    Examines the relationship between victimization of characters in television drama and susceptibility to the viewers' cultivation of a sense of personal risk in the real world. Found that viewers whose fictional counterparts are more likely to be shown as victims show stronger associations between viewing and perceived vulnerability. (PD)

  7. Debate of victims studies. 1. ed.

    International Nuclear Information System (INIS)

    Kosovski, E.; Piedade Junior, H.; Mayr, E.

    1990-01-01

    This book shows some aspects and the effects of several types of accidents in the victims, including the psychological considerations, changes in theirs behaviour, concepts, clinical diagnostic, etc. Victims of nuclear, transit terrorism and work accidents are studied. (C.G.C.)

  8. Relational Aggression and Victimization in College Students

    Science.gov (United States)

    Dahlen, Eric R.; Czar, Katherine A.; Prather, Emily; Dyess, Christy

    2013-01-01

    For this study we explored relational aggression and victimization in a college sample (N = 307), examining potential gender and race differences, correlates, and the link between relational aggression and common emotional and behavioral problems, independent of relational victimization. Gender and race differences were observed on relational…

  9. Emergency Care of the Snakebite Victim.

    Science.gov (United States)

    Ballard, Carol N.

    1994-01-01

    Describes emergency care of snakebite victims, including noting signs and symptoms of venomous snakebites, keeping the victim calm, and seeking immediate medical attention. Provides information on variables that affect the amount of injected venom and how to distinguish nonpoisonous from poisonous snakes. (LP)

  10. Male Rape Victim and Perpetrator Blaming

    Science.gov (United States)

    Sleath, Emma; Bull, Ray

    2010-01-01

    One of four possible vignettes manipulated by (a) level of rape myth contained within them (low vs. high) and (b) type of rape (stranger vs. acquaintance) was presented to participants followed by scales measuring victim blame, perpetrator blame, belief in a just world, sex-role egalitarian beliefs, and male rape myth acceptance. Victim blaming…

  11. 78 FR 52877 - VOCA Victim Assistance Program

    Science.gov (United States)

    2013-08-27

    ... these requirements has merely been re-worked for clarity. Under the proposed rule SAAs must identify... victim populations will allow OVC and SAAs to better tailor their training and technical assistance and... SAAs may use for these purposes. Funding victim service programs located in adjacent States. Program...

  12. ASD and PTSD in Rape Victims

    Science.gov (United States)

    Elklit, Ask; Christiansen, Dorte M.

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims shortly after the rape or attempted rape. The PTSD…

  13. Teacher Victimization in Authoritative School Environments

    Science.gov (United States)

    Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda

    2018-01-01

    Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…

  14. Trafficking in persons : A victim's perspective

    NARCIS (Netherlands)

    Rijken, Conny; Rijken, Conny; Piotrowicz, Ryszard; Uhl, Baerbel Heide

    2017-01-01

    Historically, protection and assistance to victims of human trafficking in many countries is anchored in migration law and dependent on whether or not a residence permit is granted to the victim. Apart from some limited exceptions, cooperation with law enforcement authorities in criminal

  15. The risks and returns of stock investment in a financial market

    Science.gov (United States)

    Li, Jiang-Cheng; Mei, Dong-Cheng

    2013-03-01

    The risks and returns of stock investment are discussed via numerically simulating the mean escape time and the probability density function of stock price returns in the modified Heston model with time delay. Through analyzing the effects of delay time and initial position on the risks and returns of stock investment, the results indicate that: (i) There is an optimal delay time matching minimal risks of stock investment, maximal average stock price returns and strongest stability of stock price returns for strong elasticity of demand of stocks (EDS), but the opposite results for weak EDS; (ii) The increment of initial position recedes the risks of stock investment, strengthens the average stock price returns and enhances stability of stock price returns. Finally, the probability density function of stock price returns and the probability density function of volatility and the correlation function of stock price returns are compared with other literatures. In addition, good agreements are found between them.

  16. Maximal Abelian sets of roots

    CERN Document Server

    Lawther, R

    2018-01-01

    In this work the author lets \\Phi be an irreducible root system, with Coxeter group W. He considers subsets of \\Phi which are abelian, meaning that no two roots in the set have sum in \\Phi \\cup \\{ 0 \\}. He classifies all maximal abelian sets (i.e., abelian sets properly contained in no other) up to the action of W: for each W-orbit of maximal abelian sets we provide an explicit representative X, identify the (setwise) stabilizer W_X of X in W, and decompose X into W_X-orbits. Abelian sets of roots are closely related to abelian unipotent subgroups of simple algebraic groups, and thus to abelian p-subgroups of finite groups of Lie type over fields of characteristic p. Parts of the work presented here have been used to confirm the p-rank of E_8(p^n), and (somewhat unexpectedly) to obtain for the first time the 2-ranks of the Monster and Baby Monster sporadic groups, together with the double cover of the latter. Root systems of classical type are dealt with quickly here; the vast majority of the present work con...

  17. Sexual minority youth victimization and social support: the intersection of sexuality, gender, race, and victimization.

    Science.gov (United States)

    Button, Deeanna M; O'Connell, Daniel J; Gealt, Roberta

    2012-01-01

    In comparison to heterosexual youth, sexual minority youth are more likely to experience victimization. Multiple studies have connected anti-gay prejudice and anti-gay victimization to negative outcomes. Research shows that social support may protect sexual minorities from the harmful effects of anti-gay victimization. However, rates of victimization and the negative outcomes linked to sexual identity within the sexual minority community have been relatively unexplored. Using data from three years of statewide data from heterosexual and sexual minority adolescents in grades 9-12, this study examines victimization, substance use, suicidality, and access to social support by sexuality. Results indicate that sexual minority youth are at increased risk for victimization, substance use, suicidality, and social isolation compared to their heterosexual counterparts. Results also indicate that there is very little bivariate difference within the sexual minority community. Multivariate results indicate differences among sexual minorities' experiences with victimization and substance use.

  18. Sustainable Mars Sample Return

    Science.gov (United States)

    Alston, Christie; Hancock, Sean; Laub, Joshua; Perry, Christopher; Ash, Robert

    2011-01-01

    The proposed Mars sample return mission will be completed using natural Martian resources for the majority of its operations. The system uses the following technologies: In-Situ Propellant Production (ISPP), a methane-oxygen propelled Mars Ascent Vehicle (MAV), a carbon dioxide powered hopper, and a hydrogen fueled balloon system (large balloons and small weather balloons). The ISPP system will produce the hydrogen, methane, and oxygen using a Sabatier reactor. a water electrolysis cell, water extracted from the Martian surface, and carbon dioxide extracted from the Martian atmosphere. Indigenous hydrogen will fuel the balloon systems and locally-derived methane and oxygen will fuel the MAV for the return of a 50 kg sample to Earth. The ISPP system will have a production cycle of 800 days and the estimated overall mission length is 1355 days from Earth departure to return to low Earth orbit. Combining these advanced technologies will enable the proposed sample return mission to be executed with reduced initial launch mass and thus be more cost efficient. The successful completion of this mission will serve as the next step in the advancement of Mars exploration technology.

  19. Return of qualified Sudanese

    OpenAIRE

    Lindsay T McMahon

    2007-01-01

    With the signing of the Comprehensive Peace Agreement in January 2005, the new Government of South Sudan began to call for the return of the millions of South Sudanese IDP s and refugees. The International Organization for Migration (IOM) has developed a programme to help them do so.

  20. Return of qualified Sudanese

    Directory of Open Access Journals (Sweden)

    Lindsay T McMahon

    2007-07-01

    Full Text Available With the signing of the Comprehensive Peace Agreement in January 2005, the new Government of South Sudan began to call for the return of the millions of South Sudanese IDP s and refugees. The International Organization for Migration (IOM has developed a programme to help them do so.

  1. Higher Education Endowments Return

    Science.gov (United States)

    Bahlmann, David; Walda, John D.; Sedlacek, Verne O.

    2012-01-01

    A new study of endowments by the National Association of College and University Business Officers (NACUBO) and the Commonfund Institute has brought good news to college and universities: While endowment returns dropped precipitously in fiscal year 2009 as a result of the financial crisis and accompanying slide in equity markets, they climbed to an…

  2. Return to Play

    Science.gov (United States)

    Mangan, Marianne

    2013-01-01

    Call it physical activity, call it games, or call it play. Whatever its name, it's a place we all need to return to. In the physical education, recreation, and dance professions, we need to redesign programs to address the need for and want of play that is inherent in all of us.

  3. Evaluation of the clinical maxim: "If it ain't broke, don't fix it".

    Science.gov (United States)

    Howell-Duffy, Chris; Hrynchak, Patricia K; Irving, Elizabeth L; Mouat, Graham S V; Elliott, David B

    2012-01-01

    A significant number of patients return to optometric practice dissatisfied with their spectacles. An important question is whether any of these cases are preventable. There are several different clinical maxims that are used to modify the subjective refraction when determining the refractive prescription. These maxims aim to improve patient comfort and adaptation and thereby reduce patient dissatisfaction with new spectacles. They are not based on research evidence, but rather on expert opinion gained from clinical experience. The aim of this study was to retrospectively analyze a large number of case records of dissatisfied patients to assess the possible usefulness of the prescribing maxim "if it ain't broke, don't fix it." Three hundred eighteen non-tolerance cases from a university-based Canadian optometric clinic were categorized by a focus group of optometrists. Three prescribing categories were defined and comprised cases in which application of the proposed maxim may have prevented the recheck eye examination; a more limited application of the maxim for one working distance may have been appropriate; and finally scenarios in which the maxim did not work in that the practitioner was judged to have initially followed the maxim, yet patient dissatisfaction was still reported. The remaining unallocated records comprised prescribing situations outside the scope of this study. Approximately 32% of non-tolerance cases were judged to have been preventable by use of the proposed maxim. Furthermore, an additional 10% reduction in recheck cases may have been possible by a more liberal interpretation of the maxim. Conversely, 4% of cases were deemed to comprise scenarios in which the maxim was followed yet the patient returned later to report problems with their spectacles. The prescribing maxim "if it ain't broke, don't fix it" appears to have a role in reducing recheck eye examinations and improving patient satisfaction with new spectacles.

  4. Susto and the career path of the victim of an industrial accident: a sociological case study.

    Science.gov (United States)

    Holloway, G

    1994-04-01

    This is a case study of the processes involved in attaining the status of 'victim' after an industrial accident. In this case a migrant working in the manufacturing industry becomes increasingly 'disabled' and seeks legitimation as a 'victim' who is 'worthy' of financial compensation. The institutional processes involved are the industrial, medical and legal systems. Chronic pain is a condition that often defies an unambiguous diagnosis. Most chronic pain victims are therefore constantly seeking legitimation for their condition as physicians attempt to uncover the aetiology of the pain. Most chronic pain victims also fail to fulfil the expectation of getting well as soon as possible. Physicians can, at best, only give a prognosis that is little better than an 'educated guess'. The conditional nature of the legitimacy gives the chronic pain victims only limited legitimacy for their sick role and this often results in physicians seeking psychological or moral explanations for what began as a relatively simple physical problem. Psychological or psychiatric diagnoses are considerably weaker metaphorically than physiological diagnoses and tend to infer the strong possibility of the victim contributing to her/his condition as a result of hypochondriacal or psychosomatic 'tendencies' or, even worse, 'malingering'. The migrant client can exacerbate this situation through an earnest desire to (over)conform to norms by going along with whatever is recommended by people who hold superior status by virtue of their knowledge and power ('posicíon'). Among some Latin American countries 'over-compliance' has been recognised a socio-medical condition and is termed 'susto'. In the workers' compensation context the shift to overconformity ('susto') results from the uncertainty about receiving (legitimate) acknowledgement and compensation. The desire is to ensure, as far as possible, that a certainty of outcome is achieved (i.e. a return to work or adequate compensation). In other

  5. Chernobylsk, return on a disaster

    International Nuclear Information System (INIS)

    Ackermann, G.

    2006-01-01

    The author gives the result of the situation after the Chernobylsk disaster. She made its own inquiry by traveling in the forbidden area, meeting operators, victims, scientific people and ecologists. (N.C.)

  6. To Not Only Being Victims

    Directory of Open Access Journals (Sweden)

    Stefania Fantauzzi

    2017-11-01

    Full Text Available Hannah Arendt is against the idea that Jews were only the victims of history. Starting from the idea that the Age of Enlightenment and the Jewish emancipation put the Jewish tradition and history in crisis, she is adamant that this same history is not only full of suffering, but includes  a hidden tradition of activism that is important to uncover and to claim. The aim of these pages is to analyse the Arendtian thinking of the 30s and 40s in order to show some elements that can help us to understand what the loss of humanity means today and to indicate the possibilities of claiming and recovering it.

  7. Maximizing benefits from resource development

    International Nuclear Information System (INIS)

    Skjelbred, B.

    2002-01-01

    The main objectives of Norwegian petroleum policy are to maximize the value creation for the country, develop a national oil and gas industry, and to be at the environmental forefront of long term resource management and coexistence with other industries. The paper presents a graph depicting production and net export of crude oil for countries around the world for 2002. Norway produced 3.41 mill b/d and exported 3.22 mill b/d. Norwegian petroleum policy measures include effective regulation and government ownership, research and technology development, and internationalisation. Research and development has been in five priority areas, including enhanced recovery, environmental protection, deep water recovery, small fields, and the gas value chain. The benefits of internationalisation includes capitalizing on Norwegian competency, exploiting emerging markets and the assurance of long-term value creation and employment. 5 figs

  8. Maximizing synchronizability of duplex networks

    Science.gov (United States)

    Wei, Xiang; Emenheiser, Jeffrey; Wu, Xiaoqun; Lu, Jun-an; D'Souza, Raissa M.

    2018-01-01

    We study the synchronizability of duplex networks formed by two randomly generated network layers with different patterns of interlayer node connections. According to the master stability function, we use the smallest nonzero eigenvalue and the eigenratio between the largest and the second smallest eigenvalues of supra-Laplacian matrices to characterize synchronizability on various duplexes. We find that the interlayer linking weight and linking fraction have a profound impact on synchronizability of duplex networks. The increasingly large inter-layer coupling weight is found to cause either decreasing or constant synchronizability for different classes of network dynamics. In addition, negative node degree correlation across interlayer links outperforms positive degree correlation when most interlayer links are present. The reverse is true when a few interlayer links are present. The numerical results and understanding based on these representative duplex networks are illustrative and instructive for building insights into maximizing synchronizability of more realistic multiplex networks.

  9. [Second victim : Critical incident stress management in clinical medicine].

    Science.gov (United States)

    Schiechtl, B; Hunger, M S; Schwappach, D L; Schmidt, C E; Padosch, S A

    2013-09-01

    Critical incidents in clinical medicine can have far-reaching consequences on patient health. In cases of severe medical errors they can seriously harm the patient or even lead to death. The involvement in such an event can result in a stress reaction, a so-called acute posttraumatic stress disorder in the healthcare provider, the so-called second victim of an adverse event. Psychological distress may not only have a long lasting impact on quality of life of the physician or caregiver involved but it may also affect the ability to provide safe patient care in the aftermath of adverse events. A literature review was performed to obtain information on care giver responses to medical errors and to determine possible supportive strategies to mitigate negative consequences of an adverse event on the second victim. An internet search and a search in Medline/Pubmed for scientific studies were conducted using the key words "second victim, "medical error", "critical incident stress management" (CISM) and "critical incident stress reporting system" (CIRS). Sources from academic medical societies and public institutions which offer crisis management programs where analyzed. The data were sorted by main categories and relevance for hospitals. Analysis was carried out using descriptive measures. In disaster medicine and aviation navigation services the implementation of a CISM program is an efficient intervention to help staff to recover after a traumatic event and to return to normal functioning and behavior. Several other concepts for a clinical crisis management plan were identified. The integration of CISM and CISM-related programs in a clinical setting may provide efficient support in an acute crisis and may help the caregiver to deal effectively with future error events and employee safety.

  10. VIOLATION OF CONVERSATION MAXIM ON TV ADVERTISEMENTS

    Directory of Open Access Journals (Sweden)

    Desak Putu Eka Pratiwi

    2015-07-01

    Full Text Available Maxim is a principle that must be obeyed by all participants textually and interpersonally in order to have a smooth communication process. Conversation maxim is divided into four namely maxim of quality, maxim of quantity, maxim of relevance, and maxim of manner of speaking. Violation of the maxim may occur in a conversation in which the information the speaker has is not delivered well to his speaking partner. Violation of the maxim in a conversation will result in an awkward impression. The example of violation is the given information that is redundant, untrue, irrelevant, or convoluted. Advertisers often deliberately violate the maxim to create unique and controversial advertisements. This study aims to examine the violation of maxims in conversations of TV ads. The source of data in this research is food advertisements aired on TV media. Documentation and observation methods are applied to obtain qualitative data. The theory used in this study is a maxim theory proposed by Grice (1975. The results of the data analysis are presented with informal method. The results of this study show an interesting fact that the violation of maxim in a conversation found in the advertisement exactly makes the advertisements very attractive and have a high value.

  11. Moral reasoning and emotion attributions of adolescent bullies, victims, and bully-victims.

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-11-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents aged 12-18 (57% females) reported the frequency of involvement in bullying and victimization. Participants were categorized as bullies (14.3%), bully-victims (3.9%), and victims (9.7%). Moral judgment, moral justifications, and emotion attributions to a hypothetical perpetrator of a moral transgression (relational aggression) were assessed. Bullies showed more morally disengaged reasoning than non-involved students. Bully-victims more frequently indicated that violating moral rules is right. Victims produced more victim-oriented justifications (i.e., more empathy) but fewer moral rules. Among victims, the frequency of morally responsible justifications decreased and the frequency of deviant rules increased with age. The findings are discussed from an integrative moral developmental perspective. ©2011 The British Psychological Society.

  12. When and Why We See Victims as Responsible: The Impact of Ideology on Attitudes Toward Victims.

    Science.gov (United States)

    Niemi, Laura; Young, Liane

    2016-09-01

    Why do victims sometimes receive sympathy for their suffering and at other times scorn and blame? Here we show a powerful role for moral values in attitudes toward victims. We measured moral values associated with unconditionally prohibiting harm ("individualizing values") versus moral values associated with prohibiting behavior that destabilizes groups and relationships ("binding values": loyalty, obedience to authority, and purity). Increased endorsement of binding values predicted increased ratings of victims as contaminated (Studies 1-4); increased blame and responsibility attributed to victims, increased perceptions of victims' (versus perpetrators') behaviors as contributing to the outcome, and decreased focus on perpetrators (Studies 2-3). Patterns persisted controlling for politics, just world beliefs, and right-wing authoritarianism. Experimentally manipulating linguistic focus off of victims and onto perpetrators reduced victim blame. Both binding values and focus modulated victim blame through victim responsibility attributions. Findings indicate the important role of ideology in attitudes toward victims via effects on responsibility attribution. © 2016 by the Society for Personality and Social Psychology, Inc.

  13. Crime victims in the criminal justice system

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2003-01-01

    Full Text Available Negative social reaction and inadequate reaction of the agencies of the formal control on the primary victimization is leading to the so called secondary victimization that can be a source of trauma and frustration as much as the primary victimization. Due to that, relation of the police and the judiciary towards the crime victims is of a great importance regarding victims’ willingness to report the victimization, their confidence in these agencies, and cooperation during clearing up the crime. In order to realize the victim’s position in the criminal justice system, this paper contains an overview of how the police, prosecutor’s office and courts are functioning. The paper is based on the interviews made with the representatives of these state agencies, as well as on the previous knowledge and realized surveys concerning this topic. The aim of the paper is to emphasize the position and the role of the victim support service in the system of the state intervention, based upon the obtained data, as well as to give some basic information on how victims could report the crime, what are their rights and duties, what can they expect from the competent agencies.

  14. Product return management

    DEFF Research Database (Denmark)

    Shaharudin, Mohd Rizaimy; Govindan, Kannan; Zailani, Suhaiza

    2017-01-01

    The aim of this study is to examine the extent to which product returns motivate manufacturing firms to adopt closed-loop supply chain activities that influence the effectiveness of reverse supply chains. The hypotheses have been tested using data from a sample of 150 environmental management...... system ISO 14001 certified manufacturing firms in Malaysia through the census sampling approach. The results of the empirical test using LISREL Version 8.70 for the structural equation modeling support the fundamental explanation of the influence of the institutional forces towards the adoption of closed...... eventually impacts the firm's effectiveness in the reverse supply chain. The findings also help managers to understand the factors that can improve the outcome of the adoption of closed-loop supply chain activities by intensifying the extent of involvement in product returns, which provides a valuable...

  15. [Reintegration of victimized children and adolescents in their parents' view].

    Science.gov (United States)

    Martins, Camilla Soccio; Ferriani, Maria das Graças Carvalho

    2003-01-01

    This study aims at learning, from some aggressor families' point of view, the way reintegration of child and adolescent victims into their own families happen, in the city of Ribeirão Preto-SP in 2002. The methodology used is descriptive and qualitative; data were collected through interviews and observation of participants. Nine families whose children were institutionalized were surveyed. Results showed that the institutionalization of children is a way for some families to rethink the kind of education parents are providing their childrenwith/their own education. For the other ones, it was perceived as a support for behavioral problems. As noticed, some parents stressed a negative influence falling upon their children, which made them more disobedient on their return home, and causing disciplinary procedures harder to be established. The conclusion is that reintegration of the target children/adolescents is harnessed by violence happening inside families.

  16. A victim-centered approach to justice? Victim satisfaction effects on third-party punishments.

    Science.gov (United States)

    Gromet, Dena M; Okimoto, Tyler G; Wenzel, Michael; Darley, John M

    2012-10-01

    Three studies investigated whether victims' satisfaction with a restorative justice process influenced third-party assignments of punishment. Participants evaluated criminal offenses and victims' reactions to an initial restorative justice conference, and were later asked to indicate their support for additional punishment of the offender. Across the three studies, we found that victim satisfaction (relative to dissatisfaction) attenuates people's desire to seek offender punishment, regardless of offense severity (Study 2) or conflicting reports from a third-party observer (Study 3). This relationship was explained by the informational value of victim satisfaction: Participants inferred that victims felt closure and that offenders experienced value reform, both of which elevated participants' satisfaction with the restorative justice outcome. The informational value communicated by victim satisfaction, and its criminal justice implications, are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  17. Maximizing the optical network capacity.

    Science.gov (United States)

    Bayvel, Polina; Maher, Robert; Xu, Tianhua; Liga, Gabriele; Shevchenko, Nikita A; Lavery, Domaniç; Alvarado, Alex; Killey, Robert I

    2016-03-06

    Most of the digital data transmitted are carried by optical fibres, forming the great part of the national and international communication infrastructure. The information-carrying capacity of these networks has increased vastly over the past decades through the introduction of wavelength division multiplexing, advanced modulation formats, digital signal processing and improved optical fibre and amplifier technology. These developments sparked the communication revolution and the growth of the Internet, and have created an illusion of infinite capacity being available. But as the volume of data continues to increase, is there a limit to the capacity of an optical fibre communication channel? The optical fibre channel is nonlinear, and the intensity-dependent Kerr nonlinearity limit has been suggested as a fundamental limit to optical fibre capacity. Current research is focused on whether this is the case, and on linear and nonlinear techniques, both optical and electronic, to understand, unlock and maximize the capacity of optical communications in the nonlinear regime. This paper describes some of them and discusses future prospects for success in the quest for capacity. © 2016 The Authors.

  18. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  19. Predictors and protective factors for adolescent Internet victimization

    DEFF Research Database (Denmark)

    Helweg-Larsen, Karin; Schütt, Nina; Larsen, Helmer Bøving

    2012-01-01

    To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization.......To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization....

  20. Victims of Rape: Repeated Assessment of Depressive Symptoms.

    Science.gov (United States)

    Atkeson, Beverly M.; And Others

    1982-01-01

    Investigated depressive symptoms in rape victims (N=115) for one year following their assaults. Depressive symptoms were higher in victims than in controls. By four months postrape, depressive symptoms in the victim group had diminished, and the victims were no longer significantly different from the nonvictim control group. (Author)

  1. Cyber socializing and victimization of women

    Directory of Open Access Journals (Sweden)

    Halder Debarati

    2009-01-01

    Full Text Available Web 2.01 has redefined the virtual life of ordinary individuals and has given wide opportunities to internet users including women to exchange ideas, interact with like minded people and participate in the development of virtual societies as per one's own choices. Social networking websites (SNWs, a segment of Web 2.0 is very popular among the internet users. However, there is a dark side of these SNW's too. They have become havens for offenders to victimize women, the most vulnerable targets in the internet, after children. In this paper, we examine the victimization of women in the social networking websites in general, analyze the trends of such victimization from socio - legal - victimological angle and ascertain the reasons for the growth of such victimization.

  2. La victime, acteur de la sécurité ? / The victim, a security actor ?

    Directory of Open Access Journals (Sweden)

    Dieu François

    2012-08-01

    Full Text Available What is the position of the victim in security policy? Only recently has the victim been the object, in France and elsewhere, of considerable attention by the social system, which has taken into account the different aspects of victimization. However, the victim is only partially associated to actions led in this domain, either as a source of data on the state of delinquency through public meetings and victimization surveys, or as an auxiliary to prevention with measure of community and situational prevention.Quelle est la place de la victime dans les politiques de sécurité ? Ce n’est que très récemment que la victime a fait l’objet, en France comma ailleurs, d’une attention plus soutenue de la part du système social, avec le développement d’une meilleure prise en charge des différents aspects de la victimisation. Pour autant, la victime n’est associée que très partiellement aux actions conduites en ce domaine, soit comme source de données sur l’état de la délinquance au moyen de réunions publiques et d’enquête de victimation, soit comme auxiliaire de la prévention avec les dispositifs de prévention communautaire et situationnelle.

  3. Stop Harassment!: men's reactions to victims' confrontation

    OpenAIRE

    Carmen Herrera, M.; Herrera, Antonio; Expósito, Francisca

    2014-01-01

    Sexual harassment is one of the most widespread forms of gender violence. Perceptions of sexual harassment depend on gender, context, the perceivers' ideology, and a host of other factors. Research has underscored the importance of coping strategies in raising a victim's self-confidence by making her feel that she plays an active role in overcoming her own problems. The aim of this study was to assess the men's perceptions of sexual harassment in relation to different victim responses. The st...

  4. Incendiari e vittime / Arsonists and Victims / Incendiaires et victimes

    Directory of Open Access Journals (Sweden)

    Roberta Bisi

    2008-04-01

    Full Text Available Human beings need fire !Contrary to other living beings, mankind could not live without fire so it is quite astonishing to observe that most of the fires which burn on the earth are caused by man.Many fires spread all over the North Mediterranean area, from Portugal to Turkey, during the summer 2007.Human beings and fire: associated to the sacrifice of Titan Prometheus which was meant to be a sort of pattern to be followed by men to honour the gods.Fire is alive like water and air but it is difficult to capture it with the eyes: we can look at it for a long time before we discover that it never looks like itself.Fire has brought about important changes to human life, giving it much more security and comfort.However, the destructive power of fire is a real threat which not only takes many victims and results in wounded, intoxicated and homeless people but its force also wipes out and destroys places recognized as the heritage of mankind.Les hommes ont besoin du feu! Contrairement à tous les autres êtres vivants, les hommes ne pourraient pas vivre comme ils le font sans le feu; d'autre part, le fait que la plupart des feux qui brûlent sur la planète sont causés par l’homme, représente un aspect inquiétant.Pendant l’été 2007, beaucoup d’incendies ont frappé toute la zone du Nord de la Méditerranée, du Portugal à la Turquie. Hommes et feu : un binôme lié à la création du sacrifice du Titan Prométhée et qui aurait ainsi établi le modèle suivi par les hommes afin d'honorer les dieux.Le feu est vivant, comme l’eau et l'air, mais il est insaisissable au regard, c’est à dire que nous pouvons passer beaucoup de temps à le regarder mais il ne sera jamais égal à lui même. L’usage du feu a rendu la vie de l’homme plus sûre et plus confortable et il a modifié, au cours du temps, la face de la terre.Toutefois, la force déstructrice du feu représente une menace réelle qui fait des victimes, des blessés, des intoxiqu

  5. Mitigating concerns and maximizing returns: social media strategies for injury prevention non-profits.

    Science.gov (United States)

    McMillan-Cottom, Tressie

    2014-08-01

    Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs) with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns.

  6. Mitigating Concerns and Maximizing Returns: Social Media Strategies for Injury Prevention Non-profits

    Directory of Open Access Journals (Sweden)

    Tressie McMillan-Cottom

    2014-08-01

    Full Text Available Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns.

  7. Adolescent Violent Victimization and Precocious Union Formation*

    Science.gov (United States)

    C. Kuhl, Danielle; Warner, David F.; Wilczak, Andrew

    2013-01-01

    This article bridges scholarship in criminology and family sociology by extending arguments about “precocious exits” from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization (“street” violence) on the timing of first co-residential union formation—differentiating between marriage and cohabitation—in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance. PMID:24431471

  8. Adolescent Violent Victimization and Precocious Union Formation.

    Science.gov (United States)

    C Kuhl, Danielle; Warner, David F; Wilczak, Andrew

    2012-11-01

    This article bridges scholarship in criminology and family sociology by extending arguments about "precocious exits" from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization ("street" violence) on the timing of first co-residential union formation-differentiating between marriage and cohabitation-in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance.

  9. Mars Sample Return Architecture Overview

    Science.gov (United States)

    Edwards, C. D.; Vijendran, S.

    2018-04-01

    NASA and ESA are exploring potential concepts for a Sample Retrieval Lander and Earth Return Orbiter that could return samples planned to be collected and cached by the Mars 2020 rover mission. We provide an overview of the Mars Sample Return architecture.

  10. Does mental exertion alter maximal muscle activation?

    Directory of Open Access Journals (Sweden)

    Vianney eRozand

    2014-09-01

    Full Text Available Mental exertion is known to impair endurance performance, but its effects on neuromuscular function remain unclear. The purpose of this study was to test the hypothesis that mental exertion reduces torque and muscle activation during intermittent maximal voluntary contractions of the knee extensors. Ten subjects performed in a randomized order three separate mental exertion conditions lasting 27 minutes each: i high mental exertion (incongruent Stroop task, ii moderate mental exertion (congruent Stroop task, iii low mental exertion (watching a movie. In each condition, mental exertion was combined with ten intermittent maximal voluntary contractions of the knee extensor muscles (one maximal voluntary contraction every 3 minutes. Neuromuscular function was assessed using electrical nerve stimulation. Maximal voluntary torque, maximal muscle activation and other neuromuscular parameters were similar across mental exertion conditions and did not change over time. These findings suggest that mental exertion does not affect neuromuscular function during intermittent maximal voluntary contractions of the knee extensors.

  11. AUC-Maximizing Ensembles through Metalearning.

    Science.gov (United States)

    LeDell, Erin; van der Laan, Mark J; Petersen, Maya

    2016-05-01

    Area Under the ROC Curve (AUC) is often used to measure the performance of an estimator in binary classification problems. An AUC-maximizing classifier can have significant advantages in cases where ranking correctness is valued or if the outcome is rare. In a Super Learner ensemble, maximization of the AUC can be achieved by the use of an AUC-maximining metalearning algorithm. We discuss an implementation of an AUC-maximization technique that is formulated as a nonlinear optimization problem. We also evaluate the effectiveness of a large number of different nonlinear optimization algorithms to maximize the cross-validated AUC of the ensemble fit. The results provide evidence that AUC-maximizing metalearners can, and often do, out-perform non-AUC-maximizing metalearning methods, with respect to ensemble AUC. The results also demonstrate that as the level of imbalance in the training data increases, the Super Learner ensemble outperforms the top base algorithm by a larger degree.

  12. On maximal massive 3D supergravity

    OpenAIRE

    Bergshoeff , Eric A; Hohm , Olaf; Rosseel , Jan; Townsend , Paul K

    2010-01-01

    ABSTRACT We construct, at the linearized level, the three-dimensional (3D) N = 4 supersymmetric " general massive supergravity " and the maximally supersymmetric N = 8 " new massive supergravity ". We also construct the maximally supersymmetric linearized N = 7 topologically massive supergravity, although we expect N = 6 to be maximal at the non-linear level. (Bergshoeff, Eric A) (Hohm, Olaf) (Rosseel, Jan) P.K.Townsend@da...

  13. Inclusive Fitness Maximization:An Axiomatic Approach

    OpenAIRE

    Okasha, Samir; Weymark, John; Bossert, Walter

    2014-01-01

    Kin selection theorists argue that evolution in social contexts will lead organisms to behave as if maximizing their inclusive, as opposed to personal, fitness. The inclusive fitness concept allows biologists to treat organisms as akin to rational agents seeking to maximize a utility function. Here we develop this idea and place it on a firm footing by employing a standard decision-theoretic methodology. We show how the principle of inclusive fitness maximization and a related principle of qu...

  14. The Return to Foreign Aid

    DEFF Research Database (Denmark)

    Dalgaard, Carl-Johan Lars; Hansen, Henrik

    2017-01-01

    We estimate the average rate of return on investments financed by aid and by domestic resource mobilisation, using aggregate data. Both returns are expected to vary across countries and time. Consequently we develop a correlated random coefficients model to estimate the average returns. Across...... different estimators and two different data sources for GDP and investment our findings are remarkably robust; the average gross return on ‘aid investments’ is about 20 per cent. This is in accord with micro estimates of the economic rate of return on aid projects and with aggregate estimates of the rate...

  15. Activity versus outcome maximization in time management.

    Science.gov (United States)

    Malkoc, Selin A; Tonietto, Gabriela N

    2018-04-30

    Feeling time-pressed has become ubiquitous. Time management strategies have emerged to help individuals fit in more of their desired and necessary activities. We provide a review of these strategies. In doing so, we distinguish between two, often competing, motives people have in managing their time: activity maximization and outcome maximization. The emerging literature points to an important dilemma: a given strategy that maximizes the number of activities might be detrimental to outcome maximization. We discuss such factors that might hinder performance in work tasks and enjoyment in leisure tasks. Finally, we provide theoretically grounded recommendations that can help balance these two important goals in time management. Published by Elsevier Ltd.

  16. On the maximal superalgebras of supersymmetric backgrounds

    International Nuclear Information System (INIS)

    Figueroa-O'Farrill, Jose; Hackett-Jones, Emily; Moutsopoulos, George; Simon, Joan

    2009-01-01

    In this paper we give a precise definition of the notion of a maximal superalgebra of certain types of supersymmetric supergravity backgrounds, including the Freund-Rubin backgrounds, and propose a geometric construction extending the well-known construction of its Killing superalgebra. We determine the structure of maximal Lie superalgebras and show that there is a finite number of isomorphism classes, all related via contractions from an orthosymplectic Lie superalgebra. We use the structure theory to show that maximally supersymmetric waves do not possess such a maximal superalgebra, but that the maximally supersymmetric Freund-Rubin backgrounds do. We perform the explicit geometric construction of the maximal superalgebra of AdS 4 X S 7 and find that it is isomorphic to osp(1|32). We propose an algebraic construction of the maximal superalgebra of any background asymptotic to AdS 4 X S 7 and we test this proposal by computing the maximal superalgebra of the M2-brane in its two maximally supersymmetric limits, finding agreement.

  17. Task-oriented maximally entangled states

    International Nuclear Information System (INIS)

    Agrawal, Pankaj; Pradhan, B

    2010-01-01

    We introduce the notion of a task-oriented maximally entangled state (TMES). This notion depends on the task for which a quantum state is used as the resource. TMESs are the states that can be used to carry out the task maximally. This concept may be more useful than that of a general maximally entangled state in the case of a multipartite system. We illustrate this idea by giving an operational definition of maximally entangled states on the basis of communication tasks of teleportation and superdense coding. We also give examples and a procedure to obtain such TMESs for n-qubit systems.

  18. Taking peer victimization research to the next level: complex interactions among genes, teacher attitudes/behaviors, peer ecologies, & classroom characteristics.

    Science.gov (United States)

    Espelage, Dorothy L

    2015-01-01

    This commentary reviews research findings of the five papers in the special entitled "School-related Factors in the Development of Bullying Perpetration and Victimization", which represent critical areas that are often overlooked in the literature. First, one paper points to the complex interaction between a genetic disposition for aggression and classroom norms toward aggression. Second, an intervention paper unpacks the underlying mechanisms of an efficacious school-wide bully prevention program by opening the "black box" and testing for mediators. Third, the remaining studies employ a wide range of rigorous designs to identify how teachers' attitudes, behaviors, and classroom practices play a critical role in the prevalence of victimization and bullying in the classroom. Further, teachers' attitudes and behaviors are shown to be predictive of youth's willingness to intervene to assist a peer who is being victimized. Results are situated in what is known about bullying prevention, and how the findings from these studies could maximize the sensitivity of future prevention efforts.

  19. Bystander Involvement in Peer Victimization: The Value of Looking beyond Aggressors and Victims

    Science.gov (United States)

    Wiens, Brenda A.; Dempsey, Allison

    2009-01-01

    Peer victimization has been a focus of both research and prevention program development. This construct is typically measured from the victim and aggressor perspectives. However, prevention programming often includes an additional bystander perspective. The present study evaluated whether questions regarding witnessing peer victimization…

  20. When a victim becomes violent perpetrator: Violent victimization in childhood, violent criminal behavior in adulthood

    Directory of Open Access Journals (Sweden)

    Stevković Ljiljana

    2013-01-01

    Full Text Available Numerous international research has identified that direct or indirect exposure to violent victimization in a familial context during childhood is a risk factor for violent criminal behavior of victimized children in adulthood. Studies of violent victimization of children in Serbia are rare, and are mostly directed at determining the prevalence, the main characteristics of or the immediate physical, psychological and behavioral consequences of victimization. Empirical analysis of the criminological consequences of early violent victimization in adulthood are an exception in scientific studies in Serbia. The aim of the paper is to present the results of research into the influence of early violent victimization on violent crime of adult men and women. After the introduction a brief overview of the worldwide research confirming the correlation between the experience of violent victimization and subsequent violent behavior is given. The results of the research conducted by the author will then be discussed. The results illustrate the possibility of predicting violent criminal behavior in adulthood based on indicators of direct and indirect victimization in childhood. [Projekat Ministarstva nauke Republike Srbije, br. 179044: Razvoj metodologije evidentiranja kriminaliteta kao osnova kreiranja efikasnih mera za njegovo suzbijanje i prevenciju

  1. Do victims only cry? Victim-survivors and their grassroots organizations in Peru

    NARCIS (Netherlands)

    de Waardt, M.F.; Ouweneel, A.

    2012-01-01

    De Waardt discusses associations of victims of the 1980s violent conflict in Peru, which she relates to the Peruvian cultural tradition of grassroots organizations. She conveys the substantial existence of victim-survivor associations, the social support its members find amongst each other, and the

  2. Victimization experiences of adolescents in Malaysia.

    Science.gov (United States)

    Choo, Wan-Yuen; Dunne, Michael P; Marret, Mary J; Fleming, Marylou; Wong, Yut-Lin

    2011-12-01

    There has been little community-based research regarding multiple-type victimization experiences of young people in Asia, and none in Malaysia. This study aimed to estimate prevalence, explore gender differences, as well as describe typical perpetrators and family and social risk factors among Malaysian adolescents. A cross-sectional survey of 1,870 students was conducted in 20 randomly selected secondary schools in Selangor state (mean age: 16 years; 58.8% female). The questionnaire included items on individual, family, and social background and different types of victimization experiences in childhood. Emotional and physical types of victimization were most common. A significant proportion of adolescents (22.1%) were exposed to more than one type, with 3% reporting all four types. Compared with females, males reported more physical, emotional, and sexual victimization. The excess of sexual victimization among boys was due to higher exposure to noncontact events, whereas prevalence of forced intercourse was equal for both genders (3.0%). Although adult male perpetrators predominate, female adults and peers of both genders also contribute substantially. Low quality of parent-child relationships and poor school and neighborhood environments had the strongest associations with victimization. Family structure (parental divorce, presence of step-parent or single parent, or household size), parental drug use, and rural/urban location were not influential in this sample. This study extends the analysis of multiple-type victimization to a Malaysian population. Although some personal, familial, and social factors correlate with those found in western nations, there are cross-cultural differences, especially with regard to the nature of sexual violence based on gender and the influence of family structure. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. The 'successful' return

    DEFF Research Database (Denmark)

    Olwig, Karen Fog

    2012-01-01

    Research on female migrant caregivers has tended to focus upon the emotional and social problems they encounter working abroad, given women’s traditional role as caregivers for their own families. This article analyses how Caribbean women who have returned after a period abroad as domestic workers...... inscribe their migration experiences within the gendered narrative of the good relative who migrates to help the family left behind and therefore deserves social recognition in the community of origin. It argues that this narrative allows the women to both affirm and reinterpret local family and gender...... roles within the context of migration. This analysis points to the close connection between narrative structures, accounts of migration experiences, and self-presentations and suggests that narratives about family and gender roles not only reflect people’s lives, but are also a malleable resource...

  4. Mixed maximal and explosive strength training in recreational endurance runners.

    Science.gov (United States)

    Taipale, Ritva S; Mikkola, Jussi; Salo, Tiina; Hokka, Laura; Vesterinen, Ville; Kraemer, William J; Nummela, Ari; Häkkinen, Keijo

    2014-03-01

    Supervised periodized mixed maximal and explosive strength training added to endurance training in recreational endurance runners was examined during an 8-week intervention preceded by an 8-week preparatory strength training period. Thirty-four subjects (21-45 years) were divided into experimental groups: men (M, n = 9), women (W, n = 9), and control groups: men (MC, n = 7), women (WC, n = 9). The experimental groups performed mixed maximal and explosive exercises, whereas control subjects performed circuit training with body weight. Endurance training included running at an intensity below lactate threshold. Strength, power, endurance performance characteristics, and hormones were monitored throughout the study. Significance was set at p ≤ 0.05. Increases were observed in both experimental groups that were more systematic than in the control groups in explosive strength (12 and 13% in men and women, respectively), muscle activation, maximal strength (6 and 13%), and peak running speed (14.9 ± 1.2 to 15.6 ± 1.2 and 12.9 ± 0.9 to 13.5 ± 0.8 km Ł h). The control groups showed significant improvements in maximal and explosive strength, but Speak increased only in MC. Submaximal running characteristics (blood lactate and heart rate) improved in all groups. Serum hormones fluctuated significantly in men (testosterone) and in women (thyroid stimulating hormone) but returned to baseline by the end of the study. Mixed strength training combined with endurance training may be more effective than circuit training in recreational endurance runners to benefit overall fitness that may be important for other adaptive processes and larger training loads associated with, e.g., marathon training.

  5. Psychosocial profile of bullies, victims, and bully-victims: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Marie eLeiner

    2014-01-01

    Full Text Available While adverse conditions in a child’s life do not excuse inappropriate behavior, they may cause emotional and behavioral problems that require treatment as a preventive measure to reduce the likelihood of bullying. We aimed to identify differences in the psychosocial profiles of adolescents who classified themselves as bullies, victims, or bully-victims. We performed a cross-sectional study in which data were collected between January 2009 and January 2010 from seven university-based clinics in a large metropolitan area with a predominantly Mexican-American population. We collected data on physical aggression among adolescents who self-categorized into the following groups: uninvolved, bullies, victims, and bully-victims. We determined the psychosocial profiles of the adolescents based on responses to the Youth Self Report (YSR and parent’s responses to the Child Behavior Checklist (CBCL. A one-way analysis of variance and multivariate regression analyses were performed to compare the various components of the psychosocial profiles among the groups. Our analysis of the CBCL and the YSR assessments identified differences between the uninvolved group and one or more of the other groups. No significant differences were observed among the bully, victim, and bully-victim groups based on the CBCL. We did find significant differences among those groups based on the YSR, however. Our results suggest that emotional and behavioral problems exist among bullies, victims, and bully-victims. Therefore, treatment should not focus only on the victims of bullying; treatment is equally important for the other groups (bullies and bully-victims. Failure to adequately treat the underlying problems experienced by all three groups of individuals could allow the problems of bullying to continue.

  6. In Situ Pre-Selection of Return Samples with Bio-Signatures by Combined Laser Mass Spectrometry and Optical Microscopy

    Science.gov (United States)

    Wiesendanger, R.; Wurz, P.; Tulej, M.; Wacey, D.; Neubeck, A.; Grimaudo, V.; Riedo, A.; Moreno, P.; Cedeño-López, A.; Ivarsson, M.

    2018-04-01

    The University of Bern developed instrument prototypes that allow analysis of samples on Mars prior to bringing them back to Earth, allowing to maximize the scientific outcome of the returned samples. We will present the systems and first results.

  7. Dual Competing Photovoltaic Supply Chains: A Social Welfare Maximization Perspective

    Directory of Open Access Journals (Sweden)

    Zhisong Chen

    2017-11-01

    Full Text Available In the past decades, the inappropriate subsidy policies in many nations have caused problems such as serious oversupply, fierce competition and subpar social welfare in the photovoltaic (PV industry in many nations. There is a clear shortage in the PV industry literature regarding how dual supply chains compete and the key decision issues regarding the competition between dual PV supply chains. It is critical to develop effective subsidy policies for the competing PV supply chains to achieve social welfare maximization. This study has explored the dual PV supply chain competition under the Bertrand competition assumption by three game-theoretical modeling scenarios (or supply chain strategies considering either the public subsidy or no subsidy from a social welfare maximization perspective. A numerical analysis complemented by two sensitivity analyses provides a better understanding of the pricing and quantity decision dynamics in the dual supply chains under three different supply chain strategies and the corresponding outcomes regarding the total supply chain profits, the social welfare and the required total subsidies. The key findings disclose that if there are public subsidies, the dual PV supply chains have the strongest intention to pursue the decentralized strategy to achieve their maximal returns rather than the centralized strategy that would achieve the maximal social welfare; however, the government would need to pay for the maximal subsidy budget. Thus, the best option for the government would be to encourage the dual PV supply chains to adopt a centralized strategy since this will not only maximize the social welfare but also, at the same time, minimize the public subsidy. With a smart subsidy policy, the PV industry can make the best use of the subsidy budget and grow in a sustainable way to support the highly demanded solar power generation in many countries trying very hard to increase the proportion of their clean energy to

  8. Dual Competing Photovoltaic Supply Chains: A Social Welfare Maximization Perspective

    Science.gov (United States)

    Su, Shong-Iee Ivan

    2017-01-01

    In the past decades, the inappropriate subsidy policies in many nations have caused problems such as serious oversupply, fierce competition and subpar social welfare in the photovoltaic (PV) industry in many nations. There is a clear shortage in the PV industry literature regarding how dual supply chains compete and the key decision issues regarding the competition between dual PV supply chains. It is critical to develop effective subsidy policies for the competing PV supply chains to achieve social welfare maximization. This study has explored the dual PV supply chain competition under the Bertrand competition assumption by three game-theoretical modeling scenarios (or supply chain strategies) considering either the public subsidy or no subsidy from a social welfare maximization perspective. A numerical analysis complemented by two sensitivity analyses provides a better understanding of the pricing and quantity decision dynamics in the dual supply chains under three different supply chain strategies and the corresponding outcomes regarding the total supply chain profits, the social welfare and the required total subsidies. The key findings disclose that if there are public subsidies, the dual PV supply chains have the strongest intention to pursue the decentralized strategy to achieve their maximal returns rather than the centralized strategy that would achieve the maximal social welfare; however, the government would need to pay for the maximal subsidy budget. Thus, the best option for the government would be to encourage the dual PV supply chains to adopt a centralized strategy since this will not only maximize the social welfare but also, at the same time, minimize the public subsidy. With a smart subsidy policy, the PV industry can make the best use of the subsidy budget and grow in a sustainable way to support the highly demanded solar power generation in many countries trying very hard to increase the proportion of their clean energy to combat the global

  9. Dual Competing Photovoltaic Supply Chains: A Social Welfare Maximization Perspective.

    Science.gov (United States)

    Chen, Zhisong; Su, Shong-Iee Ivan

    2017-11-20

    In the past decades, the inappropriate subsidy policies in many nations have caused problems such as serious oversupply, fierce competition and subpar social welfare in the photovoltaic (PV) industry in many nations. There is a clear shortage in the PV industry literature regarding how dual supply chains compete and the key decision issues regarding the competition between dual PV supply chains. It is critical to develop effective subsidy policies for the competing PV supply chains to achieve social welfare maximization. This study has explored the dual PV supply chain competition under the Bertrand competition assumption by three game-theoretical modeling scenarios (or supply chain strategies) considering either the public subsidy or no subsidy from a social welfare maximization perspective. A numerical analysis complemented by two sensitivity analyses provides a better understanding of the pricing and quantity decision dynamics in the dual supply chains under three different supply chain strategies and the corresponding outcomes regarding the total supply chain profits, the social welfare and the required total subsidies. The key findings disclose that if there are public subsidies, the dual PV supply chains have the strongest intention to pursue the decentralized strategy to achieve their maximal returns rather than the centralized strategy that would achieve the maximal social welfare; however, the government would need to pay for the maximal subsidy budget. Thus, the best option for the government would be to encourage the dual PV supply chains to adopt a centralized strategy since this will not only maximize the social welfare but also, at the same time, minimize the public subsidy. With a smart subsidy policy, the PV industry can make the best use of the subsidy budget and grow in a sustainable way to support the highly demanded solar power generation in many countries trying very hard to increase the proportion of their clean energy to combat the global

  10. Maximally Entangled Multipartite States: A Brief Survey

    International Nuclear Information System (INIS)

    Enríquez, M; Wintrowicz, I; Życzkowski, K

    2016-01-01

    The problem of identifying maximally entangled quantum states of a composite quantum systems is analyzed. We review some states of multipartite systems distinguished with respect to certain measures of quantum entanglement. Numerical results obtained for 4-qubit pure states illustrate the fact that the notion of maximally entangled state depends on the measure used. (paper)

  11. Utility maximization and mode of payment

    NARCIS (Netherlands)

    Koning, R.H.; Ridder, G.; Heijmans, R.D.H.; Pollock, D.S.G.; Satorra, A.

    2000-01-01

    The implications of stochastic utility maximization in a model of choice of payment are examined. Three types of compatibility with utility maximization are distinguished: global compatibility, local compatibility on an interval, and local compatibility on a finite set of points. Keywords:

  12. Corporate Social Responsibility and Profit Maximizing Behaviour

    OpenAIRE

    Becchetti, Leonardo; Giallonardo, Luisa; Tessitore, Maria Elisabetta

    2005-01-01

    We examine the behavior of a profit maximizing monopolist in a horizontal differentiation model in which consumers differ in their degree of social responsibility (SR) and consumers SR is dynamically influenced by habit persistence. The model outlines parametric conditions under which (consumer driven) corporate social responsibility is an optimal choice compatible with profit maximizing behavior.

  13. Computing return times or return periods with rare event algorithms

    Science.gov (United States)

    Lestang, Thibault; Ragone, Francesco; Bréhier, Charles-Edouard; Herbert, Corentin; Bouchet, Freddy

    2018-04-01

    The average time between two occurrences of the same event, referred to as its return time (or return period), is a useful statistical concept for practical applications. For instance insurances or public agencies may be interested by the return time of a 10 m flood of the Seine river in Paris. However, due to their scarcity, reliably estimating return times for rare events is very difficult using either observational data or direct numerical simulations. For rare events, an estimator for return times can be built from the extrema of the observable on trajectory blocks. Here, we show that this estimator can be improved to remain accurate for return times of the order of the block size. More importantly, we show that this approach can be generalised to estimate return times from numerical algorithms specifically designed to sample rare events. So far those algorithms often compute probabilities, rather than return times. The approach we propose provides a computationally extremely efficient way to estimate numerically the return times of rare events for a dynamical system, gaining several orders of magnitude of computational costs. We illustrate the method on two kinds of observables, instantaneous and time-averaged, using two different rare event algorithms, for a simple stochastic process, the Ornstein–Uhlenbeck process. As an example of realistic applications to complex systems, we finally discuss extreme values of the drag on an object in a turbulent flow.

  14. Inclusive fitness maximization: An axiomatic approach.

    Science.gov (United States)

    Okasha, Samir; Weymark, John A; Bossert, Walter

    2014-06-07

    Kin selection theorists argue that evolution in social contexts will lead organisms to behave as if maximizing their inclusive, as opposed to personal, fitness. The inclusive fitness concept allows biologists to treat organisms as akin to rational agents seeking to maximize a utility function. Here we develop this idea and place it on a firm footing by employing a standard decision-theoretic methodology. We show how the principle of inclusive fitness maximization and a related principle of quasi-inclusive fitness maximization can be derived from axioms on an individual׳s 'as if preferences' (binary choices) for the case in which phenotypic effects are additive. Our results help integrate evolutionary theory and rational choice theory, help draw out the behavioural implications of inclusive fitness maximization, and point to a possible way in which evolution could lead organisms to implement it. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Maximal Entanglement in High Energy Physics

    Directory of Open Access Journals (Sweden)

    Alba Cervera-Lierta, José I. Latorre, Juan Rojo, Luca Rottoli

    2017-11-01

    Full Text Available We analyze how maximal entanglement is generated at the fundamental level in QED by studying correlations between helicity states in tree-level scattering processes at high energy. We demonstrate that two mechanisms for the generation of maximal entanglement are at work: i $s$-channel processes where the virtual photon carries equal overlaps of the helicities of the final state particles, and ii the indistinguishable superposition between $t$- and $u$-channels. We then study whether requiring maximal entanglement constrains the coupling structure of QED and the weak interactions. In the case of photon-electron interactions unconstrained by gauge symmetry, we show how this requirement allows reproducing QED. For $Z$-mediated weak scattering, the maximal entanglement principle leads to non-trivial predictions for the value of the weak mixing angle $\\theta_W$. Our results are a first step towards understanding the connections between maximal entanglement and the fundamental symmetries of high-energy physics.

  16. Repatriation and restitution of Holocaust victims in post-war Denmark

    Directory of Open Access Journals (Sweden)

    Sofie Lene Bak

    2016-01-01

    Full Text Available Jewish Holocaust survivors faced severe economic and emotional difficulties on returning home to Denmark in 1945. Jewish families had used their savings, sold valuables and property and obtained improvised private loans in order to finance their escape to Sweden. Homes, businesses and property had been subject to theft and abuse. During and after the German occupation, however, Danish authorities worked to mitigate and ameliorate the consequences of Nazi persecution and the Danish government implemented one of the most inclusive and comprehensive restitution laws in Europe, taking into account Jewish victims of deportation as well as victims of exile. The restitution process underlines the dedication of the Danish authorities to the reintegration of the Jewish community and their interest in allaying potential ethnic conflict. Furthermore, the process is a remarkable – but overlooked – missing link between the social reforms of the 1930s and the modern Danish welfare state.

  17. How to become a victim of crime

    Directory of Open Access Journals (Sweden)

    Богдан Миколайович Головкін

    2017-03-01

    Full Text Available Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1 the emergence of criminal threats; 2 increasing the degree of social vulnerability to criminal assault; 3 the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations; 4 increase the number of victims of crimes as registered and latent, which helps re-victimization of some of them. As a result of our Internet survey of more than 3002 people (2015 defined the proportion of citizens who every year are victims of crime. By 2015 it is 37 %. However, one in seven respondents already had experience of victimization before. In our view, there is a threshold of permissible viktymizovanosti population not exceeding 40 % and is independent of the level of crime in a calendar year or an. Typically, victims of crime every year are new faces. Re-victimization experiences 15 % of citizens. The risk of becoming a victim of crime depends on the accuracy and timeliness of recognition of sources and types of criminal threats. Showed a rather stereotypical ideas of the criminal threat and showed a disorientation in identifying their sources. The last mentioned some time. Traditionally people cautious attitude to strangers, suspicious issued and may bear criminal intent (62 %; alarming stay at poorly attended locations in the dark (67 % and likelihood of falling into unpredictable situations (44 %. Only 15% of respondents sees the source of victimization in their own dangerous behavior. While the public understanding of the sources of victimization are largely abstract and false character. So, to our knowledge, most people are afraid of violent crime (64 %, but actually experiencing mercenary crimes (60 %. In the context of what has been said quite expected the place called criminal

  18. Sexually assaulted victims are getting younger

    DEFF Research Database (Denmark)

    Scherer, Susanne; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    INTRODUCTION: From the clinical forensic examination reports produced by the Department of Forensic Medicine, Department of Forensic Medicine, Faculty of Health Sciences, University of Copenhagen, Denmark, in 2007 concerning rape, attempted rape and sexual assault (RAS), circumstances were...... extracted and analysed focussing on age, relationship, lesions, violence, location and alcohol intoxication. MATERIAL AND METHODS: A total of 184 girls and women over the age of 12 years were included in this retrospective study. RESULTS: The median age of the victims was 20 years (range 12-89 years). 75.......5% were under 30 years of age. 53% knew the perpetrator. More than one perpetrator was reported in 11%. 46% of the assaulted victims had a total number of 1-5 observed lesions and these were observed in all types of perpetrator relationship. Eight victims with more than 20 lesions were assaulted...

  19. Pupils as Victims of Peer Violence

    Directory of Open Access Journals (Sweden)

    Cvek Mihaela

    2013-11-01

    Full Text Available The school is an educational institution that has to provide appropriate control of adults over pupils, which they do. Nevertheless, violence cannot be avoided. Pupils encounter peer violence in different roles, as observers, victims, perpetrators, or both. The objective of our research was to examine how often pupils are victims of peer violence, and to what extent the latter depends on pupils’ gender and age. The results of the research made among pupils in the fifth, seventh, and eighth grades of various primary schools across Slovenia showed that 24.1 per cent of pupils had already been victims of peer violence. The ones that they tend to tell about such episodes are their parents. The results have also shown that school is really a place where violence is very common, and that psychological and verbal abuse are the most common types of violence used.

  20. Maximizing remanufacturing profit using product acquisition management

    NARCIS (Netherlands)

    V.D.R. Guide Jr (Daniel); R.H. Teunter (Ruud); L.N. van Wassenhove (Luk)

    2001-01-01

    textabstractThe profitability of remanufacturing depends on the quantity and quality of product returns and on the demand for remanufactured products. The quantity and quality of product returns can be influenced by varying quality dependent acquisition prices, i.e., by using product acquisition

  1. Return to the... past

    International Nuclear Information System (INIS)

    Ammerich, M.

    2009-01-01

    This article goes back over the incidents occurring during the summer 2008, that is to say the uranium release from the Socatri facility in the South of France. From this point, the purpose studies the radiological situation of the Camargue seashore; the levels of radioactivity are from 3 to thirty times higher than these ones expected in this area, but the natural radioactivity with thorium and uranium coming from the granitic massifs erosion brings an important part. It is difficult to make the part between human and natural contribution to ambient radioactivity. However, it appears that to limit the water consumption until the time of dilution played its part was absolutely necessary. Then, because it is question of water, the drinking water is tackled. Some mineral waters go over the recommended limits of doses. A last return to the past with the radioactive watches, but this time with actual watches that activate detection. Two watches contained promethium 147, 147 Pm is a beta emitter but also gamma emitter. To end, in Ireland and Great Britain, some fire detectors contain americium 241. In fact, this article constitutes a summary of different abnormalities around radioactivity. (N.C.)

  2. The return of religion

    Directory of Open Access Journals (Sweden)

    S. Griffioen

    2011-06-01

    Full Text Available Religion is back in Philosophy as a respectable subject. Part 1 first charts what MacIntyre, Taylor and Derrida have meant in this regard. Subsequently, it turns to the Enlightenment to determine what constituted the breakthrough. It is found that even where the Enlightenment gave maximum room to religion i.e. as a civic religion and as “religion of the heart” it still excluded a constitutive relation to a transcendent revelation. Part 2 centres on the religion-faith distinction in reformational philosophy. Similar to the Enlightenment, religion is understood as part of human nature. However, human nature itself is conceived as intrinsically religious and depending for its light on revelation. Secondly, “religion” in this context also encompasses idols and religious substitutes. Thus, it directs attention to shopping malls, football stadiums, health policy, et cetera, as possible contexts of a return of religion. Examples show that this has become a popular approach. However, most of the publications surveyed fail to distinguish between an “analogical” and a “pistically qualified” use of religion, and are open to exaggerations (the shopping mall and football stadiums as temples, etc.. At this junction, the relevance is shown of the religion-faith distinction as well as of Elaine Botha’s theory of metaphors. The epilogue offers an integration of parts one and two.

  3. Support for victims of crime: Analysis of the VDS info and victim support service in 2010

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2011-01-01

    Full Text Available VDS info and victim support service is a victim support service, which was established in 2003 within the Victimology Society of Serbia. The service provides emotional support, information and, if necessary, referral to other relevant services, as well as witness support. The target group of the service are direct and indirect victims of all forms of crime, of both sexes, regardless of any personal characteristics. In addition, support is provided to victims in court, as well as to women victims of violence who are in prison. In most cases victim support is provided by volunteers who are trained to work with victims of crime. This paper analyzes the work of the service in 2010. Special attention is paid to the problems of workplace violence and domestic violence, which are the most common reasons for contacting the service. The aim of the paper is to present the work of the service in the past year, as well as to highlight the trends observed in comparison to the previous period.

  4. PUC fast track nips returns

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    In the first of what it says will be annual cost-of-capital proceedings to set returns on equity and rates of return on rate base for electric utilities, the California Public Utilities Commission (PUC) lowered from 1989 levels the 1990 returns on common equity (ROE) and rates of return (ROR) for the state's four major investor-owned electric utilities. Under this fast-track procedure, by May 8 of every year, utilities will have to file an application for rate adjustments that reflect their projected costs of capital for the following year

  5. The return to foreign aid

    DEFF Research Database (Denmark)

    Dalgaard, Carl-Johan Lars; Hansen, Henrik

    We investigate the marginal productivity of investment across countries. The aim is to estimate the return on investments financed by foreign aid and by domestic resource mobilization, using aggregate data. Both returns are expected to vary across countries and time. Consequently we develop...... a correlated random coefficients model, to estimate the average aggregate return on ‘aid investments’ and ‘domestic investments’. Across different estimators and two different sources for GDP and investment data our findings are remarkably robust; the average gross return on ‘aid investments’ is about 20 per...

  6. Peer Victimization and Dating Violence Victimization: The Mediating Role of Loneliness, Depressed Mood, and Life Satisfaction.

    Science.gov (United States)

    Cava, María-Jesús; Buelga, Sofía; Tomás, Inés

    2018-03-01

    Peer victimization and dating violence victimization have serious negative effects on adolescents' health, and they seem to be related. However, the mediating processes in this relationship have not been sufficiently analyzed. The purpose of this study was to analyze the direct and indirect relationships between peer victimization and dating violence victimization, considering the possible mediator role of loneliness, depressed mood, and life satisfaction. These relationships are analyzed in boys and girls, and in early and middle adolescence. From an initial sample of 1,038 Spanish adolescents, those who had or had had in the past 12 months a dating relationship (647 adolescents; 49.1% boys, M = 14.38, SD = 1.43) were included in this study. Multigroup structural equation modeling was used to test a double mediation model simultaneously for boys and girls, testing the invariance of the relationships among variables across genders. The same technique was used to test the model simultaneously for early and middle adolescence, testing the invariance of the relationships among variables across age groups. Results revealed a positive direct relationship between peer victimization and dating violence victimization, as well as the partial mediating role of loneliness and life satisfaction in this relationship. The mediator role of depressed mood was not supported. The same mediational model was confirmed in boys and girls, and in early and middle adolescence. These results highlight the important role of loneliness and life satisfaction to explain the link between peer victimization and dating violence victimization in adolescence. These findings may be useful for developing intervention programs aimed at preventing situations of multiple victimization during adolescence.

  7. THE INFLUENCE OF CORPORATE FINANCIAL PERFORMANCE ON SHARE RETURN

    Directory of Open Access Journals (Sweden)

    Ghulam Nurul Huda

    2015-09-01

    Full Text Available This study was conducted to examine the effect of financial performances of Economic Value Added (EVA, Market Value Added (MVA as well as financial ratios (Fixed Asset Turnover, Return on Investment, Debt to Equity Ratio, Price to Book Value, Total Asset Turnover on Stock Return. This study used the data of six representative palm oil companies which were listed in Indonesia Stock Exchange. The analysis models that were used included three multiple regression equations for EVA, MVA and Stock Return. The results indicate that DER significantly influences EVA and PBV, and TATO significantly influences MVA. Return Shares are significantly only affected by EVA. The company's fundamentals, especially EVA, PBV, TATO and DER were used by investors to predict the Stock Return in Indonesia Stock Exchange in 2009–2014 period. This study confirmed the previous studies that these variables are involved on regression model to predict the Stock Return. The results of the analysis of the company's financial performance with EVA and MVA and financial fundamental variables provide a better alternative picture on the achievement of the company so that the benefits in investing in the palm oil business in Indonesia can be maximally managed.Keywords: Indonesia Stock Exchange, investor, market, multiple regression, stock

  8. Optimal decision making and matching are tied through diminishing returns.

    Science.gov (United States)

    Kubanek, Jan

    2017-08-08

    How individuals make decisions has been a matter of long-standing debate among economists and researchers in the life sciences. In economics, subjects are viewed as optimal decision makers who maximize their overall reward income. This framework has been widely influential, but requires a complete knowledge of the reward contingencies associated with a given choice situation. Psychologists and ecologists have observed that individuals tend to use a simpler "matching" strategy, distributing their behavior in proportion to relative rewards associated with their options. This article demonstrates that the two dominant frameworks of choice behavior are linked through the law of diminishing returns. The relatively simple matching can in fact provide maximal reward when the rewards associated with decision makers' options saturate with the invested effort. Such saturating relationships between reward and effort are hallmarks of the law of diminishing returns. Given the prevalence of diminishing returns in nature and social settings, this finding can explain why humans and animals so commonly behave according to the matching law. The article underscores the importance of the law of diminishing returns in choice behavior.

  9. Bullying and victimization in elementary schools : A comparison of bullies, victims, bully/victims, and uninvolved preadolescents

    NARCIS (Netherlands)

    Veenstra, René; Lindenberg, Siegwart; Oldehinkel, Albertine J.; Winter, Andrea F. de; Verhulst, Frank C.; Ormel, Johan

    Research on bullying and victimization largely rests on univariate analyses and on reports from a single informant. Researchers may thus know too little about the simultaneous effects of various independent and dependent variables, and their research may be biased by shared method variance. The

  10. A latent class analysis of bullies, victims and aggressive victims in Chinese adolescence: relations with social and school adjustments.

    Directory of Open Access Journals (Sweden)

    Aihui Shao

    Full Text Available This study used the latent class analysis (LCA to identify and classify Chinese adolescent children's aggressive behaviors. It was found that (1 Adolescent children could be divided into four categories: general children, aggressive children, victimized children and aggressive victimized children. (2 There were significant gender differences among the aggressive victimized children, the aggressive children and the general children. Specifically, aggressive victimized children and aggressive children had greater probabilities of being boys; victimized children had equal probabilities of being boys or girls. (3 Significant differences in loneliness, depression, anxiety and academic achievement existed among the aggressive victims, the aggressor, the victims and the general children, in which the aggressive victims scored the worst in all questionnaires. (4 As protective factors, peer and teacher supports had important influences on children's aggressive and victimized behaviors. Relative to general children, aggressive victims, aggressive children and victimized children had lower probabilities of receiving peer supports. On the other hand, compared to general children, aggressive victims had lower probabilities of receiving teacher supports; while significant differences in the probability of receiving teacher supports did not exist between aggressive children and victimized children.

  11. Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization

    OpenAIRE

    Erdinc Ozturk; Gizem Akcan

    2016-01-01

    Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students w...

  12. The Victim Handling Model of Human Trafficking Through Economic Independence

    OpenAIRE

    Nuraeny, Henny; Utami, Tanti Kirana

    2016-01-01

    Human Trafficking is a modern trading of human slavery. Human Trafficking is also one of the worst forms of violation of human dignity that results in trauma to the victims. To that end, there should be a comprehensive treatment for victims. The problems that can be studied is whether a model that can be applied in the treatment of victims of trafficking in Cianjur and disseminating technical how models Handling of Victims of Human Trafficking in Cianjur. This study used normative juridical a...

  13. Corporate Governance and Equity Returns

    OpenAIRE

    Uchida, Shigeru

    2012-01-01

    This paper analyses the relationship between corporate governance and equity returns from the small investors view point. A primary survey has been conducted to gather the data required to examine the link. Preliminary result of the study shows that the four elements of governance: board structure, transparency, fairness and responsibility are positively related with equity returns.

  14. Bipartite Bell Inequality and Maximal Violation

    International Nuclear Information System (INIS)

    Li Ming; Fei Shaoming; Li-Jost Xian-Qing

    2011-01-01

    We present new bell inequalities for arbitrary dimensional bipartite quantum systems. The maximal violation of the inequalities is computed. The Bell inequality is capable of detecting quantum entanglement of both pure and mixed quantum states more effectively. (general)

  15. HEALTH INSURANCE: CONTRIBUTIONS AND REIMBURSEMENT MAXIMAL

    CERN Document Server

    HR Division

    2000-01-01

    Affected by both the salary adjustment index on 1.1.2000 and the evolution of the staff members and fellows population, the average reference salary, which is used as an index for fixed contributions and reimbursement maximal, has changed significantly. An adjustment of the amounts of the reimbursement maximal and the fixed contributions is therefore necessary, as from 1 January 2000.Reimbursement maximalThe revised reimbursement maximal will appear on the leaflet summarising the benefits for the year 2000, which will soon be available from the divisional secretariats and from the AUSTRIA office at CERN.Fixed contributionsThe fixed contributions, applicable to some categories of voluntarily insured persons, are set as follows (amounts in CHF for monthly contributions):voluntarily insured member of the personnel, with complete coverage:815,- (was 803,- in 1999)voluntarily insured member of the personnel, with reduced coverage:407,- (was 402,- in 1999)voluntarily insured no longer dependent child:326,- (was 321...

  16. Maximal Inequalities for Dependent Random Variables

    DEFF Research Database (Denmark)

    Hoffmann-Jorgensen, Jorgen

    2016-01-01

    Maximal inequalities play a crucial role in many probabilistic limit theorem; for instance, the law of large numbers, the law of the iterated logarithm, the martingale limit theorem and the central limit theorem. Let X-1, X-2,... be random variables with partial sums S-k = X-1 + ... + X-k. Then a......Maximal inequalities play a crucial role in many probabilistic limit theorem; for instance, the law of large numbers, the law of the iterated logarithm, the martingale limit theorem and the central limit theorem. Let X-1, X-2,... be random variables with partial sums S-k = X-1 + ... + X......-k. Then a maximal inequality gives conditions ensuring that the maximal partial sum M-n = max(1) (...

  17. Maximizing Function through Intelligent Robot Actuator Control

    Data.gov (United States)

    National Aeronautics and Space Administration — Maximizing Function through Intelligent Robot Actuator Control Successful missions to Mars and beyond will only be possible with the support of high-performance...

  18. An ethical justification of profit maximization

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    2010-01-01

    In much of the literature on business ethics and corporate social responsibility, it is more or less taken for granted that attempts to maximize profits are inherently unethical. The purpose of this paper is to investigate whether an ethical argument can be given in support of profit maximizing...... behaviour. It is argued that some form of consequential ethics must be applied, and that both profit seeking and profit maximization can be defended from a rule-consequential point of view. It is noted, however, that the result does not apply unconditionally, but requires that certain form of profit (and...... utility) maximizing actions are ruled out, e.g., by behavioural norms or formal institutions....

  19. A definition of maximal CP-violation

    International Nuclear Information System (INIS)

    Roos, M.

    1985-01-01

    The unitary matrix of quark flavour mixing is parametrized in a general way, permitting a mathematically natural definition of maximal CP violation. Present data turn out to violate this definition by 2-3 standard deviations. (orig.)

  20. A cosmological problem for maximally symmetric supergravity

    International Nuclear Information System (INIS)

    German, G.; Ross, G.G.

    1986-01-01

    Under very general considerations it is shown that inflationary models of the universe based on maximally symmetric supergravity with flat potentials are unable to resolve the cosmological energy density (Polonyi) problem. (orig.)

  1. Insulin resistance and maximal oxygen uptake

    DEFF Research Database (Denmark)

    Seibaek, Marie; Vestergaard, Henrik; Burchardt, Hans

    2003-01-01

    BACKGROUND: Type 2 diabetes, coronary atherosclerosis, and physical fitness all correlate with insulin resistance, but the relative importance of each component is unknown. HYPOTHESIS: This study was undertaken to determine the relationship between insulin resistance, maximal oxygen uptake......, and the presence of either diabetes or ischemic heart disease. METHODS: The study population comprised 33 patients with and without diabetes and ischemic heart disease. Insulin resistance was measured by a hyperinsulinemic euglycemic clamp; maximal oxygen uptake was measured during a bicycle exercise test. RESULTS......: There was a strong correlation between maximal oxygen uptake and insulin-stimulated glucose uptake (r = 0.7, p = 0.001), and maximal oxygen uptake was the only factor of importance for determining insulin sensitivity in a model, which also included the presence of diabetes and ischemic heart disease. CONCLUSION...

  2. Maximal supergravities and the E10 model

    International Nuclear Information System (INIS)

    Kleinschmidt, Axel; Nicolai, Hermann

    2006-01-01

    The maximal rank hyperbolic Kac-Moody algebra e 10 has been conjectured to play a prominent role in the unification of duality symmetries in string and M theory. We review some recent developments supporting this conjecture

  3. Gaussian maximally multipartite-entangled states

    Science.gov (United States)

    Facchi, Paolo; Florio, Giuseppe; Lupo, Cosmo; Mancini, Stefano; Pascazio, Saverio

    2009-12-01

    We study maximally multipartite-entangled states in the context of Gaussian continuous variable quantum systems. By considering multimode Gaussian states with constrained energy, we show that perfect maximally multipartite-entangled states, which exhibit the maximum amount of bipartite entanglement for all bipartitions, only exist for systems containing n=2 or 3 modes. We further numerically investigate the structure of these states and their frustration for n≤7 .

  4. Gaussian maximally multipartite-entangled states

    International Nuclear Information System (INIS)

    Facchi, Paolo; Florio, Giuseppe; Pascazio, Saverio; Lupo, Cosmo; Mancini, Stefano

    2009-01-01

    We study maximally multipartite-entangled states in the context of Gaussian continuous variable quantum systems. By considering multimode Gaussian states with constrained energy, we show that perfect maximally multipartite-entangled states, which exhibit the maximum amount of bipartite entanglement for all bipartitions, only exist for systems containing n=2 or 3 modes. We further numerically investigate the structure of these states and their frustration for n≤7.

  5. Neutrino mass textures with maximal CP violation

    International Nuclear Information System (INIS)

    Aizawa, Ichiro; Kitabayashi, Teruyuki; Yasue, Masaki

    2005-01-01

    We show three types of neutrino mass textures, which give maximal CP violation as well as maximal atmospheric neutrino mixing. These textures are described by six real mass parameters: one specified by two complex flavor neutrino masses and two constrained ones and the others specified by three complex flavor neutrino masses. In each texture, we calculate mixing angles and masses, which are consistent with observed data, as well as Majorana CP phases

  6. Maximally Informative Observables and Categorical Perception

    OpenAIRE

    Tsiang, Elaine

    2012-01-01

    We formulate the problem of perception in the framework of information theory, and prove that categorical perception is equivalent to the existence of an observable that has the maximum possible information on the target of perception. We call such an observable maximally informative. Regardless whether categorical perception is real, maximally informative observables can form the basis of a theory of perception. We conclude with the implications of such a theory for the problem of speech per...

  7. Racial and Ethnic Stereotypes and Bullying Victimization

    Science.gov (United States)

    Peguero, Anthony A.; Williams, Lisa M.

    2013-01-01

    Bullying is a serious problem within the U.S. school system. Prior research suggests that victimization is stratified by race and ethnicity. However, few studies consider factors that may moderate this relationship. This article extends research on this topic by considering whether stereotypes moderate bullying among racial and ethnic youth. Youth…

  8. Teenagers as Victims in the Press

    Science.gov (United States)

    Andersson, Gunvor; Lundstrom, Tommy

    2007-01-01

    Research into press reporting on young people has tended to concentrate on young people as offenders. In contrast, this article focuses on press coverage of teenagers as victims. Reports in two Swedish newspapers (a morning broadsheet and an evening tabloid) were studied over a period of four months and subjected to a qualitative analysis of…

  9. Psychological distress among adolescents victims of cyberbullying

    Directory of Open Access Journals (Sweden)

    Jessica Ortega-Barón

    2017-07-01

    Full Text Available The information and communication technologies have rapidly been incorporated and expanded in our society. The age in which children and adolescents get access to electronic devices is decreasing. These devices have big advantages, but they can also be inappropriately used to molest and intimidate other children and, as a result, to cause severe psychological problems to other children. Taking this into consideration, the main objective of this study has been to describe the psychological distress shown by adolescents suffering from cyberbullying. In order to do this, the following variables were registered: depressive symptomatology, perceived stressed, isolation and life satisfaction. The initial sample was formed by 1360 adolescents. From these, 194 from 11 to 18 years old (M = 14.22, SD = 1.81 were selected according to their scores in cybervictimization (43.8 % boys. Participants were divided into three groups according to how intense their cyberbullying victimization was. These were: mild, moderated and severe. Our findings show that there were statistically significant differences between mild and severe victims. Adolescents who were severe cyberbullying victims scored higher in depressive symptomatology and perceived stress, and lower in life satisfaction compared to mild cyberbullying victims. These results and their implications are discussed in order to propose future strategies to prevent cyberbullying.

  10. Simulating Peer Support for Victims of Cyberbullying

    NARCIS (Netherlands)

    Van der Zwaan, J.M.; Dignum, M.V.; Jonker, C.M.

    2010-01-01

    This paper proposes a design for an Embodied Conversational Agent (ECA) that empowers victims of cyberbullying by simulating peer support. The anti-cyberbullying buddy helps a child to cope with negative emotions due to a cyberbullying incident and it shows the child how to deal with future

  11. Treating the Adolescent Victim-Turned-Offender.

    Science.gov (United States)

    Muster, Nori J.

    1992-01-01

    Many juvenile sex offenders are also victims of sexual abuse. Treatment primarily focuses on juvenile's criminal acts in confrontational, nonsympathetic manner. Surveyed 18 professionals in sexual abuse treatment field to assess attitudes toward juvenile sex offender treatment. Those in corrections field were greatest supporters of confrontational…

  12. The Perception of Cyberbullying in Adolescent Victims

    Science.gov (United States)

    Sevcikova, Anna; Smahel, David; Otavova, Mlada

    2012-01-01

    The goal of this study was to explore how victims of cyberbullying perceive online aggressive attacks and when they see them as harmful. Interviews were carried out with 16 cybervictimised participants aged 15-17 years. The findings showed differences in the perception of online victimisation when perpetrated by an anonymous Internet user versus…

  13. Always the victim : Israel's present wars

    NARCIS (Netherlands)

    Reinhart, T.

    2006-01-01

    In the Israeli discourse, Israel has always been the innocent victim of vicious aggression from its neighbors. This perception of reality has only intensified with its two recent wars - against the Palestinians in Gaza and against Lebanon. On this view, in both cases Israel has manifested its good

  14. The Other Victims of the Nazis.

    Science.gov (United States)

    Friedman, Ina R.

    1995-01-01

    Maintains that, 50 years after World War II, few people are aware that Jews were not the only Nazi victims. Describes Nazi persecution against Gypsies, homosexuals, blacks, political dissenters, and other groups. Contends that every new generation of students should learn about the devastating effects of prejudice. (CFR)

  15. Internet piracy and consequences for victims

    Directory of Open Access Journals (Sweden)

    Savić Miljan

    2016-01-01

    Full Text Available After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total social cost of piracy. However, there are other categories of victims, such as those whose honor was besmirched as a result of piracy, and who suffer the consequences in the form of negative emotional reactions, loss of job as well as those who subsequently commit suicide. The object of this paper is to describe the effects of internet piracy on the victims of this phenomenon, and the goal is the analysis of the various direct and indirect effects of piracy on victims and their motivation for future creation, as well as analysis of prevention measures, with special emphasis on the Republic of Serbia.

  16. Global Human Trafficking and Child Victimization.

    Science.gov (United States)

    Greenbaum, Jordan; Bodrick, Nia

    2017-12-01

    Trafficking of children for labor and sexual exploitation violates basic human rights and constitutes a major global public health problem. Pediatricians and other health care professionals may encounter victims who present with infections, injuries, posttraumatic stress disorder, suicidality, or a variety of other physical or behavioral health conditions. Preventing child trafficking, recognizing victimization, and intervening appropriately require a public health approach that incorporates rigorous research on the risk factors, health impact, and effective treatment options for child exploitation as well as implementation and evaluation of primary prevention programs. Health care professionals need training to recognize possible signs of exploitation and to intervene appropriately. They need to adopt a multidisciplinary, outward-focused approach to service provision, working with nonmedical professionals in the community to assist victims. Pediatricians also need to advocate for legislation and policies that promote child rights and victim services as well as those that address the social determinants of health, which influence the vulnerability to human trafficking. This policy statement outlines major issues regarding public policy, medical education, research, and collaboration in the area of child labor and sex trafficking and provides recommendations for future work. Copyright © 2017 by the American Academy of Pediatrics.

  17. The Adolescent Victim of Crime and Delinquency.

    Science.gov (United States)

    Flowers, R. Barri

    Child maltreatment and juvenile delinquency have both been widely studied. While statistics on the number of cases of abuse or delinquency are quite high, they are considered conservative, and estimates of actual as opposed to reported cases are much higher. There are striking parallels between adolescent victimization and adolescent antisocial…

  18. Race, Ethnicity, and Adolescent Violent Victimization.

    Science.gov (United States)

    Tillyer, Marie Skubak; Tillyer, Rob

    2016-07-01

    The risk of adolescent violent victimization in the United States varies considerably across racial and ethnic populations; it is unknown whether the sources of risk also vary by race and ethnicity. This study examined the correlates of violent victimization for White, Black, and Hispanic youth. Data collected from 11,070 adolescents (51 % female, mean age = 15.04 years) during the first two waves of the National Longitudinal Study of Adolescent to Adult Health were used to estimate group-specific multilevel logistic regression models. The results indicate that male, violent offending, peer deviance, gang membership, and low self-control were significantly associated with increased odds of violent victimization for all groups. Some activities-including getting drunk, sneaking out, and unstructured socializing with peers-were risk factors for Black adolescents only; skipping school was a risk factor only for Hispanic adolescents. Although there are many similarities across groups, the findings suggest that minority adolescents are particularly vulnerable to violent victimization when they engage in some activities and minor forms of delinquency.

  19. Violence Exposure and Victimization among Rural Adolescents

    Science.gov (United States)

    Mykota, David B.; Laye, Adele

    2015-01-01

    Violence exposure is a serious public health concern for adolescents in schools today. Violence exposure can be quite severe and frequent with multiple acts of indirect and direct victimization having lasting effects on the physical, emotional, and intellectual well-being of adolescents. The purpose of the present study is to examine the rates of…

  20. [Minor Victims of Violent Acts in the Context of the Victim Reparation Law].

    Science.gov (United States)

    Hellwig, Katharina; Kröger, Christoph; Franke, Stefanie; Wehrmeyer, Matthias; Heinrichs, Nina

    2018-03-01

    A descriptive analysis of victim compensation applications for children and adolescents as well as sociodemographic and trauma-specific information concerning victims and perpetrators. We did analysis of 100 victim-compensation application files based on a self-developed category system. The files included solely interpersonal trauma, 59 % of which are type II trauma. The most frequent form is sexual violence. The perpetrators stem mostly from children’s homes or peripherals. 79 % of the victims received a diagnosis of a mental disorder, most often posttraumatic stress disorder. Sexually abused children and adolescents make up the majority of the target population in OEG-related trauma outpatient units. Such outpatient units should therefore offer a specific expertise in treating sexually abused children and adolescents.

  1. Victim derogation and victim enhancement as alternate routes to system justification.

    Science.gov (United States)

    Kay, Aaron C; Jost, John T; Young, Sean

    2005-03-01

    Abstract-Numerous studies have documented the potential for victim-blaming attributions to justify the status quo. Recent work suggests that complementary, victim-enhancing stereotypes may also increase support for existing social arrangements. We seek to reconcile these seemingly contradictory findings by proposing that victim derogation and victim enhancement are alternate routes to system justification, with the preferred route depending on the perception of a causal link between trait and outcome. Derogating "losers" (and lionizing "winners") on traits (e.g., intelligence) that are causally related to outcomes (e.g., wealth vs. poverty) serves to increase system justification, as does compensating "losers" (and downgrading "winners") on traits (e.g., physical attractiveness) that are causally unrelated to those outcomes. We provide converging evidence using system-threat and stereotype-activation paradigms.

  2. Psychological Adjustment in Bullies and Victims of School Violence

    Science.gov (United States)

    Estevez, Estefania; Murgui, Sergio; Musitu, Gonzalo

    2009-01-01

    The present study examined psychosocial adjustment in the following four groups of students: victims, bullies, bully/victims and a control group of adolescents not involved in bullying or victimization problems. Psychosocial adjustment was measured considering as indicators: level of self-esteem, depressive symptomatology, perceived stress,…

  3. Social Information Processing Mechanisms and Victimization: A Literature Review.

    Science.gov (United States)

    van Reemst, Lisa; Fischer, Tamar F C; Zwirs, Barbara W C

    2016-01-01

    The aim of the current literature review, which is based on 64 empirical studies, was to assess to what extent mechanisms of the Social Information Processing (SIP) model of Crick and Dodge (1994) are related to victimization. The reviewed studies have provided support for the relation between victimization and several social information processing mechanisms, especially the interpretation of cues and self-efficacy (as part of the response decision). The relationship between victimization and other mechanisms, such as the response generation, was only studied in a few articles. Until now research has often focused on just one step of the model, instead of attempting to measure the associations between multiple mechanisms and victimization in multivariate analyses. Such analyses would be interesting to gain more insight into the SIP model and its relationship with victimization. The few available longitudinal studies show that mechanisms both predict victimization (internal locus of control, negative self-evaluations and less assertive response selection) and are predicted by victimization (hostile attribution of intent and negative evaluations of others). Associations between victimization and SIP mechanisms vary across different types and severity of victimization (stronger in personal and severe victimization), and different populations (stronger among young victims). Practice could focus on these stronger associations and the interpretation of cues. More research is needed however, to investigate whether intervention programs that address SIP mechanisms are suitable for victimization and all relevant populations. © The Author(s) 2014.

  4. Relations among School Connectedness, Hope, Life Satisfaction, and Bully Victimization

    Science.gov (United States)

    You, Sukkyung; Furlong, Michael J.; Felix, Erika; Sharkey, Jill D.; Tanigawa, Diane; Green, Jennifer Greif

    2008-01-01

    This study investigates the role of school connectedness in mediating the relation between students' sense of hope and life satisfaction for three groups: Bullied Victims, Peer Victims, and Nonvictims. Students in grades 5 to 12 (N = 866) completed the California Bully/Victim Scale, School Connectedness Scale, Children's Hope Scale, and Students'…

  5. Secrecy and persistent problems in sexual assault victims.

    NARCIS (Netherlands)

    Ensink, B.J.; Winkel, F.W.; Berlo, van W.

    2001-01-01

    A substantial number of victims of sexual assault refrain from disclosing to others the victimizing episode and its emotional consequences. A prospective study (n = 36 rape victims reporting theirvictimization to the police) and a retrospective study (n = 33) were conducted to examine the

  6. Do Social Relationships Protect Victimized Children against Internalizing Problems?

    Science.gov (United States)

    Averdijk, Margit; Eisner, Manuel; Ribeaud, Denis

    2014-01-01

    We investigated whether social relationships protect children against the effects of victimization on internalizing problems. We used data from the Zurich Project on the Social Development of Children and Youths. Victimization at age 8 years was associated with internalizing problems at age 9 years. Victims who had siblings, warm parents, and a…

  7. Professionals' conduct as a condition for minimizing secondary victimization of the victims of spouse abuse

    Directory of Open Access Journals (Sweden)

    Ignjatović Tanja

    2009-01-01

    Full Text Available Through analysis of the 'administrative' aspects of experts' documentation kept by three services in one local community - the police station, the center for social welfare and the primary health care center, the possibility of reducing victimization of victims of partnership violence within the family is the subject of consideration. The results of the analysis point to the necessity of rationalization and standardization of recording and procedures by the professionals.

  8. Observer reactions to emotional victims of serious crimes : Stereotypes and expectancy violations

    NARCIS (Netherlands)

    Bosma, Alice; Mulder, Eva; Pemberton, Antony; Vingerhoets, Ad

    2018-01-01

    Negative observer reactions towards victims may be related to people’s expectations of the characteristics and demeanor of an ideal victim. We examined how expressed emotion, victim sex, and type of victimization influence observers’ perceptions of victim credibility, victim character, and harm. Our

  9. Revictimization of Victims Sexually Abused by Women

    Directory of Open Access Journals (Sweden)

    Małgorzata H. Kowalczyk

    2017-07-01

    Full Text Available Victims experiencing the sexual abuse are surviving not only physical injustice but above all deep traumas, which very often in different forms, are keeping them company through the entire life. Quite often at establishing different results a sex is underestimated for the perpetrator. Therefore knowing the problem of sexual abuses from a perspective of close as well as distant results is very important in the event that a woman was a perpetrator of these acts – mother, minder. In the present article based on analysis of literature, a problem of results of the sexual abuse was presented at victims which experienced these behaviours on the part of women. In order to draw up discussing the survived specificity by victims was both of sex of the trauma connected with the sexual application as well as close and distant consequences of these events in the form prime victimisation and revictimisation for figure being noticeable in the adult life of psychosexual disorders and social shortages. Amongst the consequence isolated traumatic factors are deserving the particular attention about dynamic character which are provoking the appearance of many symptoms characteristic of children which experienced the sexual violence. Recalled factors it: traumatic sexualisation of child, the betrayal, the stigmatization and the helplessness. The specificity of these factors results from the fact that they will leave distant “tracks” in the psyche and they can undergo the additional reinforcement if a woman is a perpetrator of the sexual violence. It results from frequent attitudes of “denying” towards the sexual violence applied by women. In the study they pointed also at one of possible consequences of the revictimisation process copying patterns of behaviour connected with the sexual exploitation of children in their more late life by victims is which. This process resulting from the alternating identification of the perpetrator and the victim is starting

  10. Application of Markowitz model in analysing risk and return a case study of BSE stock

    Directory of Open Access Journals (Sweden)

    Manas Pandey

    2012-03-01

    Full Text Available In this paper the optimal portfolio formation using real life data subject to two different constraint sets is attempted. It is a theoretical framework for the analysis of risk return choices. Decisions are based on the concept of efficient portfolios. Markowitz portfolio analysis gives as output an efficient frontier on which each portfolio is the highest return earning portfolio for a specified level of risk. The investors can reduce their risks and can maximize their return from the investment, The Markowitz portfolio selections were obtained by solving the portfolio optimization problems to get maximum total returns, constrained by minimum allowable risk level. Investors can get lot of information knowledge about how to invest when to invest and why to invest in the particular portfolio. It basically calculates the standard deviation and returns for each of the feasible portfolios and identifies the efficient frontier, the boundary of the feasible portfolios of increasing returns

  11. Shareholder, stakeholder-owner or broad stakeholder maximization

    OpenAIRE

    Mygind, Niels

    2004-01-01

    With reference to the discussion about shareholder versus stakeholder maximization it is argued that the normal type of maximization is in fact stakeholder-owner maxi-mization. This means maximization of the sum of the value of the shares and stake-holder benefits belonging to the dominating stakeholder-owner. Maximization of shareholder value is a special case of owner-maximization, and only under quite re-strictive assumptions shareholder maximization is larger or equal to stakeholder-owner...

  12. Decreases in the proportion of bullying victims in the classroom: Effects on the adjustment of remaining victims

    NARCIS (Netherlands)

    Garandeau, C.F.; Lee, Ihno A.; Salmivalli, Christina

    2018-01-01

    Sharing a classroom environment with other victimized peers has been shown to mitigate the adverse effects of peer victimization on children’s social and psychological adjustment. By extension, this study hypothesized that classroom reductions in the proportion of victims would be harmful for

  13. The reciprocal relationship between sexual victimization and sexual assertiveness.

    Science.gov (United States)

    Livingston, Jennifer A; Testa, Maria; VanZile-Tamsen, Carol

    2007-03-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization.

  14. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  15. Victims of crime, with special emphasis on victims of work abuse and domestic violence: Analysis of the service VDS info and victim support for 2009

    Directory of Open Access Journals (Sweden)

    Radaković Danica

    2010-01-01

    Full Text Available The aim of this paper is to present the work of the VDS info and victim support service for the period January 1st 2009 - December 31st 2009. It contains the data about victims, type and quality of assistance and support provided by the Service, and also about institutions and organizations the victims contacted before or after contacting the Service and their satisfaction with the help they received.

  16. Vacua of maximal gauged D=3 supergravities

    International Nuclear Information System (INIS)

    Fischbacher, T; Nicolai, H; Samtleben, H

    2002-01-01

    We analyse the scalar potentials of maximal gauged three-dimensional supergravities which reveal a surprisingly rich structure. In contrast to maximal supergravities in dimensions D≥4, all these theories possess a maximally supersymmetric (N=16) ground state with negative cosmological constant Λ 2 gauged theory, whose maximally supersymmetric groundstate has Λ = 0. We compute the mass spectra of bosonic and fermionic fluctuations around these vacua and identify the unitary irreducible representations of the relevant background (super)isometry groups to which they belong. In addition, we find several stationary points which are not maximally supersymmetric, and determine their complete mass spectra as well. In particular, we show that there are analogues of all stationary points found in higher dimensions, among them are de Sitter (dS) vacua in the theories with noncompact gauge groups SO(5, 3) 2 and SO(4, 4) 2 , as well as anti-de Sitter (AdS) vacua in the compact gauged theory preserving 1/4 and 1/8 of the supersymmetries. All the dS vacua have tachyonic instabilities, whereas there do exist nonsupersymmetric AdS vacua which are stable, again in contrast to the D≥4 theories

  17. Behavioral and Mental Health Correlates of Youth Stalking Victimization

    Science.gov (United States)

    Reidy, Dennis E.; Smith-Darden, Joanne P.; Kernsmith, Poco D.

    2018-01-01

    Introduction Although recognized as a public health problem, little attention has been paid to the problem of stalking among youth. Latent profile analysis was used to identify latent groups of adolescent stalking victims and their behavioral and mental health correlates. Methods A cross-sectional sample of 1,236 youths were randomly selected from 13 schools stratified by community risk level (i.e., low, moderate, and high risk) and gender. Students completed surveys assessing behavioral indicators of stalking victimization, as well as substance use, sexual behavior, dating violence, and psychiatric symptoms. Data were collected in 2013 and data analyses were performed in 2015. Results Analysis indicated the presence of a non-victim class, a minimal exposure class, and a victim class for boys and girls alike. Approximately 14% of girls and 13% of boys were in the stalking victim class. Adolescents in the victim class reported more symptoms of post-traumatic stress, mood disorder, and hopelessness, as well as more instances of alcohol use, binge drinking, and physical dating violence victimization. Girls in the victim class also reported engaging in sexting behaviors and oral sex with significantly more partners than their non-victim peers. Conclusions These findings provide valuable knowledge of the prevalence and pertinent health correlates of stalking victimization in adolescence. The data suggest a substantial proportion of adolescents are victims of stalking and are likewise at risk for a number of deleterious health outcomes. As such, this population merits further attention by prevention researchers and practitioners. PMID:27743623

  18. Child victims and poly-victims in China: are they more at-risk of family violence?

    Science.gov (United States)

    Chan, Ko Ling

    2014-11-01

    Multiple forms of violence may co-occur on a child. These may include various forms of child victimization and different types of family violence. However, evidence that child victims are more likely to witness other types of family violence has been lacking in China. Using data of a large and diverse sample of children recruited from 6 regions in China during 2009 and 2010 (N=18,341; 47% girls; mean age=15.9 years), the associations between child victimization and family violence witnessed were examined. Descriptive statistics and the associations between child victimization, demographic characteristics, and family violence witnessed were analyzed. Lifetime and preceding-year rates were 71.7% and 60.0% for any form of child victimization and 14.0% and 9.2% for poly-victimization (having four or more types of victimization), respectively. Family disadvantages (i.e., lower socio-economic status, single parents, and having more than one child in the family) were associated with child victimization and poly-victimization. Witnessing of parental intimate partner violence, elder abuse, and in-law conflict also increased the likelihood of child victimization and poly-victimization, even after the adjustment of demographic factors. Possible mechanisms for the links between family violence and child victimization are discussed. The current findings indicated the need for focusing on the whole family rather than the victim only. For example, screening for different types of family violence when child victims are identified may help early detection of other victims within the family. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. Digital poly-victimization: The increasing importance of online crime and harassment to the burden of victimization.

    Science.gov (United States)

    Hamby, Sherry; Blount, Zach; Smith, Alli; Jones, Lisa; Mitchell, Kimberly; Taylor, Elizabeth

    2018-01-01

    Many forms of victimization, including bullying and property crime, are increasingly moving online, but most studies of poly-victimization still primarily focus on in-person crime and violence. Few studies have examined the importance of incorporating technology-based victimizations for assessing the true burden of violence. The purpose of this study is to explore whether digital poly-victimization contributes to post-traumatic stress and anxiety/dysphoria symptoms after controlling for in-person poly-victimization. Given that technology use and technology-based victimization are changing rapidly, a mixed methods approach was adopted. In the first two phases, focus groups and cognitive interviews (89 total participants) were used to identify the range of digital victimization and develop the Digital Poly-Victimization Scale. In the third phase, the new measure was included in a community survey (n = 478, 57.5% female; 62.6% earning under $50,000 per year) in a rural Southern region, along with measures of in-person poly-victimization, posttraumatic stress and anxiety/dysphoria symptoms, and other outcomes and personal characteristics. A comprehensive measure of digital poly-victimization indicated that almost 3 in 4 participants (72.3%) had experienced at least one form of digital victimization. The results indicated that digital poly-victimization contributed unique variance to post-traumatic stress and anxiety/dysphoria symptoms (p Digital victimization often presents fewer risks to perpetrators and can be expected to represent an increasing share of the societal burden of violence. Future research on poly-victimization should pay more attention to the role of digital victimization.

  20. Workplace mobbing: How the victim's coping behavior influences bystander responses.

    Science.gov (United States)

    Mulder, Roelie; Bos, Arjan E R; Pouwelse, Mieneke; van Dam, Karen

    2017-01-01

    Victims of workplace mobbing show diverse coping behavior. We investigated the impact of this behavior on bystander cognitions, emotions, and helping toward the victim, integrating coping literature with attribution theory. Adult part-time university students (N = 161) working at various organizations participated in a study with a 3(Coping: approach/avoidance/neutral) × 2(Gender Victim: male/female) × 2(Gender Bystander: male/female) design. Victims showing approach (vs. avoidance) coping were considered to be more self-reliant and less responsible for the continuation of the mobbing, and they elicited less anger. Continuation responsibility and self-reliance mediated the relationship between the victim's coping behavior and bystanders' helping intentions. Female (vs. male) participants reported more sympathy for the victim and greater willingness to help, and female (vs. male) victims elicited less anger. Theoretical and practical implications of the findings are discussed.

  1. Bereaved Employee: Returning to Work

    Science.gov (United States)

    ... Work Working Through Grief About Us The Bereaved Employee: Returning to Work By Helen Fitzgerald, CT After ... One employer called a grief therapist to help employees after a co-worker reported the death of ...

  2. Total anomalous pulmonary venous return

    Science.gov (United States)

    ... pulmonary venous return, x-ray References Fraser CD, Kane LC. Congenital heart disease. In: Townsend CM Jr, ... 62. Review Date 10/17/2017 Updated by: Michael A. Chen, MD, PhD, Associate Professor of Medicine, ...

  3. The Therapeutic Efficacy of Domestic Violence Victim Interventions.

    Science.gov (United States)

    Hackett, Shannon; McWhirter, Paula T; Lesher, Susan

    2016-04-01

    A meta-analysis on domestic violence interventions was conducted to determine overall effectiveness of mental health programs involving women and children in joint treatment. These interventions were further analyzed to determine whether outcomes are differentially affected based on the outcome measure employed. To date, no meta-analyses have been published on domestic violence victim intervention efficacy. The 17 investigations that met study criteria yielded findings indicating that domestic violence interventions have a large effect size (d = .812), which decreases to a medium effect size when compared to control groups (d = .518). Effect sizes were assessed to determine whether treatment differed according to the focus of the outcome measure employed: (a) external stress (behavioral problems, aggression, or alcohol use); (b) psychological adjustment (depression, anxiety, or happiness); (c) self-concept (self-esteem, perceived competence, or internal locus of control); (d) social adjustment (popularity, loneliness, or cooperativeness); (e) family relations (mother-child relations, affection, or quality of interaction); and (f) maltreatment events (reoccurrence of violence, return to partner). Results reveal that domestic violence interventions across all outcome categories yield effects in the medium to large range for both internalized and externalized symptomatology. Implications for greater awareness and support for domestic violence treatment and programming are discussed. © The Author(s) 2015.

  4. Identification and Treatment of Human Trafficking Victims in the Emergency Department: A Case Report.

    Science.gov (United States)

    Gibbons, Patric; Stoklosa, Hanni

    2016-05-01

    Human trafficking victims experience extreme exploitation and have unique health needs, yet too often go undetected by physicians and providers in the Emergency Department (ED). We report a clinical case of human trafficking of a white, English-speaking United States citizen and discuss the features of presentation and treatment options for human trafficking victims upon presentation to the ED. A 29-year-old woman with a past medical history significant for intravenous drug abuse and recent relapse presented to the ED after a reported sexual assault. The patient was discharged that evening and returned to the ED the following day acutely suicidal. The patient divulged that she had been kidnapped and raped at gunpoint by numerous individuals as a result of a debt owed to her drug dealers. WHY SHOULD AN EMERGENCY PHYSICIAN BE AWARE OF THIS?: Many human trafficking victims present to an ED during the course of their exploitation. To that end, EDs provide one of a limited set of opportunities to intervene in the human trafficking cycle of exploitation, and physicians as well as other ED staff should be equipped to respond. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. Return Migration and Working Choices

    OpenAIRE

    TANI, Massimiliano; MAHUTEAU, Stéphane

    2008-01-01

    Collective Action to Support the Reintegration of Return Migrants in their Country of Origin (MIREM) This paper uses the recent survey carried out in the framework of the MIREM project on returnees to Algeria, Morocco and Tunisia and studies the duration of emigration and the labour force status upon returning. The results suggest that age and the year of emigration play a central role in the migration decision, but they do not support the hypothesis that the duration of migration is deter...

  6. Capital Structure and Stock Returns

    OpenAIRE

    Ivo Welch

    2002-01-01

    U.S. corporations do not issue and repurchase debt and equity to counteract the mechanistic effects of stock returns on their debt-equity ratios. Thus over one- to five-year horizons, stock returns can explain about 40 percent of debt ratio dynamics. Although corporate net issuing activity is lively and although it can explain 60 percent of debt ratio dynamics (long-term debt issuing activity being most capital structurerelevant), corporate issuing motives remain largely a mystery. When stock...

  7. [Organising a successful return home].

    Science.gov (United States)

    Mézière, Anthony

    Discharge from hospital is a major component of the quality and efficiency of the healthcare system. The failures of the return home of elderly people testify to the difficulties of applying guidelines in the area of hospital discharge. The action plan decided in the hospital for a successful return home can be jeopardised for personal, relational, functional and structural reasons originating from the different players involved in the hospital discharge. Copyright © 2018 Elsevier Masson SAS. All rights reserved.

  8. An information maximization model of eye movements

    Science.gov (United States)

    Renninger, Laura Walker; Coughlan, James; Verghese, Preeti; Malik, Jitendra

    2005-01-01

    We propose a sequential information maximization model as a general strategy for programming eye movements. The model reconstructs high-resolution visual information from a sequence of fixations, taking into account the fall-off in resolution from the fovea to the periphery. From this framework we get a simple rule for predicting fixation sequences: after each fixation, fixate next at the location that minimizes uncertainty (maximizes information) about the stimulus. By comparing our model performance to human eye movement data and to predictions from a saliency and random model, we demonstrate that our model is best at predicting fixation locations. Modeling additional biological constraints will improve the prediction of fixation sequences. Our results suggest that information maximization is a useful principle for programming eye movements.

  9. Utility Maximization in Nonconvex Wireless Systems

    CERN Document Server

    Brehmer, Johannes

    2012-01-01

    This monograph formulates a framework for modeling and solving utility maximization problems in nonconvex wireless systems. First, a model for utility optimization in wireless systems is defined. The model is general enough to encompass a wide array of system configurations and performance objectives. Based on the general model, a set of methods for solving utility maximization problems is developed. The development is based on a careful examination of the properties that are required for the application of each method. The focus is on problems whose initial formulation does not allow for a solution by standard convex methods. Solution approaches that take into account the nonconvexities inherent to wireless systems are discussed in detail. The monograph concludes with two case studies that demonstrate the application of the proposed framework to utility maximization in multi-antenna broadcast channels.

  10. Maximizing band gaps in plate structures

    DEFF Research Database (Denmark)

    Halkjær, Søren; Sigmund, Ole; Jensen, Jakob Søndergaard

    2006-01-01

    periodic plate using Bloch theory, which conveniently reduces the maximization problem to that of a single base cell. Secondly, we construct a finite periodic plate using a number of the optimized base cells in a postprocessed version. The dynamic properties of the finite plate are investigated......Band gaps, i.e., frequency ranges in which waves cannot propagate, can be found in elastic structures for which there is a certain periodic modulation of the material properties or structure. In this paper, we maximize the band gap size for bending waves in a Mindlin plate. We analyze an infinite...... theoretically and experimentally and the issue of finite size effects is addressed....

  11. Singularity Structure of Maximally Supersymmetric Scattering Amplitudes

    DEFF Research Database (Denmark)

    Arkani-Hamed, Nima; Bourjaily, Jacob L.; Cachazo, Freddy

    2014-01-01

    We present evidence that loop amplitudes in maximally supersymmetric (N=4) Yang-Mills theory (SYM) beyond the planar limit share some of the remarkable structures of the planar theory. In particular, we show that through two loops, the four-particle amplitude in full N=4 SYM has only logarithmic ...... singularities and is free of any poles at infinity—properties closely related to uniform transcendentality and the UV finiteness of the theory. We also briefly comment on implications for maximal (N=8) supergravity theory (SUGRA)....

  12. Learning curves for mutual information maximization

    International Nuclear Information System (INIS)

    Urbanczik, R.

    2003-01-01

    An unsupervised learning procedure based on maximizing the mutual information between the outputs of two networks receiving different but statistically dependent inputs is analyzed [S. Becker and G. Hinton, Nature (London) 355, 161 (1992)]. For a generic data model, I show that in the large sample limit the structure in the data is recognized by mutual information maximization. For a more restricted model, where the networks are similar to perceptrons, I calculate the learning curves for zero-temperature Gibbs learning. These show that convergence can be rather slow, and a way of regularizing the procedure is considered

  13. Finding Maximal Pairs with Bounded Gap

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Lyngsø, Rune B.; Pedersen, Christian N. S.

    1999-01-01

    . In this paper we present methods for finding all maximal pairs under various constraints on the gap. In a string of length n we can find all maximal pairs with gap in an upper and lower bounded interval in time O(n log n+z) where z is the number of reported pairs. If the upper bound is removed the time reduces...... to O(n+z). Since a tandem repeat is a pair where the gap is zero, our methods can be seen as a generalization of finding tandem repeats. The running time of our methods equals the running time of well known methods for finding tandem repeats....

  14. Perception of secondary victimization in gender violence

    Directory of Open Access Journals (Sweden)

    María Aranda López

    2014-08-01

    Full Text Available Gender violence is a complex phenomenon that does not end with the removal of the abuser, as the abused person can experience secondary victimization. This study examined this process in a sample of 38 battered women. A multicausal approach was used to assess satisfaction with health system, the police, and the judiciary. The study also assessed the role of two variables that have remained unaddressed: family support and perceived danger. The results indicate that dissatisfaction with judicial treatment and legal action plays a key role in the perception of secondary victimization. It was also found that women who perceive less risk value the judicial system more because they do not need the system to take protective measures or other measures for them. Moreover, women who receive family support are more satisfied with the police system.

  15. ASD and PTSD in Rape Victims

    DEFF Research Database (Denmark)

    Elklit, Ask; Christiansen, Dorte M

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims...... shortly after the rape or attempted rape. The PTSD diagnosis based solely on the three core symptom clusters was best identified by a subclinical ASD diagnosis based on all ASD criteria except dissociation. However, a full PTSD diagnosis including the A2 and F criteria was best identified by classifying...... on ASD severity and sexual problems following the rape accounted for only 28% of the PTSD severity variance. In conclusion, the ASD diagnosis is not an optimal method for identifying those most at risk for PTSD. It remains to be seen whether a better way can be found....

  16. Maladaptive schemas as mediators of the relationship between previous victimizations in the family and dating violence victimization in adolescents.

    Science.gov (United States)

    Calvete, Esther; Gámez-Guadix, Manuel; Fernández-Gonzalez, Liria; Orue, Izaskun; Borrajo, Erika

    2018-07-01

    This study examined whether exposure to family violence, both in the form of direct victimization and witnessing violence, predicted dating violence victimization in adolescents through maladaptive schemas. A sample of 933 adolescents (445 boys and 488 girls), aged between 13 and 18 (M = 15.10), participated in a three-year longitudinal study. They completed measures of exposure to family violence, maladaptive schemas of disconnection/rejection, and dating violence victimization. The findings indicate that witnessing family violence predicts the increase of dating violence victimization over time, through the mediation of maladaptive schemas in girls, but not in boys. Direct victimization in the family predicts dating violence victimization directly, without the mediation of schemas. In addition, maladaptive schemas contribute to the perpetuation of dating violence victimization over time. These findings provide new opportunities for preventive interventions, as maladaptive schemas can be modified. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Nurturer, Victim, Seductress: Gendered Roles in Terrorism

    Science.gov (United States)

    2018-04-20

    Becomes Her: The Changing Roles of Women’s Role in Terror." Georgetown Journal of International Affairs, Winter/Spring 2010: 91-98. ———. Dying to Kill...ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION . REPORT NUMBER Joint Forces Staff College Joint Advanced Warflghting School 7800 Hampton Blvd...STAFF COLLEGE JOINT ADVANCED WARFIGHTING SCHOOL Nurturer, Victim, Seductress: Gendered Roles in

  18. Internet piracy and consequences for victims

    OpenAIRE

    Savić Miljan; Petrović Nikola M.

    2016-01-01

    After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total...

  19. A TODAY VICTIM OF SECOND WORLD WAR.

    Science.gov (United States)

    Hăisan, Anca; Dumea, Mihaela; Ursaru, Manuela; Bulat, C; Cimpoeşu, Diana Carmen

    2015-01-01

    Emergency medicine as a medical specialty has to deal with all kind of emergency situations, from medical to post traumatic acute eyents and from new born to the elderly persons, but also with particular situations like explosions. In Romania nowadays these are accidental explosions and rare like frequency, but may be dramatic due to numbers of victims and multisystem injury that may occur. We present a case of a single victim of accidental detonated bomb, a projectile from the Second World War, which unfortunately still may be found in some areas. The management of the case from first call to 112 until the victim is discharge-involves high professional team work. We use these opportunity to make a brief review of the mechanism through the lesions may appear and also to renew the fact that the most impressive lesion may not be the most severe, and we have to examine carefully in order to find the real life threatening injury of the patient.

  20. Parenting behavior and the risk of becoming a victim and a bully/victim: a meta-analysis study.

    Science.gov (United States)

    Lereya, Suzet Tanya; Samara, Muthanna; Wolke, Dieter

    2013-12-01

    Being bullied has adverse effects on children's health. Children's family experiences and parenting behavior before entering school help shape their capacity to adapt and cope at school and have an impact on children's peer relationship, hence it is important to identify how parenting styles and parent-child relationship are related to victimization in order to develop intervention programs to prevent or mitigate victimization in childhood and adolescence. We conducted a systematic review of the published literature on parenting behavior and peer victimization using MEDLINE, PsychINFO, Eric and EMBASE from 1970 through the end of December 2012. We included prospective cohort studies and cross-sectional studies that investigated the association between parenting behavior and peer victimization. Both victims and those who both bully and are victims (bully/victims) were more likely to be exposed to negative parenting behavior including abuse and neglect and maladaptive parenting. The effects were generally small to moderate for victims (Hedge's g range: 0.10-0.31) but moderate for bully/victims (0.13-0.68). Positive parenting behavior including good communication of parents with the child, warm and affectionate relationship, parental involvement and support, and parental supervision were protective against peer victimization. The protective effects were generally small to moderate for both victims (Hedge's g: range: -0.12 to -0.22) and bully/victims (-0.17 to -0.42). Negative parenting behavior is related to a moderate increase of risk for becoming a bully/victim and small to moderate effects on victim status at school. Intervention programs against bullying should extend their focus beyond schools to include families and start before children enter school. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Victim support services in England, Wales and Northern Ireland

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2002-01-01

    Full Text Available In the paper, authors tried to present activities of one of the oldest European Victim Support Services - Victim Support for England, Wales and Northern Ireland. During 1970s, through practice and research projects, the need for recognizing the physical and psychological status of victims after the crime was committed, as well as the need of providing them with the (informal assistance and support were noticed. That has resulted in establishing numerous of local victim support services (schemes, which united in the National Association of the Victim Support Services in 1979. Significant support was given to the Service in 1980s through the recommendations of the Council of Europe on the assistance for victims of crime and prevention of victimization through direct support given to the victim immediately after the incident, including protection and safety, medical, mental, social and financial support, as well as providing the victim with information on his/her rights, support during the criminal proceeding, assistance in getting compensation etc. Organization and structure of the service, referral system, code of practice and two main programs: Victim Service and Witness Service are reviewed in the paper.

  2. Network Exposure and Homicide Victimization in an African American Community

    Science.gov (United States)

    Wildeman, Christopher

    2014-01-01

    Objectives. We estimated the association of an individual’s exposure to homicide in a social network and the risk of individual homicide victimization across a high-crime African American community. Methods. Combining 5 years of homicide and police records, we analyzed a network of 3718 high-risk individuals that was created by instances of co-offending. We used logistic regression to model the odds of being a gunshot homicide victim by individual characteristics, network position, and indirect exposure to homicide. Results. Forty-one percent of all gun homicides occurred within a network component containing less than 4% of the neighborhood’s population. Network-level indicators reduced the association between individual risk factors and homicide victimization and improved the overall prediction of individual victimization. Network exposure to homicide was strongly associated with victimization: the closer one is to a homicide victim, the greater the risk of victimization. Regression models show that exposure diminished with social distance: each social tie removed from a homicide victim decreased one’s odds of being a homicide victim by 57%. Conclusions. Risk of homicide in urban areas is even more highly concentrated than previously thought. We found that most of the risk of gun violence was concentrated in networks of identifiable individuals. Understanding these networks may improve prediction of individual homicide victimization within disadvantaged communities. PMID:24228655

  3. Alcohol Involvement in Homicide Victimization in the U.S

    Science.gov (United States)

    Naimi, Timothy S.; Xuan, Ziming; Cooper, Susanna E.; Coleman, Sharon M.; Hadland, Scott E.; Swahn, Monica H.; Heeren, Timothy C.

    2016-01-01

    Background Although the association between alcohol and homicide is well documented, there has been no recent study of alcohol involvement in homicide victimization in U.S. states. The objective of this paper was to determine the prevalence of alcohol involvement in homicide victimization and identify socio-demographic and other factors associated with alcohol involvement in homicide victimization. Methods Data from homicide victims with a reported blood alcohol content (BAC) level were analyzed from 17 states from 2010–12 using the National Violent Death Reporting System. Logistic regression was used to investigate factors associated with the odds of homicide victims having a BAC ≥0.08%. Results Among all homicide victims, 39.9% had a positive BAC including 13.7% with a BAC between 0.01%–0.79% and 26.2% of victims with a BAC ≥0.08%. Males were twice as likely as females to have a BAC ≥0.08% (29.1% vs. 15.2%; p homicide victims having a BAC ≥0.08 included male sex, American Indian/Alaska Native race, Hispanic ethnicity, history of intimate partner violence, and non-firearm homicides. Conclusions Alcohol is present in a substantial proportion of homicide victims in the U.S., with substantial variation by state, demographic and circumstantial characteristics. Future studies should explore the relationships between state-level alcohol policies and alcohol-involvement among perpetrators and victims of homicide. PMID:27676334

  4. Childhood victimization experiences of young adults in St. Petersburg, Russia.

    Science.gov (United States)

    Bogolyubova, Olga; Skochilov, Roman; Smykalo, Lyubov

    2015-04-01

    The purpose of this study was to assess the prevalence of childhood victimization experiences in a sample of young adults in St. Petersburg, Russia. The study sample included 743 students aged 19 to 25 from 15 universities in St. Petersburg, Russia. All of the study participants completed a reliable questionnaire assessing the following types of childhood victimization: conventional crime, child maltreatment, peer victimization, sexual victimization, and witnessing violence. Participation in the study was anonymous. High rates of victimization and exposure to violence were reported by the study participants. The majority of the sample experienced at least one type of victimization during childhood or adolescence, and poly-victimization was reported frequently. The most common type of victimization reported was peer or sibling assault (66.94%), followed by witnessing an assault without weapon (63.91%), personal theft (56.19%), vandalism (56.06%), and emotional bullying (49.99%). Sexual assault by a known adult was reported by 1.45% males and 5.16% of females. This study provides new information on the scope of childhood victimization experiences in Russia. Further research is warranted, including epidemiological research with representative data across the country and studies of the impact of trauma and victimization on mental health and well-being of Russian adults and children. © The Author(s) 2014.

  5. Maximizing the Range of a Projectile.

    Science.gov (United States)

    Brown, Ronald A.

    1992-01-01

    Discusses solutions to the problem of maximizing the range of a projectile. Presents three references that solve the problem with and without the use of calculus. Offers a fourth solution suitable for introductory physics courses that relies more on trigonometry and the geometry of the problem. (MDH)

  6. Robust Utility Maximization Under Convex Portfolio Constraints

    International Nuclear Information System (INIS)

    Matoussi, Anis; Mezghani, Hanen; Mnif, Mohamed

    2015-01-01

    We study a robust maximization problem from terminal wealth and consumption under a convex constraints on the portfolio. We state the existence and the uniqueness of the consumption–investment strategy by studying the associated quadratic backward stochastic differential equation. We characterize the optimal control by using the duality method and deriving a dynamic maximum principle

  7. Ehrenfest's Lottery--Time and Entropy Maximization

    Science.gov (United States)

    Ashbaugh, Henry S.

    2010-01-01

    Successful teaching of the Second Law of Thermodynamics suffers from limited simple examples linking equilibrium to entropy maximization. I describe a thought experiment connecting entropy to a lottery that mixes marbles amongst a collection of urns. This mixing obeys diffusion-like dynamics. Equilibrium is achieved when the marble distribution is…

  8. Reserve design to maximize species persistence

    Science.gov (United States)

    Robert G. Haight; Laurel E. Travis

    2008-01-01

    We develop a reserve design strategy to maximize the probability of species persistence predicted by a stochastic, individual-based, metapopulation model. Because the population model does not fit exact optimization procedures, our strategy involves deriving promising solutions from theory, obtaining promising solutions from a simulation optimization heuristic, and...

  9. Maximal indecomposable past sets and event horizons

    International Nuclear Information System (INIS)

    Krolak, A.

    1984-01-01

    The existence of maximal indecomposable past sets MIPs is demonstrated using the Kuratowski-Zorn lemma. A criterion for the existence of an absolute event horizon in space-time is given in terms of MIPs and a relation to black hole event horizon is shown. (author)

  10. Maximization of eigenvalues using topology optimization

    DEFF Research Database (Denmark)

    Pedersen, Niels Leergaard

    2000-01-01

    to localized modes in low density areas. The topology optimization problem is formulated using the SIMP method. Special attention is paid to a numerical method for removing localized eigenmodes in low density areas. The method is applied to numerical examples of maximizing the first eigenfrequency, One example...

  11. Maximizing Resource Utilization in Video Streaming Systems

    Science.gov (United States)

    Alsmirat, Mohammad Abdullah

    2013-01-01

    Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…

  12. A THEORY OF MAXIMIZING SENSORY INFORMATION

    NARCIS (Netherlands)

    Hateren, J.H. van

    1992-01-01

    A theory is developed on the assumption that early sensory processing aims at maximizing the information rate in the channels connecting the sensory system to more central parts of the brain, where it is assumed that these channels are noisy and have a limited dynamic range. Given a stimulus power

  13. Maximizing scientific knowledge from randomized clinical trials

    DEFF Research Database (Denmark)

    Gustafsson, Finn; Atar, Dan; Pitt, Bertram

    2010-01-01

    Trialists have an ethical and financial responsibility to plan and conduct clinical trials in a manner that will maximize the scientific knowledge gained from the trial. However, the amount of scientific information generated by randomized clinical trials in cardiovascular medicine is highly vari...

  14. A Model of College Tuition Maximization

    Science.gov (United States)

    Bosshardt, Donald I.; Lichtenstein, Larry; Zaporowski, Mark P.

    2009-01-01

    This paper develops a series of models for optimal tuition pricing for private colleges and universities. The university is assumed to be a profit maximizing, price discriminating monopolist. The enrollment decision of student's is stochastic in nature. The university offers an effective tuition rate, comprised of stipulated tuition less financial…

  15. Logit Analysis for Profit Maximizing Loan Classification

    OpenAIRE

    Watt, David L.; Mortensen, Timothy L.; Leistritz, F. Larry

    1988-01-01

    Lending criteria and loan classification methods are developed. Rating system breaking points are analyzed to present a method to maximize loan revenues. Financial characteristics of farmers are used as determinants of delinquency in a multivariate logistic model. Results indicate that debt-to-asset and operating ration are most indicative of default.

  16. The Association Between Familial Homelessness, Aggression, and Victimization Among Children.

    Science.gov (United States)

    Jetelina, Katelyn K; Reingle Gonzalez, Jennifer M; Cuccaro, Paula M; Peskin, Melissa F; Elliott, Marc N; Coker, Tumaini R; Mrug, Sylvie; Davies, Susan L; Schuster, Mark A

    2016-12-01

    The purpose of this study was to evaluate the relationship between the number of periods children were exposed to familial homelessness and childhood aggression and victimization. Survey data were obtained from 4,297 fifth-grade children and their caregivers in three U.S. cities. Children and primary caregivers were surveyed longitudinally in 7th and 10th grades. Family homelessness, measured at each wave as unstable housing, was self-reported by the caregiver. Children were categorized into four mutually exclusive groups: victim only, aggressor only, victim-aggressor, and neither victim nor aggressor at each time point using validated measures. Multinomial, multilevel mixed models were used to evaluate the relationship among periods of homelessness and longitudinal victimization, aggression, and victim aggression compared to children who were nonvictims and nonaggressors. Results suggest that children who experienced family homelessness were more likely than domiciled children to report aggression and victim aggression but not victimization only. Multivariate analyses suggested that even brief periods of homelessness were positively associated with aggression and victim aggression (relative to neither) compared to children who were never homeless. Furthermore, childhood victimization and victim aggression significantly decreased from 5th grade to 10th grade while aggression significantly increased in 10th grade. Children who experienced family homelessness for brief periods of time were significantly more likely to be a victim-aggressor or aggressor compared to those who were never homeless. Prevention efforts should target housing security and other important factors that may reduce children's likelihood of aggression and associated victimization. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. Victimization by Siblings in Children with Disability or Weight Problems.

    Science.gov (United States)

    Tucker, Corinna J; Finkelhor, David; Turner, Heather

    Children with a physical disability, psychological disorder, or of nonnormative weight are often targets of peer victimization. Sibling victimization, however, is more common than peer victimization, but rarely explored. We investigated linkages between sibling victimization and whether children had a physical disability, psychological disorder (i.e., internalizing disorder, attention deficit disorder/attention-deficit hyperactivity disorder), and were perceived by parents as being thinner than average or overweight. Also, we explored how the extent and kinds of sibling victimization experiences were related to these characteristics in childhood. A US probability sample of adult caregivers of a child aged 0 to 9 (N = 780; 50% women; mean age 4.58) in 2-child households who completed a telephone interview. Controlling for other forms of maltreatment and individual and family characteristics, children with a physical disability and parent-perceived children who are thinner than average and children who are overweight experienced more sibling victimization. Children with an internalizing disorder experienced less sibling victimization. Sibling victimization did not differ for children with and without ADHD. Children perceived to be overweight by parents and children with a physical disability were at increased risk of experiencing more types of sibling victimization. Children with a physical disability had greater odds of being victims of property victimization by a sibling. Children with a physical disability or perceived as different from average weight are at risk for sibling victimization. Using a nationally representative sample, this is the first study to highlight the importance of screening for sibling victimization in families of children with a disability and/or nonnormative weight status.

  18. Family as a factor of risk prevention and victim behaviour

    Directory of Open Access Journals (Sweden)

    Artur A. Rean

    2015-03-01

    Full Text Available The paper examines psychological factors victim behaviour. The definition of victim behaviour is given and it is emphasized that such conduct is not necessarily passivebehaviour of the victim. Victimization and behaviour can be active and aggressive. It is shown that antisocial, deviant behaviour of children and adolescents seriously increases the risk of victimization. Family as the most important institution of socialization is considered both as a preventing factor and risk factor of victim behaviour. The role of the family in shaping the victim behaviour is revealed in the following issues: aggressive, conflict behaviour is personal inclination or absence of the “proper” skills; interdependence of the severity of punishment and child aggression; punishment for child aggression (between siblings: what is the result?; ignoring aggression – is it the best solution?; victims of sexual violence and causes of victim behaviour; demonstrative accentuation as a risk factor in rape victim behaviour; happy family – can it be a risk factor for victim behaviour? For a long time, social deviant personality development has been believed to deal with structural deformation of the family, which is defined as a single-parent family, i.e. absence of one parent (usually the father. It is now proved that the major factor of family negative impact on personal development is not structural but psychosocial family deformation. A really happy family, psychologically happy family is the cornerstone of preventing victim behaviour. The victim behaviour being mainly determined by personal qualities does not negate this conclusion, but only strengthens it, as the qualities mentioned above are shaped in many respects within family socialization, are determined by family upbringing styles and features of interpersonal relationships inside the family.

  19. Developing maximal neuromuscular power: Part 1--biological basis of maximal power production.

    Science.gov (United States)

    Cormie, Prue; McGuigan, Michael R; Newton, Robert U

    2011-01-01

    This series of reviews focuses on the most important neuromuscular function in many sport performances, the ability to generate maximal muscular power. Part 1 focuses on the factors that affect maximal power production, while part 2, which will follow in a forthcoming edition of Sports Medicine, explores the practical application of these findings by reviewing the scientific literature relevant to the development of training programmes that most effectively enhance maximal power production. The ability of the neuromuscular system to generate maximal power is affected by a range of interrelated factors. Maximal muscular power is defined and limited by the force-velocity relationship and affected by the length-tension relationship. The ability to generate maximal power is influenced by the type of muscle action involved and, in particular, the time available to develop force, storage and utilization of elastic energy, interactions of contractile and elastic elements, potentiation of contractile and elastic filaments as well as stretch reflexes. Furthermore, maximal power production is influenced by morphological factors including fibre type contribution to whole muscle area, muscle architectural features and tendon properties as well as neural factors including motor unit recruitment, firing frequency, synchronization and inter-muscular coordination. In addition, acute changes in the muscle environment (i.e. alterations resulting from fatigue, changes in hormone milieu and muscle temperature) impact the ability to generate maximal power. Resistance training has been shown to impact each of these neuromuscular factors in quite specific ways. Therefore, an understanding of the biological basis of maximal power production is essential for developing training programmes that effectively enhance maximal power production in the human.

  20. Understanding Violations of Gricean Maxims in Preschoolers and Adults

    Directory of Open Access Journals (Sweden)

    Mako eOkanda

    2015-07-01

    Full Text Available This study used a revised Conversational Violations Test to examine Gricean maxim violations in 4- to 6-year-old Japanese children and adults. Participants’ understanding of the following maxims was assessed: be informative (first maxim of quantity, avoid redundancy (second maxim of quantity, be truthful (maxim of quality, be relevant (maxim of relation, avoid ambiguity (second maxim of manner, and be polite (maxim of politeness. Sensitivity to violations of Gricean maxims increased with age: 4-year-olds’ understanding of maxims was near chance, 5-year-olds understood some maxims (first maxim of quantity and maxims of quality, relation, and manner, and 6-year-olds and adults understood all maxims. Preschoolers acquired the maxim of relation first and had the greatest difficulty understanding the second maxim of quantity. Children and adults differed in their comprehension of the maxim of politeness. The development of the pragmatic understanding of Gricean maxims and implications for the construction of developmental tasks from early childhood to adulthood are discussed.

  1. Sealed Planetary Return Canister (SPRC), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Sample return missions have primary importance in future planetary missions. A basic requirement is that samples be returned in pristine, uncontaminated condition,...

  2. Impact of sexual harassment victimization by peers on subsequent adolescent victimization and adjustment: a longitudinal study.

    Science.gov (United States)

    Chiodo, Debbie; Wolfe, David A; Crooks, Claire; Hughes, Ray; Jaffe, Peter

    2009-09-01

    To examine gender differences in prevalence and types of sexual harassment victimization experienced in grade 9 and how it contributes to relationship victimization and psychological adjustment 2.5 years later. A total of 1734 students from 23 schools completed self-report surveys at entry to grade 9 and end of grade 11. Self-report data were collected on victimization experiences (sexual harassment, physical dating violence, peer violence, and relational victimization) and adjustment (emotional distress, problem substance use, self-harm, suicidal thoughts, maladaptive dieting, feeling unsafe at school, and perpetration of violent delinquency). Separate analyses by sex were prespecified. Sexual harassment victimization was common among boys (42.4%) and girls (44.1%) in grade 9, with girls reporting more sexual jokes, comments, and unwanted touch than among boys, and with boys reporting more homosexual slurs or receiving unwanted sexual content. For girls, sexual harassment victimization in grade 9 was associated with elevated risk of self-harm, suicidal thoughts, maladaptive dieting, early dating, substance use, and feeling unsafe at school. A similar pattern of risk was found for boys, with the exception of dieting and self-harm behaviors. Adjusted odds ratios (AOR) indicated these students were significantly more likely than nonharassed students to report victimization by peers and dating partners 2.5 years later (AOR for boys and girls, respectively; all p harassment (AOR: 2.45; 2.9), physical dating violence (AOR: 2.02; 3.73), and physical peer violence (AOR: 2.75; 2.79). Gr 9 sexual harassment also contributed significantly to emotional distress (AOR: 2.09; 2.24), problem substance use (AOR: 1.79; 2.04), and violent delinquency perpetration (AOR: 2.1; 3.34) 2.5 years later (boys and girls, respectively; all p harassment at the beginning of high school is a strong predictor of future victimization by peers and dating partners for both girls and boys, and

  3. Nuclear tests: the late indemnification of victims; Essais nucleaire: l'indemnisation tardive des victimes

    Energy Technology Data Exchange (ETDEWEB)

    Charbonneau, S. [Bordeaux-1 Univ., 33 (France)

    2010-04-15

    The author briefly recalls the historical context of the creation of the CEA and outlines the silence and denial about the radioactive contamination of military personnel during the nuclear tests performed in the Algerian Sahara and in Polynesia. He also outlines the continuous action of the association of veterans and victims of these nuclear tests which gathered proofs of health consequences. He comments the content and scope of application of laws which have been lately adopted (in 2010) to acknowledge these facts and indemnify the victims

  4. Abnormal Returns and Contrarian Strategies

    Directory of Open Access Journals (Sweden)

    Ivana Dall'Agnol

    2003-12-01

    Full Text Available We test the hypothesis that strategies which are long on portfolios of looser stocks and short on portfolios of winner stocks generate abnormal returns in Brazil. This type of evidence for the US stock market was interpreted by The Bondt and Thaler (1985 as reflecting systematic evaluation mistakes caused by investors overreaction to news related to the firm performance. We found evidence of contrarian strategies profitability for horizons from 3 months to 3 years in a sample of stock returns from BOVESPA and SOMA from 1986 to 2000. The strategies are more profitable for shorter horizons. Therefore, there was no trace of the momentum effect found by Jagadeesh and Titman (1993 for the same horizons with US data. There are remaing unexplained positive returns for contrarian strategies after accounting for risk, size, and liquidity. We also found that the strategy profitability is reduced after the Real Plan, which suggests that the Brazilian stock market became more efficient after inflation stabilization.

  5. Experimental and numerical investigations of microwave return loss of aircraft inlets with low-pressure plasma

    Science.gov (United States)

    Zhang, Yachun; He, Xiang; Chen, Jianping; Chen, Hongqing; Chen, Li; Zhang, Hongchao; Ni, Xiaowu; Lu, Jian; Shen, Zhonghua

    2018-03-01

    The relationships between return losses of the cylindrical inlet and plasma discharge parameters are investigated experimentally and numerically. The return losses are measured using a high dynamic range measurement system and simulated by COMSOL Multiphysics when the frequency band of the microwaves is in the range 1-4 GHz. The profiles of the plasma density are estimated using Epstein and Bessel functions. Results show that the incident microwaves can be absorbed by plasma efficaciously. The maximal return loss can reach -13.84 dB when the microwave frequency is 2.3 GHz. The increase of applied power implies augmentation of the return loss, which behaves conversely for gas pressure. The experimental and numerical results display reasonable agreement on return loss, suggesting that the use of plasma is effective in the radar cross section reduction of aircraft inlets.

  6. Task complexity and maximal isometric strength gains through motor learning

    Science.gov (United States)

    McGuire, Jessica; Green, Lara A.; Gabriel, David A.

    2014-01-01

    Abstract This study compared the effects of a simple versus complex contraction pattern on the acquisition, retention, and transfer of maximal isometric strength gains and reductions in force variability. A control group (N = 12) performed simple isometric contractions of the wrist flexors. An experimental group (N = 12) performed complex proprioceptive neuromuscular facilitation (PNF) contractions consisting of maximal isometric wrist extension immediately reversing force direction to wrist flexion within a single trial. Ten contractions were completed on three consecutive days with a retention and transfer test 2‐weeks later. For the retention test, the groups performed their assigned contraction pattern followed by a transfer test that consisted of the other contraction pattern for a cross‐over design. Both groups exhibited comparable increases in strength (20.2%, P < 0.01) and reductions in mean torque variability (26.2%, P < 0.01), which were retained and transferred. There was a decrease in the coactivation ratio (antagonist/agonist muscle activity) for both groups, which was retained and transferred (35.2%, P < 0.01). The experimental group exhibited a linear decrease in variability of the torque‐ and sEMG‐time curves, indicating transfer to the simple contraction pattern (P < 0.01). The control group underwent a decrease in variability of the torque‐ and sEMG‐time curves from the first day of training to retention, but participants returned to baseline levels during the transfer condition (P < 0.01). However, the difference between torque RMS error versus the variability in torque‐ and sEMG‐time curves suggests the demands of the complex task were transferred, but could not be achieved in a reproducible way. PMID:25428951

  7. Bullying among schoolchildren: differences between victims and aggressors.

    Science.gov (United States)

    Garcia-Continente, Xavier; Pérez-Giménez, Anna; Espelt, Albert; Nebot Adell, Manel

    2013-01-01

    To identify the factors associated with bullying behaviors among adolescents by analyzing victims, aggressors and victims/aggressors separately. A cross-sectional study was performed in a representative sample of 3,089 secondary school students (13-18 years old) in Barcelona (Spain). To define bullying behaviors, we used three questions about different types of mistreatment (jeering, attacking, marginalizing). Compared with secondary school students not involved in bullying, victims, aggressors and victims/aggressors were more likely to be boys and to report negative mood states. Victims were younger, were more overweight or obese and were lighter cannabis users, while aggressors were also younger but reported more antisocial behaviors and more cannabis and alcohol use. Victims/aggressors reported more antisocial behaviors and were overweight. Being involved in bullying, independently of the role adopted, was associated with health-related problems, which can lead to psychological disorders in adulthood. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  8. The impact of criminal justice involvement on victims' mental health.

    Science.gov (United States)

    Parsons, Jim; Bergin, Tiffany

    2010-04-01

    The aftermath of violent crime can leave victims with persistent emotional and mental health problems. Although research has shown the potential benefits of prosecuting cases through the courts, there is also a substantial literature that suggests that common features of the criminal justice system can exacerbate the impact of the initial crime, leading to a secondary victimization. The authors present a review of the research on the positive and negative impact of criminal justice involvement, and common points of failure in the efforts of justice institutions to meet the needs of victims. They conclude with recommendations for future work, including the need for research on restorative justice, victim impact statements, court notification systems, victim services, and victim advocates.

  9. Identifying victims of violence using register-based data

    DEFF Research Database (Denmark)

    Kruse, Marie; Sørensen, Jan; Brønnum-Hansen, Henrik

    2010-01-01

    AIMS: The aim of this study was twofold. Firstly we identified victims of violence in national registers and discussed strengths and weaknesses of this approach. Secondly we assessed the magnitude of violence and the characteristics of the victims using register-based data. METHODS: We used three...... nationwide registers to identify victims of violence: The National Patient Register, the Victim Statistics, and the Causes of Death Register. We merged these data and assessed the degree of overlap between data sources. We identified a reference population by selecting all individuals in Denmark over 15....... RESULTS: In 2006, 22,000 individuals were registered as having been exposed to violence. About 70% of these victims were men. Most victims were identified from emergency room contacts and police records, and few from the Causes of Death Register. There was some overlap between the two large data sources...

  10. CRIMINAL LEGAL PROTECTION OF CHILD VICTIMS AND WITNESSES OF CRIMES

    Directory of Open Access Journals (Sweden)

    Monika Mushevska

    2016-01-01

    Full Text Available The term victim indicates a natural person that underwent some kind of crime, including psychological and mental disorder, and emotional suffering or monetary loss, that were caused by accomplishing or not accomplishing a certain kind of activity that violates the law in one state. The term Victim also includes the close members of the victim’s family that depend on the victim. “Kids, victims and witnesses of crimes” indicates kids and adolescents under 18 years of age, which are victims of different kinds of crime or witnesses of different kinds of crime, in spite of the role that they have in the crime act. In all proceedings that directly or indirectly child victims involved it is important to act in a way that is the best and most appropriate for the child.

  11. Dynamic returns of beta arbitrage

    OpenAIRE

    Nascimento, Mafalda

    2017-01-01

    This thesis studies the patterns of the abnormal returns of the beta strategy. The topic can be helpful for professional investors, who intend to achieve a better performance in their portfolios. Following the methodology of Lou, Polk, & Huang (2016), the COBAR measure is computed in order to determine the levels of beta arbitrage in the market in each point in time. It is argued that beta arbitrage activity can have impact on the returns of the beta strategy. In fact, it is demonstrated that...

  12. Sovereign Risk and Currently Returns

    DEFF Research Database (Denmark)

    Della Corte, Pasquale; Sarno, Lucio; Schmeling, Maik

    We empirically investigate the relation between sovereign risk and exchange rates for a broad set of currencies. An increase in the credit default swap (CDS) spread of a country is accompanied by a significant depreciation of the exchange rate. More generally, CDS spread changes have substantial...... explanatory power for currency returns which is largely driven by shocks to global credit risk. Consistent with the notion that sovereign risk is priced, we find that a country's exposure to global credit risk forecasts excess returns to trading exchange rates as well as to trading on the volatility, skewness...

  13. Sovereign Risk and Currency Returns

    DEFF Research Database (Denmark)

    Della Corte, Pasquale; Sarno, Lucio; Schmeling, Maik

    We empirically investigate the relation between sovereign risk and exchange rates for a broad set of currencies. An increase in the credit default swap (CDS) spread of a country is accompanied by a significant depreciation of the exchange rate. More generally, CDS spread changes have substantial...... explanatory power for currency returns which is largely driven by shocks to global credit risk. Consistent with the notion that sovereign risk is priced, we find that a country's exposure to global credit risk forecasts excess returns to trading exchange rates as well as to trading on the volatility, skewness...

  14. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  15. Domestic violence and the impact on its victims

    OpenAIRE

    Kirejevová, Iva

    2010-01-01

    Domestic violence is one of the essential problems of our society. Domestic violence is determined by high prevalence, enormous latency and great victimization impact. The aim of my thesis is to describe the psychological aspects of the victims of domestic violence. I presume that long-term psychological and physical violence has a crucial influence on the psycho-somatic health of the victim. I am aware of the fact that this problem does not concern only battered women. Nevertheless I want to...

  16. A Latent Class Analysis of Victimization among Middle and High School Students in California

    Science.gov (United States)

    Berkowitz, Ruth; De Pedro, Kris Tunac; Gilreath, Tamika D.

    2015-01-01

    School victimization is associated with negative social-emotional outcomes and risky behaviors. Most studies have provided definitions and measures of victimization, depicting a limited characterization of victimization in schools. More nuanced analyses of school victimization are needed to assess the heterogeneous pattern of victimization in…

  17. Refined reservoir description to maximize oil recovery

    International Nuclear Information System (INIS)

    Flewitt, W.E.

    1975-01-01

    To assure maximized oil recovery from older pools, reservoir description has been advanced by fully integrating original open-hole logs and the recently introduced interpretive techniques made available through cased-hole wireline saturation logs. A refined reservoir description utilizing normalized original wireline porosity logs has been completed in the Judy Creek Beaverhill Lake ''A'' Pool, a reefal carbonate pool with current potential productivity of 100,000 BOPD and 188 active wells. Continuous porosity was documented within a reef rim and cap while discontinuous porous lenses characterized an interior lagoon. With the use of pulsed neutron logs and production data a separate water front and pressure response was recognized within discrete environmental units. The refined reservoir description aided in reservoir simulation model studies and quantifying pool performance. A pattern water flood has now replaced the original peripheral bottom water drive to maximize oil recovery

  18. Maximal frustration as an immunological principle.

    Science.gov (United States)

    de Abreu, F Vistulo; Mostardinha, P

    2009-03-06

    A fundamental problem in immunology is that of understanding how the immune system selects promptly which cells to kill without harming the body. This problem poses an apparent paradox. Strong reactivity against pathogens seems incompatible with perfect tolerance towards self. We propose a different view on cellular reactivity to overcome this paradox: effector functions should be seen as the outcome of cellular decisions which can be in conflict with other cells' decisions. We argue that if cellular systems are frustrated, then extensive cross-reactivity among the elements in the system can decrease the reactivity of the system as a whole and induce perfect tolerance. Using numerical and mathematical analyses, we discuss two simple models that perform optimal pathogenic detection with no autoimmunity if cells are maximally frustrated. This study strongly suggests that a principle of maximal frustration could be used to build artificial immune systems. It would be interesting to test this principle in the real adaptive immune system.

  19. Victimisation and poverty: About victims and victimised in Serbia

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2014-01-01

    Full Text Available This paper is a theoretical analysis of the scientific and public discourse of victimization on the example of Serbia. The analysis has two objectives: to review the justification for the use of the concept of victim defined in the traditional way - within the legal framework; and in relation to this, to offer a different view on victimization. The process of becoming a victim is recognized as a social construct, created as a result of negotiations between the (non- formal social structure: institutions, the media, and the audience - those who stand aside, criminals and victims. In the process, some of the victims are assigned a status of justified, while others are sacrificed. There are rearely true parallels between them. Thus, unlike justified, whose suffering is perceived by public and political structures as a cause for the introduction of penal populism, the sacrificed rarely encounter any empathy. Even when they are victimized by conventional crime, the victims do not have the power to mobilize the public in a loud protest and call for change in legal practice. In the final score, it seems that the role victims are assigned largely depend of their social scale position.

  20. Victims of educator-targeted bullying: a qualitative study

    Directory of Open Access Journals (Sweden)

    Corene de Wet

    2010-01-01

    Full Text Available I report on findings emanating from in-depth personal interviews with victims of educator-targeted bullying (ETB. Qualitative content analysis was used to analyse the narratives. The findings indicate that the victims of ETB were exposed repeatedly over time to verbal, non-verbal, psychological, and physical abuse during and after school hours. ETB had a negative influence on the victims' private lives, as well as on teaching and on learning. Lastly, I found that ETB may lead to a breakdown of relations between victims and the bullies' parents and the members of the community in which schools are situated.

  1. Commentary (Victim Participation in the International Criminal Court)

    DEFF Research Database (Denmark)

    Marchuk, Iryna

    2014-01-01

    Victim participation is one of the most innovative aspects introduced in the legal framework of the International Criminal Court (hereinafter – ICC), which has not featured in the practices of other international criminal courts and tribunals. The approach of the ad hoc tribunals to victims...... was very ‘consumer like’ because victims were solely used as witnesses to testify about the crimes attributed to the accused, but they were not granted broad participatory rights in the proceedings. The drafters of the Rome Statute acknowledged wide-ranging interests of victims who, apart from seeking...

  2. Modeling the mental health effects of victimization among homeless persons

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F.; Pollio, David

    2014-01-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults. PMID:18703266

  3. Modeling the mental health effects of victimization among homeless persons.

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F; Pollio, David

    2008-11-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults.

  4. How older persons explain why they became victims of abuse

    DEFF Research Database (Denmark)

    Mysyuk, Yuliya; Westendorp, Rudi Gerardus Johannes; Lindenberg, Jolanda

    2016-01-01

    independently, in residential care facilities and nursing homes. SUBJECTS: six males and 11 females aged 63-90 years. RESULTS: the main causes of abuse identified by older victims themselves were mutual dependency between victim and perpetrator, power and control imbalances, loneliness and a marginalised social...... with the perpetrator. Coping strategies mentioned by victims were seeking informal or professional help and using self-help strategies. CONCLUSION: older victims perceive abuse differently depending on the expected acceptability of the type(s) of abuse experienced and the anticipated stigma associated...

  5. Muslim women and foreign prostitutes: victim discourse, subjectivity, and governance.

    Science.gov (United States)

    Jacobsen, Christine M; Stenvoll, Dag

    2010-01-01

    In this article, we juxtapose the ways “Muslim women” and “foreign prostitutes” are commonly constituted as victims in media and politics. We analyze the functions of these two prototypical female victims in terms of the role they play in epitomizing “the problems of globalization” and in reinforcing the existing social and political structures. Victim discourse, when tied to the transnational proliferation of the sex industry and of (radical) Islam, has depoliticizing effects because it places nonindividual causes of victimization outside of “our” polity and society and casts the state as protector and neutral arbiter of national and global inequalities, marginalization, and social conflict.

  6. Coping and Sexual Harassment: How Victims Cope across Multiple Settings.

    Science.gov (United States)

    Scarduzio, Jennifer A; Sheff, Sarah E; Smith, Mathew

    2018-02-01

    The ways sexual harassment occurs both online and in face-to-face settings has become more complicated. Sexual harassment that occurs in cyberspace or online sexual harassment adds complexity to the experiences of victims, current research understandings, and the legal dimensions of this phenomenon. Social networking sites (SNS) are a type of social media that offer unique opportunities to users and sometimes the communication that occurs on SNS can cross the line from flirtation into online sexual harassment. Victims of sexual harassment employ communicative strategies such as coping to make sense of their experiences of sexual harassment. The current study qualitatively examined problem-focused, active emotion-focused, and passive emotion-focused coping strategies employed by sexual harassment victims across multiple settings. We conducted 26 in-depth interviews with victims that had experienced sexual harassment across multiple settings (e.g., face-to-face and SNS). The findings present 16 types of coping strategies-five problem-focused, five active emotion-focused, and six passive emotion-focused. The victims used an average of three types of coping strategies during their experiences. Theoretical implications extend research on passive emotion-focused coping strategies by discussing powerlessness and how victims blame other victims. Furthermore, theoretically the findings reveal that coping is a complex, cyclical process and that victims shift among types of coping strategies over the course of their experience. Practical implications are offered for victims and for SNS sites.

  7. Derivative pricing based on local utility maximization

    OpenAIRE

    Jan Kallsen

    2002-01-01

    This paper discusses a new approach to contingent claim valuation in general incomplete market models. We determine the neutral derivative price which occurs if investors maximize their local utility and if derivative demand and supply are balanced. We also introduce the sensitivity process of a contingent claim. This process quantifies the reliability of the neutral derivative price and it can be used to construct price bounds. Moreover, it allows to calibrate market models in order to be co...

  8. Control of Shareholders’ Wealth Maximization in Nigeria

    OpenAIRE

    A. O. Oladipupo; C. O. Okafor

    2014-01-01

    This research focuses on who controls shareholder’s wealth maximization and how does this affect firm’s performance in publicly quoted non-financial companies in Nigeria. The shareholder fund was the dependent while explanatory variables were firm size (proxied by log of turnover), retained earning (representing management control) and dividend payment (representing measure of shareholders control). The data used for this study were obtained from the Nigerian Stock Exchange [NSE] fact book an...

  9. Definable maximal discrete sets in forcing extensions

    DEFF Research Database (Denmark)

    Törnquist, Asger Dag; Schrittesser, David

    2018-01-01

    Let  be a Σ11 binary relation, and recall that a set A is -discrete if no two elements of A are related by . We show that in the Sacks and Miller forcing extensions of L there is a Δ12 maximal -discrete set. We use this to answer in the negative the main question posed in [5] by showing...

  10. Dynamic Convex Duality in Constrained Utility Maximization

    OpenAIRE

    Li, Yusong; Zheng, Harry

    2016-01-01

    In this paper, we study a constrained utility maximization problem following the convex duality approach. After formulating the primal and dual problems, we construct the necessary and sufficient conditions for both the primal and dual problems in terms of FBSDEs plus additional conditions. Such formulation then allows us to explicitly characterize the primal optimal control as a function of the adjoint process coming from the dual FBSDEs in a dynamic fashion and vice versa. Moreover, we also...

  11. Single maximal versus combination punch kinematics.

    Science.gov (United States)

    Piorkowski, Barry A; Lees, Adrian; Barton, Gabor J

    2011-03-01

    The aim of this study was to determine the influence of punch type (Jab, Cross, Lead Hook and Reverse Hook) and punch modality (Single maximal, 'In-synch' and 'Out of synch' combination) on punch speed and delivery time. Ten competition-standard volunteers performed punches with markers placed on their anatomical landmarks for 3D motion capture with an eight-camera optoelectronic system. Speed and duration between key moments were computed. There were significant differences in contact speed between punch types (F(2,18,84.87) = 105.76, p = 0.001) with Lead and Reverse Hooks developing greater speed than Jab and Cross. There were significant differences in contact speed between punch modalities (F(2,64,102.87) = 23.52, p = 0.001) with the Single maximal (M+/- SD: 9.26 +/- 2.09 m/s) higher than 'Out of synch' (7.49 +/- 2.32 m/s), 'In-synch' left (8.01 +/- 2.35 m/s) or right lead (7.97 +/- 2.53 m/s). Delivery times were significantly lower for Jab and Cross than Hook. Times were significantly lower 'In-synch' than a Single maximal or 'Out of synch' combination mode. It is concluded that a defender may have more evasion-time than previously reported. This research could be of use to performers and coaches when considering training preparations.

  12. Formation Control for the MAXIM Mission

    Science.gov (United States)

    Luquette, Richard J.; Leitner, Jesse; Gendreau, Keith; Sanner, Robert M.

    2004-01-01

    Over the next twenty years, a wave of change is occurring in the space-based scientific remote sensing community. While the fundamental limits in the spatial and angular resolution achievable in spacecraft have been reached, based on today s technology, an expansive new technology base has appeared over the past decade in the area of Distributed Space Systems (DSS). A key subset of the DSS technology area is that which covers precision formation flying of space vehicles. Through precision formation flying, the baselines, previously defined by the largest monolithic structure which could fit in the largest launch vehicle fairing, are now virtually unlimited. Several missions including the Micro-Arcsecond X-ray Imaging Mission (MAXIM), and the Stellar Imager will drive the formation flying challenges to achieve unprecedented baselines for high resolution, extended-scene, interferometry in the ultraviolet and X-ray regimes. This paper focuses on establishing the feasibility for the formation control of the MAXIM mission. MAXIM formation flying requirements are on the order of microns, while Stellar Imager mission requirements are on the order of nanometers. This paper specifically addresses: (1) high-level science requirements for these missions and how they evolve into engineering requirements; and (2) the development of linearized equations of relative motion for a formation operating in an n-body gravitational field. Linearized equations of motion provide the ground work for linear formation control designs.

  13. Gradient Dynamics and Entropy Production Maximization

    Science.gov (United States)

    Janečka, Adam; Pavelka, Michal

    2018-01-01

    We compare two methods for modeling dissipative processes, namely gradient dynamics and entropy production maximization. Both methods require similar physical inputs-how energy (or entropy) is stored and how it is dissipated. Gradient dynamics describes irreversible evolution by means of dissipation potential and entropy, it automatically satisfies Onsager reciprocal relations as well as their nonlinear generalization (Maxwell-Onsager relations), and it has statistical interpretation. Entropy production maximization is based on knowledge of free energy (or another thermodynamic potential) and entropy production. It also leads to the linear Onsager reciprocal relations and it has proven successful in thermodynamics of complex materials. Both methods are thermodynamically sound as they ensure approach to equilibrium, and we compare them and discuss their advantages and shortcomings. In particular, conditions under which the two approaches coincide and are capable of providing the same constitutive relations are identified. Besides, a commonly used but not often mentioned step in the entropy production maximization is pinpointed and the condition of incompressibility is incorporated into gradient dynamics.

  14. Comet coma sample return instrument

    Science.gov (United States)

    Albee, A. L.; Brownlee, Don E.; Burnett, Donald S.; Tsou, Peter; Uesugi, K. T.

    1994-01-01

    The sample collection technology and instrument concept for the Sample of Comet Coma Earth Return Mission (SOCCER) are described. The scientific goals of this Flyby Sample Return are to return to coma dust and volatile samples from a known comet source, which will permit accurate elemental and isotopic measurements for thousands of individual solid particles and volatiles, detailed analysis of the dust structure, morphology, and mineralogy of the intact samples, and identification of the biogenic elements or compounds in the solid and volatile samples. Having these intact samples, morphologic, petrographic, and phase structural features can be determined. Information on dust particle size, shape, and density can be ascertained by analyzing penetration holes and tracks in the capture medium. Time and spatial data of dust capture will provide understanding of the flux dynamics of the coma and the jets. Additional information will include the identification of cosmic ray tracks in the cometary grains, which can provide a particle's process history and perhaps even the age of the comet. The measurements will be made with the same equipment used for studying micrometeorites for decades past; hence, the results can be directly compared without extrapolation or modification. The data will provide a powerful and direct technique for comparing the cometary samples with all known types of meteorites and interplanetary dust. This sample collection system will provide the first sample return from a specifically identified primitive body and will allow, for the first time, a direct method of matching meteoritic materials captured on Earth with known parent bodies.

  15. The Joint Development of Traditional Bullying and Victimization with Cyber Bullying and Victimization in Adolescence

    Science.gov (United States)

    Jose, Paul E.; Kljakovic, Moja; Scheib, Emma; Notter, Olivia

    2012-01-01

    The present study investigated the stabilities of and interrelationships among traditional (i.e., face-to-face) bullying, traditional victimhood, cyber bullying, and cyber victimhood among adolescents over time. About 1,700 adolescents aged 11-16 years at Time 1 self-reported levels of both bullying and victimization in four contexts (in school,…

  16. Defending victimized peers : Opposing the bully, supporting the victim, or both?

    NARCIS (Netherlands)

    Reijntjes, Albert; Vermande, Marjolijn; Olthof, Tjeert; Goossens, Frits A; Aleva, Liesbeth; van der Meulen, Matty

    2016-01-01

    To reduce bullying, more knowledge on children defending their victimized peers is critical. In previous work, predominantly cross-sectional in nature, defending has typically been operationalized as one single, broad construct. However, there are good reasons to assume that attacking the bully

  17. Latent classes of childhood poly-victimization and associations with suicidal behavior among adult trauma victims: Moderating role of anger.

    Science.gov (United States)

    Charak, Ruby; Byllesby, Brianna M; Roley, Michelle E; Claycomb, Meredith A; Durham, Tory A; Ross, Jana; Armour, Cherie; Elhai, Jon D

    2016-12-01

    The aims of the present study were first to identify discrete patterns of childhood victimization experiences including crime, child maltreatment, peer/sibling victimization, sexual violence, and witnessing violence among adult trauma victims using latent class analysis; second, to examine the association between class-membership and suicidal behavior, and third to investigate the differential role of dispositional anger on the association between class-membership and suicidal behavior. We hypothesized that those classes with accumulating exposure to different types of childhood victimization (e.g., poly-victimization) would endorse higher suicidal behavior, than the other less severe classes, and those in the most severe class with higher anger trait would have stronger association with suicidal behavior. Respondents were 346 adults (N=346; M age =35.0years; 55.9% female) who had experienced a lifetime traumatic event. Sixty four percent had experienced poly-victimization (four or more victimization experiences) and 38.8% met the cut-off score for suicidal behavior. Three distinct classes emerged namely, the Least victimization (Class 1), the Predominantly crime and sibling/peer victimization (Class 2), and the Poly-victimization (Class 3) classes. Regression analysis controlling for age and gender indicated that only the main effect of anger was significantly associated with suicidal behavior. The interaction term suggested that those in the Poly-victimization class were higher on suicidal behavior as a result of a stronger association between anger and suicidal behavior in contrast to the association found in Class 2. Clinical implications of findings entail imparting anger management skills to facilitate wellbeing among adult with childhood poly-victimization experiences. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Phobos Sample Return: Next Approach

    Science.gov (United States)

    Zelenyi, Lev; Martynov, Maxim; Zakharov, Alexander; Korablev, Oleg; Ivanov, Alexey; Karabadzak, George

    The Martian moons still remain a mystery after numerous studies by Mars orbiting spacecraft. Their study cover three major topics related to (1) Solar system in general (formation and evolution, origin of planetary satellites, origin and evolution of life); (2) small bodies (captured asteroid, or remnants of Mars formation, or reaccreted Mars ejecta); (3) Mars (formation and evolution of Mars; Mars ejecta at the satellites). As reviewed by Galimov [2010] most of the above questions require the sample return from the Martian moon, while some (e.g. the characterization of the organic matter) could be also answered by in situ experiments. There is the possibility to obtain the sample of Mars material by sampling Phobos: following to Chappaz et al. [2012] a 200-g sample could contain 10-7 g of Mars surface material launched during the past 1 mln years, or 5*10-5 g of Mars material launched during the past 10 mln years, or 5*1010 individual particles from Mars, quantities suitable for accurate laboratory analyses. The studies of Phobos have been of high priority in the Russian program on planetary research for many years. Phobos-88 mission consisted of two spacecraft (Phobos-1, Phobos-2) and aimed the approach to Phobos at 50 m and remote studies, and also the release of small landers (long-living stations DAS). This mission implemented the program incompletely. It was returned information about the Martian environment and atmosphere. The next profect Phobos Sample Return (Phobos-Grunt) initially planned in early 2000 has been delayed several times owing to budget difficulties; the spacecraft failed to leave NEO in 2011. The recovery of the science goals of this mission and the delivery of the samples of Phobos to Earth remain of highest priority for Russian scientific community. The next Phobos SR mission named Boomerang was postponed following the ExoMars cooperation, but is considered the next in the line of planetary exploration, suitable for launch around 2022. A

  19. Attitudes toward victim and victimization in the light of the just world theory

    Directory of Open Access Journals (Sweden)

    Simeunović-Patić Biljana

    2017-01-01

    Full Text Available The present paper discusses current empirical status of the Just world theory introduced several decades ago by Melvin Lerner, the content and functions of a just world belief as its central construct, and particularly, the relation between a just world belief and victim blaming and victim derogation phenomena. In the light of existing research evidence, a just world belief and a need to re-establish a “justice” when this belief is threatened, is considered to be an adaptive mechanism that protect a belief that a world is secure and the future is predictable, as well as a confidence in the purposefulness of selfdiscipline, long-term personal investments and social rules respecting. As proposed By the just world theory, when a person faces injustice, i.e. others’ (innocent victims’ suffering, his/her belief in a just world is threatened. Possible reactions to that threat comprise various rational victim helping activities, but also specific cognitive defensive strategies, including cognitive distortion, rationalization and reinterpretation of an event in order to minimize injustice or deny injustice happened at all. In the course of reinterpretation of injustice, victims are often blamed for their former actions, or derogated for their character, in order to indicate them responsible for their own fate and suffering. The findings of research studies suggest that the likelihood of employing cognitive defensive strategies rises if formal responses to crime and victimization lack or fail. This further suggests that an efficient and effective formal social response in terms of both sanctioning of offenders and reparation of victims should be considered highly important in reducing the risk of stigmatization and rejection of victims. Finally, the paper discusses the role of victim’s just world beliefs in post-trauma adaptation and coping processes. In virtue of findings from the existing research literature it may be concluded that victim

  20. Cardiorespiratory Coordination in Repeated Maximal Exercise

    Directory of Open Access Journals (Sweden)

    Sergi Garcia-Retortillo

    2017-06-01

    Full Text Available Increases in cardiorespiratory coordination (CRC after training with no differences in performance and physiological variables have recently been reported using a principal component analysis approach. However, no research has yet evaluated the short-term effects of exercise on CRC. The aim of this study was to delineate the behavior of CRC under different physiological initial conditions produced by repeated maximal exercises. Fifteen participants performed 2 consecutive graded and maximal cycling tests. Test 1 was performed without any previous exercise, and Test 2 6 min after Test 1. Both tests started at 0 W and the workload was increased by 25 W/min in males and 20 W/min in females, until they were not able to maintain the prescribed cycling frequency of 70 rpm for more than 5 consecutive seconds. A principal component (PC analysis of selected cardiovascular and cardiorespiratory variables (expired fraction of O2, expired fraction of CO2, ventilation, systolic blood pressure, diastolic blood pressure, and heart rate was performed to evaluate the CRC defined by the number of PCs in both tests. In order to quantify the degree of coordination, the information entropy was calculated and the eigenvalues of the first PC (PC1 were compared between tests. Although no significant differences were found between the tests with respect to the performed maximal workload (Wmax, maximal oxygen consumption (VO2 max, or ventilatory threshold (VT, an increase in the number of PCs and/or a decrease of eigenvalues of PC1 (t = 2.95; p = 0.01; d = 1.08 was found in Test 2 compared to Test 1. Moreover, entropy was significantly higher (Z = 2.33; p = 0.02; d = 1.43 in the last test. In conclusion, despite the fact that no significant differences were observed in the conventionally explored maximal performance and physiological variables (Wmax, VO2 max, and VT between tests, a reduction of CRC was observed in Test 2. These results emphasize the interest of CRC

  1. [From acute victimization at chronic victimization: socio-cognitive approach of differential tolerance threshold].

    Science.gov (United States)

    Forte, M; Przygodzki-Lionet, N; Masclet, G

    2006-01-01

    Work, for many years reduced to a purely instrumental dimension, proves to be a true microcosm of society, with its informal modes, its emotional networks and its series of evils and dilemmas. This human apprehension of the professional sphere tends to reveal a pole with multiple facets, some of which have long been concealed, but whose individual, social and economic extent can't let people ignore them. This social perception, which contributes to regard work as sacred and makes it impervious to any aggression, should be abandoned. Bearing this in mind, our study endeavours to show that "work" and "victim" are far more overlapping than antagonistic realities; it aims at determining the impact of two aggressive methods via the professional pole, namely: moral harassment at work and armed attacks within bank premises. Such an approach tends to unify health psychology, occupational psychology and victimology, thus opening a breach in the stereotyped view which crystallizes the professional sphere into a kind of representative noose devoid of the most human bases. We then suggest, as a first hypothesis, that the nature of the victimization process, resulting from specific aggressive scenarios, would determine different psychological, physiological and relational consequences, apprehended under the generic expression of tolerance threshold. In other words, "mobbing", through its proactive, intentional and obsessional dimension would tend to lower the victims' threshold more than hold-ups, which are characterized by a reactive aspect, and obey unfavourable socio-economic contingencies. Our research also aims at apprehending this dynamic relationship binding victimization types to tolerance thresholds through two analysing factors. These psychological mediators are derived from Lazarus and Folkman's "transactional model of stress", which postulates that stress would rise from the perception people get of the transaction between the requirements of the situation and their

  2. Listeners are maximally flexible in updating phonetic beliefs over time.

    Science.gov (United States)

    Saltzman, David; Myers, Emily

    2018-04-01

    Perceptual learning serves as a mechanism for listenexrs to adapt to novel phonetic information. Distributional tracking theories posit that this adaptation occurs as a result of listeners accumulating talker-specific distributional information about the phonetic category in question (Kleinschmidt & Jaeger, 2015, Psychological Review, 122). What is not known is how listeners build these talker-specific distributions; that is, if they aggregate all information received over a certain time period, or if they rely more heavily upon the most recent information received and down-weight older, consolidated information. In the present experiment, listeners were exposed to four interleaved blocks of a lexical decision task and a phonetic categorization task in which the lexical decision blocks were designed to bias perception in opposite directions along a "s"-"sh" continuum. Listeners returned several days later and completed the identical task again. Evidence was consistent with listeners using a relatively short temporal window of integration at the individual session level. Namely, in each individual session, listeners' perception of a "s"-"sh" contrast was biased by the information in the immediately preceding lexical decision block, and there was no evidence that listeners summed their experience with the talker over the entire session. Similarly, the magnitude of the bias effect did not change between sessions, consistent with the idea that talker-specific information remains flexible, even after consolidation. In general, results suggest that listeners are maximally flexible when considering how to categorize speech from a novel talker.

  3. Predictors of Latent Trajectory Classes of Dating Violence Victimization

    Science.gov (United States)

    Brooks-Russell, Ashley; Foshee, Vangie; Ennett, Susan

    2014-01-01

    This study identified classes of developmental trajectories of physical dating violence victimization from grades 8 to 12 and examined theoretically-based risk factors that distinguished among trajectory classes. Data were from a multi-wave longitudinal study spanning 8th through 12th grade (n = 2,566; 51.9% female). Growth mixture models were used to identify trajectory classes of physical dating violence victimization separately for girls and boys. Logistic and multinomial logistic regressions were used to identify situational and target vulnerability factors associated with the trajectory classes. For girls, three trajectory classes were identified: a low/non-involved class; a moderate class where victimization increased slightly until the 10th grade and then decreased through the 12th grade; and a high class where victimization started at a higher level in the 8th grade, increased substantially until the 10th grade, and then decreased until the 12th grade. For males, two classes were identified: a low/non-involved class, and a victimized class where victimization increased slightly until the 9th grade, decreased until the 11th grade, and then increased again through the 12th grade. In bivariate analyses, almost all of the situational and target vulnerability risk factors distinguished the victimization classes from the non-involved classes. However, when all risk factors and control variables were in the model, alcohol use (a situational vulnerability) was the only factor that distinguished membership in the moderate trajectory class from the non-involved class for girls; anxiety and being victimized by peers (target vulnerability factors) were the factors that distinguished the high from the non-involved classes for the girls; and victimization by peers was the only factor distinguishing the victimized from the non-involved class for boys. These findings contribute to our understanding of the heterogeneity in physical dating violence victimization during

  4. Spatially dynamic forest management to sustain biodiversity and economic returns.

    Science.gov (United States)

    Mönkkönen, Mikko; Juutinen, Artti; Mazziotta, Adriano; Miettinen, Kaisa; Podkopaev, Dmitry; Reunanen, Pasi; Salminen, Hannu; Tikkanen, Olli-Pekka

    2014-02-15

    Production of marketed commodities and protection of biodiversity in natural systems often conflict and thus the continuously expanding human needs for more goods and benefits from global ecosystems urgently calls for strategies to resolve this conflict. In this paper, we addressed what is the potential of a forest landscape to simultaneously produce habitats for species and economic returns, and how the conflict between habitat availability and timber production varies among taxa. Secondly, we aimed at revealing an optimal combination of management regimes that maximizes habitat availability for given levels of economic returns. We used multi-objective optimization tools to analyze data from a boreal forest landscape consisting of about 30,000 forest stands simulated 50 years into future. We included seven alternative management regimes, spanning from the recommended intensive forest management regime to complete set-aside of stands (protection), and ten different taxa representing a wide variety of habitat associations and social values. Our results demonstrate it is possible to achieve large improvements in habitat availability with little loss in economic returns. In general, providing dead-wood associated species with more habitats tended to be more expensive than providing requirements for other species. No management regime alone maximized habitat availability for the species, and systematic use of any single management regime resulted in considerable reductions in economic returns. Compared with an optimal combination of management regimes, a consistent application of the recommended management regime would result in 5% reduction in economic returns and up to 270% reduction in habitat availability. Thus, for all taxa a combination of management regimes was required to achieve the optimum. Refraining from silvicultural thinnings on a proportion of stands should be considered as a cost-effective management in commercial forests to reconcile the conflict

  5. Trajectories of Intimate Partner Violence Victimization

    Directory of Open Access Journals (Sweden)

    Kevin M. Swartout

    2012-08-01

    Full Text Available Introduction: The purposes of this study were to assess the extent to which latent trajectories of female intimate partner violence (IPV victimization exist; and, if so, use negative childhood experiences to predict trajectory membership.Methods: We collected data from 1,575 women at 5 time-points regarding experiences during adolescence and their 4 years of college. We used latent class growth analysis to fit a series of personcentered, longitudinal models ranging from 1 to 5 trajectories. Once the best-fitting model was selected, we used negative childhood experience variables—sexual abuse, physical abuse, and witnessing domestic violence—to predict most-likely trajectory membership via multinomial logistic regression.Results: A 5-trajectory model best fit the data both statistically and in terms of interpretability. The trajectories across time were interpreted as low or no IPV, low to moderate IPV, moderate to low IPV, high to moderate IPV, and high and increasing IPV, respectively. Negative childhood experiences differentiated trajectory membership, somewhat, with childhood sexual abuse as a consistent predictor of membership in elevated IPV trajectories.Conclusion: Our analyses show how IPV risk changes over time and in different ways. These differential patterns of IPV suggest the need for prevention strategies tailored for women that consider victimization experiences in childhood and early adulthood. [West J Emerg Med. 2012;13(3:272–277.

  6. Women in alcoholic partnerships: Victimized and stigmatized

    Directory of Open Access Journals (Sweden)

    Dragišić-Labaš Slađana

    2016-01-01

    Full Text Available In this paper we strived to examine and therefore gain a deeper insight into the stigmatization and victimization of women living with an alcoholic partner by taking into account various perspectives. The association between alcohol consumption and violence against women has long been recognized, but wider social and legal support and protection followed rather late. Especially in developing countries, this serious problem has become one of the biggest health issues that is nonetheless still insufficiently investigated. High rates of aggressive and violent behavior of men towards women in partnerships have deep cultural and social roots, and this is additionally enhanced by the use of alcohol. The use of alcohol enhances violence against women and is therefore often justified which is obviously unacceptable. Women are victimized regardless of the position in these type of partnerships, namely irrespective of whether they themselves or addicts or are partners of addicted partners or husbands, because they often suffer psychological, physical and sexual violence. Several case studies drawn from our practice and presented below will partly illuminate dark side of a violent alcoholic partnership. In order to better understand the link between alcohol and violence it seems necessary to consider both social and structural factors involved.

  7. Multiple victimization experiences of urban elementary school students: associations with psychosocial functioning and academic performance.

    Science.gov (United States)

    Holt, Melissa K; Finkelhor, David; Kantor, Glenda Kaufman

    2007-05-01

    This study explored the victimization experiences of urban elementary school students to determine whether subsets of youth emerged with similar victimization profiles (e.g., no victimization, multiple types of victimization). It also evaluated whether multiple victimization was associated with greater psychological distress and lower academic performance. Participants were 689 fifth grade students from an urban, ethnically diverse school district in the Northeast. Youth completed self-report measures in school about bullying victimization, victimization in the home and community, and psychosocial functioning. Cluster analysis suggested the existence of three distinct youth profiles: those with minimal victimization, those victimized primarily by their peers, and those with multiple types of victimizations. As hypothesized, youth with multiple victimizations experienced more psychological distress and earned lower grades than their peers. Findings highlight the heterogeneity of youth victimization experiences and their relations to functioning, and have implications for treatment planning among practitioners working with youth.

  8. Postactivation potentiation biases maximal isometric strength assessment.

    Science.gov (United States)

    Lima, Leonardo Coelho Rabello; Oliveira, Felipe Bruno Dias; Oliveira, Thiago Pires; Assumpção, Claudio de Oliveira; Greco, Camila Coelho; Cardozo, Adalgiso Croscato; Denadai, Benedito Sérgio

    2014-01-01

    Postactivation potentiation (PAP) is known to enhance force production. Maximal isometric strength assessment protocols usually consist of two or more maximal voluntary isometric contractions (MVCs). The objective of this study was to determine if PAP would influence isometric strength assessment. Healthy male volunteers (n = 23) performed two five-second MVCs separated by a 180-seconds interval. Changes in isometric peak torque (IPT), time to achieve it (tPTI), contractile impulse (CI), root mean square of the electromyographic signal during PTI (RMS), and rate of torque development (RTD), in different intervals, were measured. Significant increases in IPT (240.6 ± 55.7 N·m versus 248.9 ± 55.1 N·m), RTD (746 ± 152 N·m·s(-1) versus 727 ± 158 N·m·s(-1)), and RMS (59.1 ± 12.2% RMSMAX  versus 54.8 ± 9.4% RMSMAX) were found on the second MVC. tPTI decreased significantly on the second MVC (2373 ± 1200 ms versus 2784 ± 1226 ms). We conclude that a first MVC leads to PAP that elicits significant enhancements in strength-related variables of a second MVC performed 180 seconds later. If disconsidered, this phenomenon might bias maximal isometric strength assessment, overestimating some of these variables.

  9. Gain maximization in a probabilistic entanglement protocol

    Science.gov (United States)

    di Lorenzo, Antonio; Esteves de Queiroz, Johnny Hebert

    Entanglement is a resource. We can therefore define gain as a monotonic function of entanglement G (E) . If a pair with entanglement E is produced with probability P, the net gain is N = PG (E) - (1 - P) C , where C is the cost of a failed attempt. We study a protocol where a pair of quantum systems is produced in a maximally entangled state ρm with probability Pm, while it is produced in a partially entangled state ρp with the complementary probability 1 -Pm . We mix a fraction w of the partially entangled pairs with the maximally entangled ones, i.e. we take the state to be ρ = (ρm + wUlocρpUloc+) / (1 + w) , where Uloc is an appropriate unitary local operation designed to maximize the entanglement of ρ. This procedure on one hand reduces the entanglement E, and hence the gain, but on the other hand it increases the probability of success to P =Pm + w (1 -Pm) , therefore the net gain N may increase. There may be hence, a priori, an optimal value for w, the fraction of failed attempts that we mix in. We show that, in the hypothesis of a linear gain G (E) = E , even assuming a vanishing cost C -> 0 , the net gain N is increasing with w, therefore the best strategy is to always mix the partially entangled states. Work supported by CNPq, Conselho Nacional de Desenvolvimento Científico e Tecnológico, proc. 311288/2014-6, and by FAPEMIG, Fundação de Amparo à Pesquisa de Minas Gerais, proc. IC-FAPEMIG2016-0269 and PPM-00607-16.

  10. SECTORAL RISK AND RETURN FOR COMPANIES IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Anis Cecilia

    2012-12-01

    Full Text Available probability that cash flows or return will vary from expectations. Standard corporate finance theory supposes that a company chooses a capital structure that maximizes company value. A fundamental idea in finance is the relationship between risk and return. The greater the amount of risk that an investor is willing to take on, the greater the potential return. The reason for this is that investors need to be compensated for taking on additional risk. Why put capital at significant risk for a return that is no higher than the return on government bonds? Or expect higher than averages returns from low-risk activities? It is impossible to separate measuring the performance of a company from the risks that the management takes to achieve it.In most aspects of company operations, risk assessment plays a different but equally important, role. It is an integral part of informed decision taking in achieving performance. Risk assessment is involved from the highest level in strategic choices about what activities to undertake, what assets to buy or what markets to serve all the way to detailed operational decisions about whether to accept payment in foreign currencies and the adequacy of safety measures in the workplace. It plays a part whether or not an organization is aware of managing risk and many managers feel that their instinct and judgment are enough – a behavior risk. The danger is that this leaves company risk unplanned and unmanaged. This paper proposes a framework where we realized a study cases: we test if return on assets and return on equity has influence on the risk, both on long and short term. For this purposes, we conduct an empirical research that covers 59 selected companies traded at the Bucharest Stock Exchange within the time period 1999-2010. For this study our results reveal that dynamic global risk can be associated to a low intensity with total assets performance of the company’s. Investments efficiency and the

  11. The criminal victimization of children and women in international perspective

    NARCIS (Netherlands)

    van Dijk, Jan; Kury, Helmut; Redo, Slawomir; Shea, Evelyn

    2016-01-01

    Abstract In this article we will present an overview of the results of the national and international crime victims surveys regarding the distribution of victimization according to age and gender with a focus on violent crime. The results show a consistent inversed relationship between age and

  12. The effect of police on crime, disorder and victim precaution

    NARCIS (Netherlands)

    Vollaard, B.A.; Koning, P.W.C.

    2009-01-01

    Using individual data from a large-scale Dutch crime victimization survey, we are able to expand the analysis of the effect of police on crime to crimes types that do not easily find their way into police statistics, and to public disorder and victim precaution. To address heterogeneity and

  13. Victimization by Bullying and Physical Symptoms among South Korean Schoolchildren

    Science.gov (United States)

    Lee, Ji Hyeon

    2018-01-01

    This study examined the relationship between victimization by bullying and physical symptoms among South Korean school children. Data were analyzed from a nationally representative sample of 2006 schoolchildren across South Korea aged 9-17 years. Multiple logistic regression analysis was used to estimate the associations between victimization by…

  14. Tracking Offenders: The Child Victim. Bureau of Justice Statistics Bulletin.

    Science.gov (United States)

    Manson, Donald A.; Sedgwick, Jeffrey L., Ed.

    This research focused on the criminal justice system's handling of offenders against children, comparing it with the processing of offenders against all victims. Data were obtained from California, New York, Ohio, Pennsylvania, Utah, and Virginia for offenses against children and against all victims in the areas of kidnapping, sexual assault,…

  15. Cyberbullying Perpetration and Victimization Among Middle-School Students

    Science.gov (United States)

    Rice, Eric; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-01-01

    Objectives. We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. Methods. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator–victim (i.e., bidirectional cyberbullying behavior). Results. In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator–victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators–victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators–victims. Conclusions. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters. PMID:25602905

  16. Old Wine, New Bottle? Comparing Interpersonal Bullying and Cyberbullying Victimization

    Science.gov (United States)

    Payne, Allison Ann; Hutzell, Kirsten L.

    2017-01-01

    This study uses a large nationally representative sample to compare and contrast interpersonal bullying and cyberbullying by asking the following questions: (a) How does the prevalence of cyberbullying victimization compare with the prevalence of interpersonal bullying victimization? (b) How does the relationship between demographic predictors and…

  17. Cyberbullying perpetration and victimization among middle-school students.

    Science.gov (United States)

    Rice, Eric; Petering, Robin; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-03-01

    We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator-victim (i.e., bidirectional cyberbullying behavior). In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator-victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators-victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators-victims. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters.

  18. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  19. Relational Aggression, Victimization, and Language Development: Implications for Practice

    Science.gov (United States)

    Ostrov, Jamie M.; Godleski, Stephanie A.

    2007-01-01

    This review explores the development of relational aggression and relational victimization among peers, with specific emphasis on clinical implications for speech-language pathologists. Developmental manifestations of relational aggression and victimization are reviewed from early childhood through emerging adulthood. The concurrent and…

  20. Peer victimization and peer rejection during early childhood

    Science.gov (United States)

    Godleski, Stephanie A.; Kamper, Kimberly E.; Ostrov, Jamie M.; Hart, Emily J.; Blakely-McClure, Sarah J.

    2014-01-01

    Objective The development and course of the subtypes of peer victimization is a relatively understudied topic despite the association of victimization with important developmental and clinical outcomes. Moreover, understanding potential predictors, such as peer rejection and emotion regulation, in early childhood may be especially important to elucidate possible bi-directional pathways between relational and physical victimization and rejection. The current study (N = 97) was designed to explore several gaps and limitations in the peer victimization and peer rejection literature. In particular, the prospective associations between relational and physical victimization and peer rejection over the course of 3.5 months during early childhood (i.e., 3- to 5- years-old) were investigated in an integrated model. Method The study consisted of 97 (42 girls) preschool children recruited from four early childhood schools in the northeast of the US. Using observations, research assistant report and teacher report, relational and physical aggression, relational and physical victimization, peer rejection, and emotion regulation were measured in a short-term longitudinal study. Path analyses were conducted to test the overall hypothesized model. Results Peer rejection was found to predict increases in relational victimization. In addition, emotion regulation was found to predict decreases in peer rejection and physical victimization. Conclusions Implications for research and practice are discussed, including teaching coping strategies for peer rejection and emotional distress. PMID:25133659

  1. 78 FR 24319 - National Crime Victims' Rights Week, 2013

    Science.gov (United States)

    2013-04-24

    ... we know: families trying to rebuild after financial fraud or identity theft, grandparents spending... victims of abuse. We have continued to crack down on financial crimes that leave too many families..., and by volunteering to serve victims in their time of need. [[Page 24320

  2. Sexual Harassment Victims: Psycholegal and Family Therapy Considerations.

    Science.gov (United States)

    Woody, Robert Henley; Perry, Nancy Walker

    1993-01-01

    Examines legal proscriptions and practical definitions of sexual harassment, describes psychological effects of sexual harassment (Sexual Harassment Trauma Syndrome) for victim-client and impact on family system, and offers guidance for family therapy. Focuses on vulnerability of victim-client, reconstruction of self-concept as primary goal of…

  3. The Legal Duty to Incorporate Mistakes of the Victim

    NARCIS (Netherlands)

    L.T. Visscher (Louis)

    2008-01-01

    textabstractAbstract: In many jurisdictions, potential injurers are under a legal duty to incorporate possible mistakes of the potential victim. I distinguish three types of mistakes. First, victims might make mistakes because it is too costly to avoid them (e.g. little children in traffic). Second,

  4. A Latent Class Approach to Examining Forms of Peer Victimization

    Science.gov (United States)

    Bradshaw, Catherine P.; Waasdorp, Tracy E.; O'Brennan, Lindsey M.

    2013-01-01

    There is growing interest in gender differences in the experience of various forms of peer victimization; however, much of the work to date has used traditional variable-centered approaches by focusing on scales or individual forms of victimization in isolation. The current study explored whether there were discrete groups of adolescents who…

  5. Constructing victims and perpetrators of rape in the advice column

    African Journals Online (AJOL)

    Kate H

    The findings suggest that there has been a decrease in explicit victim blaming after 1994 .... functions: to accuse the woman and to excuse the man. ..... effort into getting this matter corrected,” attributing implicit blame to the victim for the assault ...

  6. Attachment Styles among Bullies, Victims and Uninvolved Adolescents

    Science.gov (United States)

    Koiv, Kristi

    2012-01-01

    Attachment theory provides a frame for understanding the role of attachment styles in the development of bullying behaviour in adolescence. The present study examined attachment styles (secure, avoidant and anxious/ambivalent) that differentiated bullies, victims, bully/victims and uninvolved adolescents. A total of 1,921 students (1,006 girls and…

  7. The incongruity of workplace bullying victimization and inclusive excellence.

    Science.gov (United States)

    Dzurec, Laura Cox; Kennison, Monica; Gillen, Patricia

    Bullying occurs frequently-and with significant negative outcomes-in workplace settings. Once established, bullying endures in the workplace, requiring the interaction of a bully perpetrator and an intended target who takes on the role of victim. Not every target becomes a victim, however. The purpose of this study is to investigate the processes by which targets, intended objects of bullies' affronts, become victims, those individuals who experience ongoing emotional injury in response to bullies' affronts, and to clarify how bullying victimization impedes inclusive excellence in the workplace. The design for this study was pragmatic utility, an inductive research approach grounded in assumptions of hermeneutics. The pragmatic utility process involved the investigators' synthesis of descriptions from a broad, interdisciplinary published literature. Integrating knowledge from their previous research and practice experiences with the pragmatic utility process, they derived qualitative features of victims' experiences, differentiating target from victim in bullying encounters. For those targets who ultimately are victimized, response to bullies' affronts extends far beyond the immediate present. Redolence of personal, lived experience revives bygone vulnerabilities, and naïve communication and relationship expectations reinforce a long-standing, impoverished sense. That sense couples with workplace dynamics to augment a context of exclusion. Findings suggest that, as Heidegger contended, we are our histories. Personal history demonstrates a significance influence on the manifestation of bullying victimization, acting to distance them from their workplace peers and to impede inclusive excellence. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. A Longitudinal Investigation of Peer Sexual Harassment Victimization in Adolescence

    Science.gov (United States)

    Petersen, Jennifer L.; Hyde, Janet Shibley

    2009-01-01

    The current study describes longitudinal trends in sexual harassment by adolescent peers and highlights gender, pubertal status, attractiveness, and power as predictors of harassment victimization. At the end of 5th, 7th, and 9th grades, 242 adolescents completed questionnaires about sexual harassment victimization, pubertal status, and perceived…

  9. The interrelation between victimization and bullying inside young offender institutions.

    Science.gov (United States)

    Häufle, Jenny; Wolter, Daniel

    2015-01-01

    Bullying and victimization are serious problems within prisons. Young Offender Institutions (YOIs), in particular, suffer from high rates of inmate-on-inmate violence. More recent theories about the development of bullying in closed custody institutions imply a relationship between the experience of victimization and the usage of bullying. In our study, we test this linkage using longitudinal survey data taken at two time-points from 473 inmates (aged 15-24) inside three YOIs in Germany. We first analyze the extent of bullying and victimization, and then used a longitudinal structural equation model to predict inmate bullying behavior at time 2 based on victimization that occurred at time 1. Age is used as a predictor variable to account for differences in the amount of victimization and bullying. Results suggest that bullying and victimization are high in the YOIs, which were subject to research. Most inmates reported being a bully and a victim at the same time. Younger inmates use more direct physical bullying but not psychological bullying. An increase in psychological bullying over time can significantly be explained by victimization at an earlier measurement time point. Our study therefore supports recent theoretical assumptions about the development of bullying behavior. Possible implications for prevention and intervention are discussed. © 2014 Wiley Periodicals, Inc.

  10. Differences in Bullying Victimization between Students with and without Disabilities

    Science.gov (United States)

    Bear, George G.; Mantz, Lindsey S.; Glutting, Joseph J.; Yang, Chunyan; Boyer, Deborah E.

    2015-01-01

    Prevalence rates for bullying victimization among children with disabilities have varied greatly in the research literature. Two reasons for such variability were the focus of this study: (a) rates vary as a function of disability type, and (b) rates vary based on the bullying measure and criteria used to classify students as bullying victims. The…

  11. Violent online games exposure and cyberbullying/victimization among adolescents.

    Science.gov (United States)

    Lam, Lawrence T; Cheng, Zaohuo; Liu, Xinmin

    2013-03-01

    This population-based cross-sectional survey examined the association between exposure to violent online games and cyberbullying and victimization in adolescents recruited from two large cities utilizing a stratified two-stage random cluster sampling technique. Cyberbullying and victimization were assessed by the E-victimization and E-bullying scales validated in a previous study. Exposure to violent online games was measured by self-nomination of the degree of violent content in the games played. Results indicated that the majority (74.3 percent) of respondents did not experience any cyberbullying or victimization in the last 7 days before the survey, 14.4 percent reported to be victimized via cyberspace, 2.9 percent admitted that they had bullied others, and 8.4 percent reported to be both perpetrators- and- victims. One hundred and eighty seven (15.3 percent) considered games they were playing were of moderate to severe violence. Students who had been involved in cyberbullying as well as being victimized were two times as likely to have been exposed to violent online games, and nearly four times as likely for those involved in bullying others. Exposure to violent online games was associated with being a perpetrator as well as a perpetrator-and-victim of cyberbullying. Parents and clinicians need to be aware of the potential harm of these exposures. The policy implications of results were also discussed.

  12. Perceptions and Correlates of Peer-Victimization and Bullying

    Science.gov (United States)

    Hunter, Simon C.; Boyle, James M. E.; Warden, David

    2007-01-01

    Background: The experiences of peer-victimization and bullying are often treated empirically as though they are conceptually indistinct. Both involve repeated aggression, but definitions of bullying additionally emphasize the importance of aggressor intent and imbalance of power between the aggressor and the victim (Olweus, 1978; Whitney &…

  13. Acculturation and Dating Violence Victimization among Filipino and Samoan Youths

    Science.gov (United States)

    Chung-Do, Jane J.; Goebert, Deborah A.

    2009-01-01

    Dating violence victimization is an important public health issue. Recent studies on minority youths have found higher risks of dating violence victimization compared to White youths. This study examined the influence of acculturation components on youths' experiences of dating violence by utilizing data from a survey of 193 Samoan and Filipino…

  14. Maximizing percentage depletion in solid minerals

    International Nuclear Information System (INIS)

    Tripp, J.; Grove, H.D.; McGrath, M.

    1982-01-01

    This article develops a strategy for maximizing percentage depletion deductions when extracting uranium or other solid minerals. The goal is to avoid losing percentage depletion deductions by staying below the 50% limitation on taxable income from the property. The article is divided into two major sections. The first section is comprised of depletion calculations that illustrate the problem and corresponding solutions. The last section deals with the feasibility of applying the strategy and complying with the Internal Revenue Code and appropriate regulations. Three separate strategies or appropriate situations are developed and illustrated. 13 references, 3 figures, 7 tables

  15. What currency do bumble bees maximize?

    Directory of Open Access Journals (Sweden)

    Nicholas L Charlton

    2010-08-01

    Full Text Available In modelling bumble bee foraging, net rate of energetic intake has been suggested as the appropriate currency. The foraging behaviour of honey bees is better predicted by using efficiency, the ratio of energetic gain to expenditure, as the currency. We re-analyse several studies of bumble bee foraging and show that efficiency is as good a currency as net rate in terms of predicting behaviour. We suggest that future studies of the foraging of bumble bees should be designed to distinguish between net rate and efficiency maximizing behaviour in an attempt to discover which is the more appropriate currency.

  16. New Maximal Two-distance Sets

    DEFF Research Database (Denmark)

    Lisonek, Petr

    1996-01-01

    A two-distance set in E^d is a point set X inthe d-dimensional Euclidean spacesuch that the distances between distinct points in Xassume only two different non-zero values. Based on results from classical distance geometry, we developan algorithm to classify, for a given dimension, all maximal...... (largest possible)two-distance sets in E^d.Using this algorithm we have completed the full classificationfor all dimensions less than or equal to 7, andwe have found one set in E^8 whosemaximality follows from Blokhuis' upper bound on sizes of s-distance sets.While in the dimensions less than or equal to 6...

  17. Maximizing policy learning in international committees

    DEFF Research Database (Denmark)

    Nedergaard, Peter

    2007-01-01

    , this article demonstrates that valuable lessons can be learned about policy learning, in practice and theoretically, by analysing the cooperation in the OMC committees. Using the Advocacy Coalition Framework as the starting point of analysis, 15 hypotheses on policy learning are tested. Among other things......, it is concluded that in order to maximize policy learning in international committees, empirical data should be made available to committees and provided by sources close to the participants (i.e. the Commission). In addition, the work in the committees should be made prestigious in order to attract well...

  18. Pouliot type duality via a-maximization

    International Nuclear Information System (INIS)

    Kawano, Teruhiko; Ookouchi, Yutaka; Tachikawa, Yuji; Yagi, Futoshi

    2006-01-01

    We study four-dimensional N=1Spin(10) gauge theory with a single spinor and N Q vectors at the superconformal fixed point via the electric-magnetic duality and a-maximization. When gauge invariant chiral primary operators hit the unitarity bounds, we find that the theory with no superpotential is identical to the one with some superpotential at the infrared fixed point. The auxiliary field method in the electric theory offers a satisfying description of the infrared fixed point, which is consistent with the better picture in the magnetic theory. In particular, it gives a clear description of the emergence of new massless degrees of freedom in the electric theory

  19. Financial Integration and Asset Returns

    OpenAIRE

    P Martin; H Rey

    2000-01-01

    The paper investigates the impact of financial integration on asset return, risk diversification and breadth of financial markets. We analyse a three-country macroeconomic model in which (i) the number of financial assets is endogenous; (ii) assets are imperfect substitutes; (iii) cross-border asset trade entails some transaction costs; (iv) the investment technology is indivisible. In such an environment, lower transaction costs between two financial markets translate to higher demand for as...

  20. Returning to work after disability.

    Science.gov (United States)

    Quinn, P Roger

    2002-06-01

    After a workplace injury or disability, there is a period of hardship and adjustment for the injured party as well as all stakeholders in the workers' compensation process. Ultimately, however, return to work is considered. The author reviews this often challenging exercise from the Canadian perspective and stresses the need for timely intervention, honest communication, the coordination of information and resources--and the need for flexibility. A case study on low back pain is included.

  1. Developing maximal neuromuscular power: part 2 - training considerations for improving maximal power production.

    Science.gov (United States)

    Cormie, Prue; McGuigan, Michael R; Newton, Robert U

    2011-02-01

    This series of reviews focuses on the most important neuromuscular function in many sport performances: the ability to generate maximal muscular power. Part 1, published in an earlier issue of Sports Medicine, focused on the factors that affect maximal power production while part 2 explores the practical application of these findings by reviewing the scientific literature relevant to the development of training programmes that most effectively enhance maximal power production. The ability to generate maximal power during complex motor skills is of paramount importance to successful athletic performance across many sports. A crucial issue faced by scientists and coaches is the development of effective and efficient training programmes that improve maximal power production in dynamic, multi-joint movements. Such training is referred to as 'power training' for the purposes of this review. Although further research is required in order to gain a deeper understanding of the optimal training techniques for maximizing power in complex, sports-specific movements and the precise mechanisms underlying adaptation, several key conclusions can be drawn from this review. First, a fundamental relationship exists between strength and power, which dictates that an individual cannot possess a high level of power without first being relatively strong. Thus, enhancing and maintaining maximal strength is essential when considering the long-term development of power. Second, consideration of movement pattern, load and velocity specificity is essential when designing power training programmes. Ballistic, plyometric and weightlifting exercises can be used effectively as primary exercises within a power training programme that enhances maximal power. The loads applied to these exercises will depend on the specific requirements of each particular sport and the type of movement being trained. The use of ballistic exercises with loads ranging from 0% to 50% of one-repetition maximum (1RM) and

  2. Tick size and stock returns

    Science.gov (United States)

    Onnela, Jukka-Pekka; Töyli, Juuso; Kaski, Kimmo

    2009-02-01

    Tick size is an important aspect of the micro-structural level organization of financial markets. It is the smallest institutionally allowed price increment, has a direct bearing on the bid-ask spread, influences the strategy of trading order placement in electronic markets, affects the price formation mechanism, and appears to be related to the long-term memory of volatility clustering. In this paper we investigate the impact of tick size on stock returns. We start with a simple simulation to demonstrate how continuous returns become distorted after confining the price to a discrete grid governed by the tick size. We then move on to a novel experimental set-up that combines decimalization pilot programs and cross-listed stocks in New York and Toronto. This allows us to observe a set of stocks traded simultaneously under two different ticks while holding all security-specific characteristics fixed. We then study the normality of the return distributions and carry out fits to the chosen distribution models. Our empirical findings are somewhat mixed and in some cases appear to challenge the simulation results.

  3. Child human trafficking victims: challenges for the child welfare system.

    Science.gov (United States)

    Fong, Rowena; Berger Cardoso, Jodi

    2010-08-01

    Since the passing of the Victims of Trafficking and Violence Protection Act in 2000 and its reauthorization by President George Bush in 2008, federal, state and community efforts in identifying and providing services for victims of human trafficking have significantly improved. However, most of the research and resources for trafficking victims have been directed towards adults rather than children. Researchers agree that there is a growing number of sexually exploited and trafficked children in the United States yet few programs emphasize the unique experiences and special needs of this population. This article examines commercial sexual exploitation of children; differentiates the needs and problems between child prostitution and victims of human trafficking; reviews and critiques current treatment practices; and summarizes challenges and successes in working with child victims of human trafficking, offering practice and policy recommendations. Published by Elsevier Ltd.

  4. Developing the Cyber Victimization Experiences and Cyberbullying Behaviors Scales.

    Science.gov (United States)

    Betts, Lucy R; Spenser, Karin A

    2017-01-01

    The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.

  5. Police officers' collaboration with rape victim advocates: barriers and facilitators.

    Science.gov (United States)

    Rich, Karen; Seffrin, Patrick

    2013-01-01

    Secondary victimization may occur when rape victims make police reports. This can compromise the quality of official statements and jeopardize criminal cases. Rape reporters receive better treatment by police officers when advocates are involved and best practice police work includes such collaboration. Studies of advocates have described tension, role confusion, and poor communication with police officers. Many variables, including rape myth acceptance (RMA) and training on sexual assault dynamics, may affect officers' collaboration with advocates. There were 429 police officers who responded to a survey measuring their victim interviewing skill, formal training about rape, years on the job, number of victims known personally, number of recent rape cases, RMA, and collaboration with advocates. Results suggest that officers' interviewing skill, years on the job, and specific training are related to collaboration with victim advocates on rape cases. Professional, rather than personal, variables were most predictive of collaboration. Implications for officer selection and training are explored.

  6. Bullying Victimization Type and Feeling Unsafe in Middle School.

    Science.gov (United States)

    Bowser, John; Larson, James D; Bellmore, Amy; Olson, Chelsea; Resnik, Felice

    2018-01-01

    Given their significance to school violence, this study quantifies the association between bullying victimization and perceptions of safety separately for victimization where the type is not specified versus victimization that is physical in nature. Generalized liner mixed modeling was employed with 5,138 sixth- to eighth-grade students in 24 schools who self-reported on their bullying victimization and perceptions of school safety on an anonymous survey in fall 2015. Results indicate a multiplicative interaction exists with regard to the odds of feeling unsafe at school among those who were bullied at all (odds ratio [ OR] = 3.1) compared to those who were bullied physically ( OR = 9.12). For school nurses who work with students with a variety of concerns and health issues, this research indicates that the use of bullying victimization as an outcome, proxy and/or predictor, requires inquiry into the type of bullying experienced to aid in the care and support received.

  7. Modifying cochlear implant design: advantages of placing a return electrode in the modiolus.

    Science.gov (United States)

    Ho, Steven Y; Wiet, Richard J; Richter, Claus-Peter

    2004-07-01

    A modiolar return electrode significantly increases the current flow across spiral ganglion cells into the modiolus, and may decrease the cochlear implant's power requirements. Ideal cochlear implants should maximize current flow into the modiolus to stimulate auditory neurons. Previous efforts to facilitate current flow through the modiolus included the fabrication and use of precurved electrodes designed to "hug" the modiolus and silastic positioners designed to place the electrodes closer to the modiolus. In contrast to earlier efforts, this study explores the effects of return electrode placement on current distributions in the modiolus. The effects of return electrode positioning on current flow in the modiolus were studied in a Plexiglas model of the cochlea. Results of model measurements were confirmed by measurements in the modiolus of human temporal bones. The return electrode was placed either within the modiolus, or remotely, outside the temporal bone, simulating contemporary cochlear implant configurations using monopolar stimulation. Cochlear model results clearly show that modiolar current amplitudes can be influenced significantly by the location of the return electrode, being larger when placed into the modiolus. Temporal bone data show similar findings. Voltages recorded in the modiolus are, on average, 2.8 times higher with the return electrode in the modiolus compared with return electrode locations outside the temporal bone. Placing a cochlear implant's return electrode in the modiolus should significantly reduce its power consumption. Reducing power requirements should lead to improved efficiency, safer long-term use, and longer device life.

  8. Maximization techniques for oilfield development profits

    International Nuclear Information System (INIS)

    Lerche, I.

    1999-01-01

    In 1981 Nind provided a quantitative procedure for estimating the optimum number of development wells to emplace on an oilfield to maximize profit. Nind's treatment assumed that there was a steady selling price, that all wells were placed in production simultaneously, and that each well's production profile was identical and a simple exponential decline with time. This paper lifts these restrictions to allow for price fluctuations, variable with time emplacement of wells, and production rates that are more in line with actual production records than is a simple exponential decline curve. As a consequence, it is possible to design production rate strategies, correlated with price fluctuations, so as to maximize the present-day worth of a field. For price fluctuations that occur on a time-scale rapid compared to inflation rates it is appropriate to have production rates correlate directly with such price fluctuations. The same strategy does not apply for price fluctuations occurring on a time-scale long compared to inflation rates where, for small amplitudes in the price fluctuations, it is best to sell as much product as early as possible to overcome inflation factors, while for large amplitude fluctuations the best strategy is to sell product as early as possible but to do so mainly on price upswings. Examples are provided to show how these generalizations of Nind's (1981) formula change the complexion of oilfield development optimization. (author)

  9. Cyber Victimization in High School: Measurement, Overlap with Face-to-Face Victimization, and Associations with Social-Emotional Outcomes

    Science.gov (United States)

    Brown, Christina Flynn; Demaray, Michelle Kilpatrick; Tennant, Jaclyn E.; Jenkins, Lyndsay N.

    2017-01-01

    Cyber victimization is a contemporary problem facing youth and adolescents (Diamanduros, Downs, & Jenkins, 2008; Kowalski & Limber, 2007). It is imperative for researchers and school personnel to understand the associations between cyber victimization and student social-emotional outcomes. This article explores (a) gender differences in…

  10. Quality of life of victims, bullies, and bully/victims among school-aged children in the Netherlands

    NARCIS (Netherlands)

    Klein Velderman, M.; Dorst, A.G. van; Wiefferink, C.H.; Detmar, S.B.; Paulussen, T.G.W.M.

    2008-01-01

    Two studies were conducted to examine the Quality of Life (QoL) of victims, bullies and bully/victims among Dutch school-aged children. Study 1 studied associations of QoL dimensions with self-reported victimisation in the Dutch sample from the KIDSCREEN Project (N = 1,669). Study 2 examined QoL of

  11. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents: A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    Eijnden, R.J.J.M. van den; Vermulst, A.A.; Rooij, A.J. van; Scholte, R.H.J.; Mheen, H. van de

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  12. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents : A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    van den Eijnden, Regina; Vermulst, Ad; van Rooij, Antonius J.; Scholte, Ron; van de Mheen, Dike

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  13. The Victim-Offender Overlap and Fear of In-School Victimization: A Longitudinal Examination of Risk Assessment Models

    Science.gov (United States)

    Melde, Chris; Esbensen, Finn-Aage

    2009-01-01

    Reports of serious violence in schools have raised general awareness and concern about safety in America's schools. In this article, the authors examine the extent to which in-school victimization is associated with students' perceived risk and fear of victimization. By expanding on Ferraro's risk assessment framework, the current study explores…

  14. The Return of the Sphinx: State Fetishism and Political Discourse in Peronist Argentina

    Directory of Open Access Journals (Sweden)

    Alberto Medina

    2014-06-01

    Full Text Available Peron’s return to Argentina in 1973 was staged as a masterpiece of political rhetoric. This was the point of departure for a new Argentina built on myths of the past, but Peron was going to become the victim of his own rhetorical success. His virtuosity of the 50s in managing and hiding contradictions behind personal cult is not there anymore. A characterization of the political and rhetorical content of that event is used as the threshold for a study of the political uses of fetishism in Peronist discourse and different “texts” related to it.

  15. Implicit Social Cognitive Processes Underlying Victim Self and Identity: Evidence With College-Aged Adults.

    Science.gov (United States)

    Sachs, Nicole M; Veysey, Bonita M; Rivera, Luis M

    2017-11-01

    Past research on victimization has relied predominantly on individuals' awareness of and willingness to self-report a victimization experience and its effect on self and identity processes. The present research adopts theoretical and methodological innovations in implicit social cognition research to provide a new perspective on how a violent victimization experience might influence identity processes outside of conscious awareness. Our main goal was to test whether individuals who have victimization experience implicitly associate the self with victims (implicit victim identity) and their stereotypes (implicit victim self-stereotyping), and the relation of these associations to explicit victim identity and self-stereotyping. Two pretests with undergraduate student participants ( Ns = 122 and 72) identified victim-related word stimuli for two Single Category Implicit Association Test (SC-IAT) measures of implicit victim identity and self-stereotyping. In Pretest Study A, participants read crime vignettes and listed words that described a victim, then in Pretest Study B, participants rated these words on victim relatedness and valence. The Main Study recruited undergraduate student participants ( N = 101) who completed the SC-IATs, self-report measures of explicit victim identity and self-stereotyping, and victimization experiences. Three of our five hypotheses were supported. Individuals with past victimization experience exhibited strong explicit victim identity and self-stereotyping, but not implicit victim identity and self-stereotyping, relative to those with no victimization experience. Explicit and implicit victim identity and self-stereotyping were unrelated. Finally, among individuals with victimization experience, a strong implicit victim identity was associated with strong implicit victim self-stereotyping. This research has implications for understanding the processes underlying revictimization and for preventing further victimization.

  16. STUDY LINKS SOLVING THE MAXIMUM TASK OF LINEAR CONVOLUTION «EXPECTED RETURNS-VARIANCE» AND THE MINIMUM VARIANCE WITH RESTRICTIONS ON RETURNS

    Directory of Open Access Journals (Sweden)

    Maria S. Prokhorova

    2014-01-01

    Full Text Available The article deals with a study of problemsof finding the optimal portfolio securitiesusing convolutions expectation of portfolioreturns and portfolio variance. Value of thecoefficient of risk, in which the problem ofmaximizing the variance - limited yieldis equivalent to maximizing a linear convolution of criteria for «expected returns-variance» is obtained. An automated method for finding the optimal portfolio, onthe basis of which the results of the studydemonstrated is proposed.

  17. Corruption: Engineers are Victims, Perpetrators or Both?

    Science.gov (United States)

    Pecujlija, M; Cosic, I; Nesic-Grubic, L; Drobnjak, S

    2015-08-01

    This study was conducted in Serbian companies on licensed engineers and in its first part included a total of 336 licensed engineers who voluntarily completed the questionnaires about their ethical orientation and attitudes toward corruption and in the second part 214 engineers who participated in the first survey, who voluntarily evaluated their company's business operations characteristics. This study has clearly shown that there is a direct significant influence of the engineer's ethical orientations and attitudes toward corruption on their evaluation of the characteristics of their respective companies regarding business operations. This research also clearly shows that only engineers with a strong deontological orientation, low ethical subjectivity, and strong readiness to fight corruption, low corruption acceptance and high awareness of corruption can successfully fight corruption, improve the business operations of their companies and make beneficial changes to society. Otherwise, they should be considered as corruption perpetrators, not just as its victims.

  18. Childhood Victims of Snakebites: 2000-2013.

    Science.gov (United States)

    Schulte, Joann; Domanski, Kristina; Smith, Eric Anthony; Menendez, Annelle; Kleinschmidt, Kurt C; Roth, Brett A

    2016-11-01

    Snakebites are not a reportable condition (to state health departments), and 1 major assessment of US children with snakebites was published 50 years ago. Increasing urbanization, population shifts south and west, newer antivenom therapy, and the importation of exotic snakes may have changed snakebites. Poison control centers are often consulted on treatment and collect surveillance data. Generic codes for venomous, nonvenomous, and unknown snakebites were used to characterize victims aged ≤18 years reported to US poison control centers between 2000 and 2013. Data included demographic characteristics, snake types, and outcomes. Callers reported 18 721 pediatric snakebites (annual mean, 1337). Two-thirds were male (n = 12 688 [68%]), with a mean age of 10.7 years. One-half of the snakebites were venomous (n = 9183 [49%]), with copperheads (n = 3602 [39%]) and rattlesnakes (n = 2859 [31%]) the most frequently identified. Reported copperhead bites increased 137% and unknown crotalids (venomous) increased 107%. Exotic (nonnative) exposures were reported in 2% of cases. All 50 states reported snakebites, but one-quarter occurred in Texas and Florida. Rates for total snakebites and venomous snakebites were highest in West Virginia, Oklahoma, and Louisiana. One-fifth required ICU admission. Limited data for 28% of bites for antivenom treatment suggests increasing use. Four victims died. The epidemiology of pediatric snakebites is changing. One-half of the reported exposures were venomous, and copperhead bites and exotic species are being reported more frequently. Although snakebite-related deaths are rare, ICU admission is common. Antivenom treatment is incompletely reported, but its use is increasing. Copyright © 2016 by the American Academy of Pediatrics.

  19. Brain Resuscitation in the Drowning Victim

    Science.gov (United States)

    Topjian, Alexis A.; Berg, Robert A.; Bierens, Joost J. L. M.; Branche, Christine M.; Clark, Robert S.; Friberg, Hans; Hoedemaekers, Cornelia W. E.; Holzer, Michael; Katz, Laurence M.; Knape, Johannes T. A.; Kochanek, Patrick M.; Nadkarni, Vinay; van der Hoeven, Johannes G.

    2013-01-01

    Drowning is a leading cause of accidental death. Survivors may sustain severe neurologic morbidity. There is negligible research specific to brain injury in drowning making current clinical management non-specific to this disorder. This review represents an evidence-based consensus effort to provide recommendations for management and investigation of the drowning victim. Epidemiology, brain-oriented prehospital and intensive care, therapeutic hypothermia, neuroimaging/monitoring, biomarkers, and neuroresuscitative pharmacology are addressed. When cardiac arrest is present, chest compressions with rescue breathing are recommended due to the asphyxial insult. In the comatose patient with restoration of spontaneous circulation, hypoxemia and hyperoxemia should be avoided, hyperthermia treated, and induced hypothermia (32–34 °C) considered. Arterial hypotension/hypertension should be recognized and treated. Prevent hypoglycemia and treat hyperglycemia. Treat clinical seizures and consider treating non-convulsive status epilepticus. Serial neurologic examinations should be provided. Brain imaging and serial biomarker measurement may aid prognostication. Continuous electroencephalography and N20 somatosensory evoked potential monitoring may be considered. Serial biomarker measurement (e.g., neuron specific enolase) may aid prognostication. There is insufficient evidence to recommend use of any specific brain-oriented neuroresuscitative pharmacologic therapy other than that required to restore and maintain normal physiology. Following initial stabilization, victims should be transferred to centers with expertise in age-specific post-resuscitation neurocritical care. Care should be documented, reviewed, and quality improvement assessment performed. Preclinical research should focus on models of asphyxial cardiac arrest. Clinical research should focus on improved cardiopulmonary resuscitation, re-oxygenation/reperfusion strategies, therapeutic hypothermia

  20. How Are Property Investment Returns Determined? : Estimating the Micro-Structure of Asset Prices, Property Income, and Discount Rates

    OpenAIRE

    Shimizu, Chihiro

    2014-01-01

    How exactly should one estimate property investment returns? Investors in property aim to maximize capital gains from price increases and income generated by the property. How are the returns on investment in property determined based on its characteristics, and what kind of market characteristics does it have? Focusing on the Tokyo commercial property market and residential property market, the purpose of this paper was to break down and measure the micro-structure of property investment ret...

  1. Shareholder, stakeholder-owner or broad stakeholder maximization

    DEFF Research Database (Denmark)

    Mygind, Niels

    2004-01-01

    With reference to the discussion about shareholder versus stakeholder maximization it is argued that the normal type of maximization is in fact stakeholder-owner maxi-mization. This means maximization of the sum of the value of the shares and stake-holder benefits belonging to the dominating...... including the shareholders of a company. Although it may be the ultimate goal for Corporate Social Responsibility to achieve this kind of maximization, broad stakeholder maximization is quite difficult to give a precise definition. There is no one-dimensional measure to add different stakeholder benefits...... not traded on the mar-ket, and therefore there is no possibility for practical application. Broad stakeholder maximization instead in practical applications becomes satisfying certain stakeholder demands, so that the practical application will be stakeholder-owner maximization un-der constraints defined...

  2. Returning to sports after a back injury

    Science.gov (United States)

    ... medlineplus.gov/ency/patientinstructions/000518.htm Returning to sports after a back injury To use the sharing ... Back pain - returning to sports Which Type of Sport is Best? In deciding when and if to ...

  3. Maximizing Lumen Gain With Directional Atherectomy.

    Science.gov (United States)

    Stanley, Gregory A; Winscott, John G

    2016-08-01

    To describe the use of a low-pressure balloon inflation (LPBI) technique to delineate intraluminal plaque and guide directional atherectomy in order to maximize lumen gain and achieve procedure success. The technique is illustrated in a 77-year-old man with claudication who underwent superficial femoral artery revascularization using a HawkOne directional atherectomy catheter. A standard angioplasty balloon was inflated to 1 to 2 atm during live fluoroscopy to create a 3-dimensional "lumenogram" of the target lesion. Directional atherectomy was performed only where plaque impinged on the balloon at a specific fluoroscopic orientation. The results of the LPBI technique were corroborated with multimodality diagnostic imaging, including digital subtraction angiography, intravascular ultrasound, and intra-arterial pressure measurements. With the LPBI technique, directional atherectomy can routinely achieve <10% residual stenosis, as illustrated in this case, thereby broadly supporting a no-stent approach to lower extremity endovascular revascularization. © The Author(s) 2016.

  4. Primordial two-component maximally symmetric inflation

    Science.gov (United States)

    Enqvist, K.; Nanopoulos, D. V.; Quirós, M.; Kounnas, C.

    1985-12-01

    We propose a two-component inflation model, based on maximally symmetric supergravity, where the scales of reheating and the inflation potential at the origin are decoupled. This is possible because of the second-order phase transition from SU(5) to SU(3)×SU(2)×U(1) that takes place when φ≅φcinflation at the global minimum, and leads to a reheating temperature TR≅(1015-1016) GeV. This makes it possible to generate baryon asymmetry in the conventional way without any conflict with experimental data on proton lifetime. The mass of the gravitinos is m3/2≅1012 GeV, thus avoiding the gravitino problem. Monopoles are diluted by residual inflation in the broken phase below the cosmological bounds if φcUSA.

  5. Distributed-Memory Fast Maximal Independent Set

    Energy Technology Data Exchange (ETDEWEB)

    Kanewala Appuhamilage, Thejaka Amila J.; Zalewski, Marcin J.; Lumsdaine, Andrew

    2017-09-13

    The Maximal Independent Set (MIS) graph problem arises in many applications such as computer vision, information theory, molecular biology, and process scheduling. The growing scale of MIS problems suggests the use of distributed-memory hardware as a cost-effective approach to providing necessary compute and memory resources. Luby proposed four randomized algorithms to solve the MIS problem. All those algorithms are designed focusing on shared-memory machines and are analyzed using the PRAM model. These algorithms do not have direct efficient distributed-memory implementations. In this paper, we extend two of Luby’s seminal MIS algorithms, “Luby(A)” and “Luby(B),” to distributed-memory execution, and we evaluate their performance. We compare our results with the “Filtered MIS” implementation in the Combinatorial BLAS library for two types of synthetic graph inputs.

  6. Quench dynamics of topological maximally entangled states.

    Science.gov (United States)

    Chung, Ming-Chiang; Jhu, Yi-Hao; Chen, Pochung; Mou, Chung-Yu

    2013-07-17

    We investigate the quench dynamics of the one-particle entanglement spectra (OPES) for systems with topologically nontrivial phases. By using dimerized chains as an example, it is demonstrated that the evolution of OPES for the quenched bipartite systems is governed by an effective Hamiltonian which is characterized by a pseudospin in a time-dependent pseudomagnetic field S(k,t). The existence and evolution of the topological maximally entangled states (tMESs) are determined by the winding number of S(k,t) in the k-space. In particular, the tMESs survive only if nontrivial Berry phases are induced by the winding of S(k,t). In the infinite-time limit the equilibrium OPES can be determined by an effective time-independent pseudomagnetic field Seff(k). Furthermore, when tMESs are unstable, they are destroyed by quasiparticles within a characteristic timescale in proportion to the system size.

  7. Maximizing policy learning in international committees

    DEFF Research Database (Denmark)

    Nedergaard, Peter

    2007-01-01

    , this article demonstrates that valuable lessons can be learned about policy learning, in practice and theoretically, by analysing the cooperation in the OMC committees. Using the Advocacy Coalition Framework as the starting point of analysis, 15 hypotheses on policy learning are tested. Among other things......In the voluminous literature on the European Union's open method of coordination (OMC), no one has hitherto analysed on the basis of scholarly examination the question of what contributes to the learning processes in the OMC committees. On the basis of a questionnaire sent to all participants......, it is concluded that in order to maximize policy learning in international committees, empirical data should be made available to committees and provided by sources close to the participants (i.e. the Commission). In addition, the work in the committees should be made prestigious in order to attract well...

  8. Lovelock black holes with maximally symmetric horizons

    Energy Technology Data Exchange (ETDEWEB)

    Maeda, Hideki; Willison, Steven; Ray, Sourya, E-mail: hideki@cecs.cl, E-mail: willison@cecs.cl, E-mail: ray@cecs.cl [Centro de Estudios CientIficos (CECs), Casilla 1469, Valdivia (Chile)

    2011-08-21

    We investigate some properties of n( {>=} 4)-dimensional spacetimes having symmetries corresponding to the isometries of an (n - 2)-dimensional maximally symmetric space in Lovelock gravity under the null or dominant energy condition. The well-posedness of the generalized Misner-Sharp quasi-local mass proposed in the past study is shown. Using this quasi-local mass, we clarify the basic properties of the dynamical black holes defined by a future outer trapping horizon under certain assumptions on the Lovelock coupling constants. The C{sup 2} vacuum solutions are classified into four types: (i) Schwarzschild-Tangherlini-type solution; (ii) Nariai-type solution; (iii) special degenerate vacuum solution; and (iv) exceptional vacuum solution. The conditions for the realization of the last two solutions are clarified. The Schwarzschild-Tangherlini-type solution is studied in detail. We prove the first law of black-hole thermodynamics and present the expressions for the heat capacity and the free energy.

  9. MAXIMIZING THE BENEFITS OF ERP SYSTEMS

    Directory of Open Access Journals (Sweden)

    Paulo André da Conceição Menezes

    2010-04-01

    Full Text Available The ERP (Enterprise Resource Planning systems have been consolidated in companies with different sizes and sectors, allowing their real benefits to be definitively evaluated. In this study, several interactions have been studied in different phases, such as the strategic priorities and strategic planning defined as ERP Strategy; business processes review and the ERP selection in the pre-implementation phase, the project management and ERP adaptation in the implementation phase, as well as the ERP revision and integration efforts in the post-implementation phase. Through rigorous use of case study methodology, this research led to developing and to testing a framework for maximizing the benefits of the ERP systems, and seeks to contribute for the generation of ERP initiatives to optimize their performance.

  10. Maximal energy extraction under discrete diffusive exchange

    Energy Technology Data Exchange (ETDEWEB)

    Hay, M. J., E-mail: hay@princeton.edu [Department of Astrophysical Sciences, Princeton University, Princeton, New Jersey 08544 (United States); Schiff, J. [Department of Mathematics, Bar-Ilan University, Ramat Gan 52900 (Israel); Fisch, N. J. [Department of Astrophysical Sciences, Princeton University, Princeton, New Jersey 08544 (United States); Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543 (United States)

    2015-10-15

    Waves propagating through a bounded plasma can rearrange the densities of states in the six-dimensional velocity-configuration phase space. Depending on the rearrangement, the wave energy can either increase or decrease, with the difference taken up by the total plasma energy. In the case where the rearrangement is diffusive, only certain plasma states can be reached. It turns out that the set of reachable states through such diffusive rearrangements has been described in very different contexts. Building upon those descriptions, and making use of the fact that the plasma energy is a linear functional of the state densities, the maximal extractable energy under diffusive rearrangement can then be addressed through linear programming.

  11. Maximizing profitability in a hospital outpatient pharmacy.

    Science.gov (United States)

    Jorgenson, J A; Kilarski, J W; Malatestinic, W N; Rudy, T A

    1989-07-01

    This paper describes the strategies employed to increase the profitability of an existing ambulatory pharmacy operated by the hospital. Methods to generate new revenue including implementation of a home parenteral therapy program, a home enteral therapy program, a durable medical equipment service, and home care disposable sales are described. Programs to maximize existing revenue sources such as increasing the capture rate on discharge prescriptions, increasing "walk-in" prescription traffic and increasing HMO prescription volumes are discussed. A method utilized to reduce drug expenditures is also presented. By minimizing expenses and increasing the revenues for the ambulatory pharmacy operation, net profit increased from +26,000 to over +140,000 in one year.

  12. Maximizing the benefits of a dewatering system

    International Nuclear Information System (INIS)

    Matthews, P.; Iverson, T.S.

    1999-01-01

    The use of dewatering systems in the mining, industrial sludge and sewage waste treatment industries is discussed, also describing some of the problems that have been encountered while using drilling fluid dewatering technology. The technology is an acceptable drilling waste handling alternative but it has had problems associated with recycled fluid incompatibility, high chemical costs and system inefficiencies. This paper discussed the following five action areas that can maximize the benefits and help reduce costs of a dewatering project: (1) co-ordinate all services, (2) choose equipment that fits the drilling program, (3) match the chemical treatment with the drilling fluid types, (4) determine recycled fluid compatibility requirements, and (5) determine the disposal requirements before project start-up. 2 refs., 5 figs

  13. Mixtures of maximally entangled pure states

    Energy Technology Data Exchange (ETDEWEB)

    Flores, M.M., E-mail: mflores@nip.up.edu.ph; Galapon, E.A., E-mail: eric.galapon@gmail.com

    2016-09-15

    We study the conditions when mixtures of maximally entangled pure states remain entangled. We found that the resulting mixed state remains entangled when the number of entangled pure states to be mixed is less than or equal to the dimension of the pure states. For the latter case of mixing a number of pure states equal to their dimension, we found that the mixed state is entangled provided that the entangled pure states to be mixed are not equally weighted. We also found that one can restrict the set of pure states that one can mix from in order to ensure that the resulting mixed state is genuinely entangled. Also, we demonstrate how these results could be applied as a way to detect entanglement in mixtures of the entangled pure states with noise.

  14. Returns to Tenure or Seniority?

    DEFF Research Database (Denmark)

    Buhai, Ioan Sebastian; Portela, Miguel; Teulings, Coen

      This study documents two empirical regularities, using data for Denmark and Portugal. First, workers who are hired last, are the first to leave the firm (Last In, First Out; LIFO). Second, workers' wages rise with seniority (= a Worker's tenure relative to the tenure of her colleagues). We seek...... at the moment of separation). The LIFO rule provides a stronger bargaining position for senior workers, leading to a return to seniority in wages. Efficiency in hiring requires the workers' .bargaining power to be in line with their share in the cost of specific investment. Then, the LIFO rule is a way...

  15. Maximally reliable Markov chains under energy constraints.

    Science.gov (United States)

    Escola, Sean; Eisele, Michael; Miller, Kenneth; Paninski, Liam

    2009-07-01

    Signal-to-noise ratios in physical systems can be significantly degraded if the outputs of the systems are highly variable. Biological processes for which highly stereotyped signal generations are necessary features appear to have reduced their signal variabilities by employing multiple processing steps. To better understand why this multistep cascade structure might be desirable, we prove that the reliability of a signal generated by a multistate system with no memory (i.e., a Markov chain) is maximal if and only if the system topology is such that the process steps irreversibly through each state, with transition rates chosen such that an equal fraction of the total signal is generated in each state. Furthermore, our result indicates that by increasing the number of states, it is possible to arbitrarily increase the reliability of the system. In a physical system, however, an energy cost is associated with maintaining irreversible transitions, and this cost increases with the number of such transitions (i.e., the number of states). Thus, an infinite-length chain, which would be perfectly reliable, is infeasible. To model the effects of energy demands on the maximally reliable solution, we numerically optimize the topology under two distinct energy functions that penalize either irreversible transitions or incommunicability between states, respectively. In both cases, the solutions are essentially irreversible linear chains, but with upper bounds on the number of states set by the amount of available energy. We therefore conclude that a physical system for which signal reliability is important should employ a linear architecture, with the number of states (and thus the reliability) determined by the intrinsic energy constraints of the system.

  16. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems.

    Science.gov (United States)

    Park, Subin; Lee, Yeeun; Jang, Hyesue; Jo, Minkyung

    2017-05-19

    We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES), exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  17. Temperamental Differences in Children’s Reactions to Peer Victimization

    Science.gov (United States)

    Sugimura, Niwako; Rudolph, Karen D.

    2015-01-01

    Objective This research examined the hypothesis that temperament and sex moderate the contribution of peer victimization to children’s subsequent adjustment (aggression and depressive symptoms). Method Children (125 boys, 158 girls; M age = 7.95 years, SD = 0.32; 77.7% White, 22.3% minority) and teachers reported on overt and relational victimization. Parents rated children’s temperament (inhibitory control and negative emotionality) and depressive symptoms, and teachers reported on children’s overt and relational aggression. Results Across a one-year time period, (a) overt victimization predicted overt aggression in girls with poor inhibitory control; (b) overt and relational victimization predicted depressive symptoms in girls with high negative emotionality; and (c) relational victimization predicted depressive symptoms in boys with low negative emotionality. Conclusions This research helps to explain individual variation in children’s reactions to peer victimization, and has implications for person-by-environment models of development. Moreover, this research informs the development of targeted intervention programs for victimized youth that bolster specific resources depending on their temperament. PMID:22420650

  18. Toward establishing basic rights of victims in Japan

    Directory of Open Access Journals (Sweden)

    Morosawa Hidemichi

    2008-01-01

    Full Text Available The author talks about improving victim rights in Japan and his important role in it. A period of Victims’ Renaissance in Japan began in the 1990s when the Japanese Association of Victimology and Mito Victim Assistance Cener, first non-governmental community-based integrated victim support center in Japan were established. Since May 1999 to May 2004, four laws such as “Crime Victim Protection Law”, “Child Abuse Prevention Law”, “Law for Proscribing Stalking Behavior” and so on were enacted and six laws were reformed. The word “rights of victim”, did not appear in any laws. After 2000, the National Association of Crime Victims and Surviving Families (NAVS played an important role. This Association achieved a great success in securing victims a position as the subject of rights. In June 2007, Japan changed the Criminal Procedure Law. This new law will be effective on six months after the day of promulgation. Japanese Government will promulgate it till the end of 2007. Under this new law, crime victims will be allowed to take part in criminal trials, and also make statements during trials.

  19. [A sociography of elderly victims of family violence in Portugal].

    Science.gov (United States)

    Gil, Ana Paula; Santos, Ana João; Kislaya, Irina; Santos, César; Mascoli, Luísa; Ferreira, Alexandra Inácio; Vieira, Duarte Nuno

    2015-06-01

    This article presents data on violence against persons aged 60 years or older and living in Portugal for at least 12 months. The cross-sectional descriptive study collected data with a face-to-face questionnaire applied to victims that had sought assistance at three government institutions and one non-governmental support service for victims. The non-probabilistic sample included 510 victims of violence in family settings. Physical and psychological violence were the most common (87.8% and 69.6%, respectively). Financial violence was reported by 47.5% of the victims, followed by sexual assault (7.5%) and neglect (6.5%). The majority of victims (74.1%) reported more than one type of violence. Victims were mostly women, and mean age was 70.7 years. Most of the perpetrators belonged to the nuclear family, namely spouses or partners, sons/sons-in-law, and daughters/daughters-in-law. However, differences were observed according to victim's gender. The results indicate that violence is not a uniform phenomenon, presenting different configurations.

  20. Workplace Victimization and Discrimination in China: A Nationwide Survey.

    Science.gov (United States)

    Zhang, Huiping

    2017-09-01

    Workplace victimization and discrimination have been intensively studied in the West, especially on the antecedents and consequences of this phenomenon. Surprisingly, little is known about the incidence and associated health problems of workplace victimization and discrimination in contemporary China. Using a representative nationwide sample of 1,138 Chinese employees conducted in 2015, this study attempted to estimate the prevalence, risk factors, and associated consequences of workplace victimization and discrimination in China. It is found that the prevalence rate of preceding 5-year workplace discrimination and victimization was 33% and 12.9%, respectively. Male employees who perceived higher work gains were less likely to experience workplace victimization and those who had higher career efficacy and unemployment anxiety were more likely to experience job discrimination or victimization. Female employees who received tertiary education were less likely to experience job discrimination and being married tended not to experience workplace victimization. Perceived job discrimination had negative impact on male employees' job satisfaction as well as on female employees' happiness. The implications of these findings are finally discussed in the Chinese context.

  1. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems

    Directory of Open Access Journals (Sweden)

    Subin Park

    2017-05-01

    Full Text Available We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES, exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  2. A Criterion to Identify Maximally Entangled Four-Qubit State

    International Nuclear Information System (INIS)

    Zha Xinwei; Song Haiyang; Feng Feng

    2011-01-01

    Paolo Facchi, et al. [Phys. Rev. A 77 (2008) 060304(R)] presented a maximally multipartite entangled state (MMES). Here, we give a criterion for the identification of maximally entangled four-qubit states. Using this criterion, we not only identify some existing maximally entangled four-qubit states in the literature, but also find several new maximally entangled four-qubit states as well. (general)

  3. Maximal lattice free bodies, test sets and the Frobenius problem

    DEFF Research Database (Denmark)

    Jensen, Anders Nedergaard; Lauritzen, Niels; Roune, Bjarke Hammersholt

    Maximal lattice free bodies are maximal polytopes without interior integral points. Scarf initiated the study of maximal lattice free bodies relative to the facet normals in a fixed matrix. In this paper we give an efficient algorithm for computing the maximal lattice free bodies of an integral m...... method is inspired by the novel algorithm by Einstein, Lichtblau, Strzebonski and Wagon and the Groebner basis approach by Roune....

  4. Protective Factors for Psychotic Symptoms Among Poly-victimized Children.

    Science.gov (United States)

    Crush, Eloise; Arseneault, Louise; Jaffee, Sara R; Danese, Andrea; Fisher, Helen L

    2018-04-06

    Experiencing victimization in early life has been repeatedly shown to be associated with the emergence of psychotic symptoms in childhood. However, most victimized children do not develop psychotic symptoms and why this occurs is not fully understood. This study investigated which individual, family-level, and wider community characteristics were associated with an absence of psychotic symptoms among children at risk for psychosis by virtue of their exposure to multiple victimization experiences (poly-victimization). Participants were from the Environmental Risk Longitudinal Twin Study, a nationally representative cohort of 2232 UK-born twins. Exposure to maltreatment, bullying and domestic violence prior to age 12 was determined from interviews with mothers, children, and observations by research workers at ages 5, 7, 10, and 12. Children were interviewed about psychotic symptoms at age 12. Protective factors were measured at ages 5, 7, 10, and 12. Childhood poly-victimization was associated with age-12 psychotic symptoms (OR = 4.61, 95% CI 2.82-7.52), but the majority of poly-victimized children did not report symptoms (80.7%). Having a relatively high IQ, more positive atmosphere at home, and higher levels of neighborhood social cohesion were found to be protective against childhood psychotic symptoms among poly-victimized children and also in the whole sample. However, "protected" poly-victimized children displayed elevated levels of other mental health problems compared to nonvictimized children. Children's characteristics, family context, and the wider community were all found to protect children from developing early psychotic symptoms, even when they were victimized multiple times. These findings indicate targets for multilevel preventive interventions.

  5. Common Factors in International Bond Returns

    NARCIS (Netherlands)

    Driessen, J.J.A.G.; Melenberg, B.; Nijman, T.E.

    2000-01-01

    In this paper we estimate and interpret the factors that jointly determine bond returns of different maturities in the US, Germany and Japan.We analyze both currency-hedged and unhedged bond returns.For currency-hedged bond returns, we find that five factors explain 96.5% of the variation of bond

  6. Foreign currency returns and systematic risks

    NARCIS (Netherlands)

    Galsband, V.; Nitschka, T.

    2015-01-01

    We apply an empirical approximation of the intertemporal capital asset pricing model (ICAPM) to show that cross-sectional dispersion in currency returns can be rationalized by differences in currency excess returns' sensitivities to the market return's cash-flow news component. This finding echoes

  7. Maximizing competition : reducing barriers for new players

    International Nuclear Information System (INIS)

    Chandler, H.; Cramer, D.; McLeese, R.; Singer, J.

    2003-01-01

    This session included highlights from four guest speakers who commented on ways to reduce barriers to competition in Ontario's electric power industry. Topics of discussion included intertie transaction failures, the lack of overall investment in the market, the government's inaction which is preventing investment, the continued underwriting of Ontario Power Generation's activities by the government which discourages investment in the private sector, and indecisiveness regarding policy on coal plants. It was emphasized that investors need to know for certain that they can get a reasonable rate of return on their investments, that the market will be transparent and there will be no shift in policy. The need to promote new, efficient power generation by means of nuclear, coal, natural gas, and hydro energy was also emphasized. Charts depicting total energy production by source were presented for 2001 with projections to 2012. figs

  8. Relationship between income and repeat criminal victimization in Brazil

    Directory of Open Access Journals (Sweden)

    Marcelo Justus

    2015-09-01

    Full Text Available This study analyzes the effect of income on repeat criminal victimization in Brazil using data from the 2009 National Household Sample Survey and its special supplement on victimization and access to justice. Two count-data models were estimated for four types of crime: theft, robbery, attempted theft/robbery, and physical assault. A positive nonlinear effect of income on repeat victimization for the three types of property crimes and a negative nonlinear effect of income on physical assault were observed.

  9. Aid for the victims of the forest fires in Greece

    CERN Multimedia

    2007-01-01

    To support the victims of the fires which devastated the Peloponnese at the end of August, the Permanent Mission of Greece in Geneva has informed us that the Greek government has opened an account into which donations may be paid. The funds collected will be used to assist the many victims of these fires. Bank of Greece Account name: Logariasmos Arogis Pyropathon (Hellenic Republic) (account reserved for aid for the victims of the forest fires) SWIFT : BNGRGRAA IBAN : GR 98 0100 0230 0000 0234 1103 053

  10. Perceptions of teachers' support, safety, and absence from school because of fear among victims, bullies, and bully-victims.

    Science.gov (United States)

    Berkowitz, Ruth; Benbenishty, Rami

    2012-01-01

    This study examines the distribution of the types of involvement in school violence (bullies, victims, bully-victims, and students not involved in violence) among the general population of Israeli school students. The prevalence of these different types of involvement was also examined according to gender, age or school level (junior high vs. high school), and ethnicity (Jewish vs. Arab). Further, the study examines the relationships between type of involvement in school violence and students' perceptions of teachers' support, safety, and absence from school because of fear. Data were obtained from a nationally representative, stratified sample of 13,262 students in grades 7-11 who responded to a self-report questionnaire on victimization by, and perpetration of, school violence and on perceptions of school climate. Data revealed that 3.6% of all students were victims of bullying (18.5% of those involved in violence). The proportion of bully-victims among male students was 6.4% (21.9% of all involved) compared with 1.1% (11.2% of all involved) among females. Bully-victims reported the lowest levels of teacher support and feelings of security and missed school because of fear significantly more often. The results point to the uniqueness of the bully-victim group. This group presents multiple challenges for school staff with these students needing special attention. © 2012 American Orthopsychiatric Association.

  11. Stock Returns and Risk: Evidence from Quantile

    Directory of Open Access Journals (Sweden)

    Thomas C. Chiang

    2012-12-01

    Full Text Available This paper employs weighted least squares to examine the risk-return relation by applying high-frequency data from four major stock indexes in the US market and finds some evidence in favor of a positive relation between the mean of the excess returns and expected risk. However, by using quantile regressions, we find that the risk-return relation moves from negative to positive as the returns’ quantile increases. A positive risk-return relation is valid only in the upper quantiles. The evidence also suggests that intraday skewness plays a dominant role in explaining the variations of excess returns.

  12. On maximal surfaces in asymptotically flat space-times

    International Nuclear Information System (INIS)

    Bartnik, R.; Chrusciel, P.T.; O Murchadha, N.

    1990-01-01

    Existence of maximal and 'almost maximal' hypersurfaces in asymptotically flat space-times is established under boundary conditions weaker than those considered previously. We show in particular that every vacuum evolution of asymptotically flat data for Einstein equations can be foliated by slices maximal outside a spatially compact set and that every (strictly) stationary asymptotically flat space-time can be foliated by maximal hypersurfaces. Amongst other uniqueness results, we show that maximal hypersurface can be used to 'partially fix' an asymptotic Poincare group. (orig.)

  13. Compensation for the victims of the Marshall Islands nuclear testing programme: the Marshall Islands Nuclear Claims Tribunal

    International Nuclear Information System (INIS)

    Briscoe, W.

    1992-01-01

    The Marshall Islands Nuclear Claims Tribunal was established in 1988 pursuant to legislation enacted by the Republic of the Marshall Islands as part of its obligations under the Compact of Free Association between it and the United States (ratified 1986) and an associated Compact implementation agreement. The Tribunal is generally considered to be the last hope for compensation for a large number of Marshallese who claim to have suffered injury or damage as a result of the United States Nuclear Testing Programme in the Marshall Islands, 1946 - 1958. Under the Compact, the United States admitted liability for injuries and damages suffered by Marshallese as a result of the Testing Programme and made provision for the payment of compensation. In return, the Republic agreed to espouse, on behalf of it and its citizens, all current and future claims for compensation against the United States. The Tribunal has been given a most challenging and unique assignment: - to identify and compensate the victims of the Testing Programme, with a potentially limited sum of money, an indefinite number of victims, and with cultural, environmental and political circumstances which are not altogether conducive to Western concepts associated with compensating people for damages and personal injuries suffered as a result of a wrongful act. The paper will describe the Tribunal's role in compensating the victims of the Testing Programme. It will highlight a number of legal, social and cultural difficulties in establishing and operating a scheme to compensate people for damages and injuries suffered or commenced up to forty years previously. (author)

  14. 28 CFR Appendix to Subpart A - International Terrorism Victim Expense Reimbursement Program (ITVERP); Chart of Expense...

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false International Terrorism Victim Expense... Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIME VICTIM SERVICES International Terrorism Victim Expense Reimbursement Program Pt. 94, Subpt. A, App. Appendix to Subpart A—International Terrorism Victim Expense...

  15. Attitudes of Future Human Service Professionals: The Effects of Victim and Helper Qualities.

    Science.gov (United States)

    Liebkind, Karmela; Eranen, Liisa

    2001-01-01

    Investigates the attitudes of future members in human service professions toward victims, based on the qualities effected by trauma victims and their helpers. Reports that the high-trauma and poorly adapted victims elicited more negative attitudes than did the low-trauma and well-adapted victims. (CMK)

  16. Compensating Victims of Violent Crime: Potential Costs and Coverage of a National Program.

    Science.gov (United States)

    Garofalo, James; Sutton, L. Paul

    Data generated from an ongoing national crime victimization survey and details about the circumstances and consequences of personal crimes form the basis for estimating the cost of a national program to compensate victims of violent crime. Victim compensation programs represent an attempt to rectify the neglect of the victim. Uncertainty about the…

  17. Disability in Relation to Different Peer-Victimization Groups and Psychosomatic Problems

    Science.gov (United States)

    Beckman, Linda; Stenbeck, Magnus; Hagquist, Curt

    2016-01-01

    The purpose of this study was to examine the associations between disability, victims, perpetrators, and so-called "bully-victims" (someone reporting being both a victim and a perpetrator) of traditional, cyber, or combined victimization or perpetration and psychosomatic health among adolescents. Authors analyzed cross-sectional data…

  18. Development and validation of the multidimensional offline and online peer victimization scale

    NARCIS (Netherlands)

    Sumter, S.R.; Valkenburg, P.M.; Baumgartner, S.E.; Peter, J.; van der Hof, S.

    2015-01-01

    Peer victimization can seriously impair one’s well-being. As youth spend more time on the Internet, a new form of peer victimization has emerged, namely, online peer victimization. To fully comprehend peer victimization among today’s youth, there is a need for a psychometrically sound measure that

  19. Do Victimization Experiences Accentuate Reactions to Ostracism? An Experiment Using Cyberball

    Science.gov (United States)

    Ruggieri, Sabrina; Bendixen, Mons; Gabriel, Ute; Alsaker, Françoise

    2013-01-01

    Based on the notion that the history of victimization has an impact on the sensitivity to current victimization situations this study investigated whether victims of bullying show more pronounced responses to single episodes of social exclusion. We examined whether victimization experiences in school are associated with responses to ostracism in a…

  20. Understanding Risk-taking Behavior in Bullies, Victims, and Bully Victims Using Cognitive- and Emotion-Focused Approaches.

    Science.gov (United States)

    Poon, Kean

    2016-01-01

    Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth's overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully victim). This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and an emotion-focused model of risk taking, and to clarify how adolescents' characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age = 14.5, M = 65, F = 71) were recruited and grouped according to bullying identity: Bully ( n = 27), Victim ( n = 20), Bully victim ( n = 37) and Control ( n = 52). Cognitive Appraisal of Risky Events (CARE) questionnaire was used to measure participants' expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT) was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  1. Understanding risk-taking behavior in bullies, victims, and bully-victims using cognitive- and emotion-focused approaches.

    Directory of Open Access Journals (Sweden)

    Kean Poon

    2016-11-01

    Full Text Available Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth’s overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully-victim. This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and a emotion-focused model of risk taking, and to clarify how adolescents’ characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age =14.5, M= 65, F =71 were recruited and grouped according to bullying identity: Bully (n =27, Victim (n =20, Bully-victim (n =37 and Control (n =52. Cognitive Appraisal of Risky Events (CARE questionnaire was used to measure participants’ expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully-victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully-victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully-victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  2. There are no "innocent victims": the influence of just world beliefs and prior victimization on rape myth acceptance.

    Science.gov (United States)

    Vonderhaar, Rebecca L; Carmody, Dianne Cyr

    2015-06-01

    Utilizing data from an online survey of 979 university students, this study explores the relationship between prior sexual assault victimization experiences, belief in a just world, and acceptance of rape myths. Results indicated that men, younger respondents, and those with less education were more likely to support rape myths. Support for just world beliefs and rape myths were also positively associated, while rape victims exhibited less support for rape myths than non-victims. Implications for future studies are discussed. © The Author(s) 2014.

  3. Devenir victime des pesticides:Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel, Jean-Noël; Prete, Giovanni

    2014-01-01

    Cet article analyse les effets du recours au droit sur la mobilisation des travailleurs agricoles victimes des pesticides. Il repose sur une enquête qualitative auprès des membres de l’association Phyto-victimes, qui réunit ces agriculteurs, ainsi que de leurs proches et des professionnels du droit avec lesquels ils interagissent. À partir de ce matériau, nous retraçons les parcours suivis par les agriculteurs pour obtenir une reconnaissance de leur statut de victimes des pesticides. Nous ren...

  4. Devenir victime des pesticides : Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel , Jean-Noël; Prete , Giovanni

    2014-01-01

    International audience; A partir du cas de l’association Phyto-victimes, qui regroupe des agriculteurs souffrant de maladies chroniques qu’ils imputent aux pesticides, l’article met en évidence les effets ambigus du droit sur les mobilisations de victimes. L’article met en évidence les mécanismes par lesquels le droit amène des exploitants agricoles exposés à des pesticides et tombés malades à prendre conscience de leur statut de victimes, du préjudice qu’ils ont subi et des responsabilités e...

  5. 76 FR 22611 - Specified Tax Return Preparers Required To File Individual Income Tax Returns Using Magnetic...

    Science.gov (United States)

    2011-04-22

    ... Specified Tax Return Preparers Required To File Individual Income Tax Returns Using Magnetic Media... Register on Wednesday, March 30, 2011 (76 FR 17521) providing guidance to specified tax return preparers who prepare and file individual income tax returns using magnetic media pursuant to section 6011(e)(3...

  6. Repurposing traditional instructor-led lectures for continuing education: rewarding instructors as authors and maximizing return on investment.

    Science.gov (United States)

    Rushinek, Avi; Rushinek, Sara; Lippincott, Christine; Ambrosia, Todd

    2014-04-01

    The aim of this article is to describe the repurposing of classroom video surveillance and on-screen archives (RCVSOSA) model, which is an innovative, technology-enabled approach to continuing education in nursing. The RCVSOSA model leverages network Internet-protocol, high-definition surveillance cameras to record videos of classroom lectures that can be automatically uploaded to the Internet or converted to DVD, either in their entirety or as content-specific modules, with the production work embedded in the technology. The proposed model supports health care continuing education through the use of online assessments for focused education modules, access to archived online recordings and DVD training courses, voice-to-text transcripts, and possibly continuing education modules that may be translated into multiple languages. Potential benefits of this model include increased access to educational modules for students, instant authorship, and financial compensation for instructors and their respective organizations.

  7. Shaping the Victim: Borders, security, and human trafficking in Albania

    Directory of Open Access Journals (Sweden)

    James Campbell

    2013-09-01

    Full Text Available Borders are productive sites where knowledge is gathered and migrant populations are formed. The knowledge gathered from victims of trafficking reinforces a victim narrative that represents a perceived threat to society by highlighting violence, criminality, coercion, and naivety. Using Albania as a case in point, the article looks at trafficked people and the narratives of victimhood that surround them. In the case of trafficked people, the border projected out towards other states produces a discursively defined victim of trafficking. When projected back within the national territory, the border essentially produces a criminalised sex worker. To argue this point, the article discusses the role victims of trafficking play in the EU and looks at how international norms espoused by the OSCE and IOM have prepped the Albanian border for EU ascension and created the means for governable populations within Albania.

  8. [The profile of female victims of conjugal violence].

    Science.gov (United States)

    Vasseur, Philippe

    2004-12-18

    To define the profile of female victims of conjugal violence examined in the Legal Medicine emergency unit of the Hotel-Dieu hospital in Paris. A self-administered questionnaire with 15 questions was distributed to 100 victims. The 100 victims replied: 86 cases of violence took place usually in the home, 78 episodes of violence were multiple and complaints were rarely lodged after the first episodes. Mental and sexual violence were severe and unrecognized. Eighty women interviewed suffered from mental violence. In 43 cases, alcohol played a determining role in the onset of such violence. Female victims of conjugal violence do not have a specific profile. The law of silence persists, but the increase in the number of complaints from North African and African women is encouraging for the future.

  9. Family, Teachers, and Peers: Keys for Supporting Victims of Bullying

    Directory of Open Access Journals (Sweden)

    María Jesús Cava

    2011-07-01

    Full Text Available The aim of the current study was to analyse the differences in psychological adjustment in victims of bullying as a function of the quality of their relationships with parents, teachers, and peers. More specifically, it was compared four psychological adjustment indicators (self-esteem, depressive mood, loneliness, and stress perception in victims with good or bad communication with his/her mother, good or bad communication with his/her father, high or low perception of teacher´s help, and high or low identification with their peer group. The initial sample was composed of 1795 adolescents aged from 11 to 18 years old (M = 14.2, SD = 1.68. Results indicated better psychological adjustment in victims with better relationships with their parents, teachers, and peers than in victims with worse quality relationships. These results are discussed, and their implications in the development of intervention programmes on school violence are pointed out.

  10. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  11. Perioperative care of a pregnant trauma victim: a review of ...

    African Journals Online (AJOL)

    Adele

    2004-05-03

    May 3, 2004 ... (until proven otherwise) in any female trauma patient of child- ... The perioperative management of pregnant trauma victims re- ... trauma, abdominal trauma, head injury, cervical spine injury, fetal injury, gun shot wounds, blunt.

  12. Family victim advocates: the importance of critical job duties

    Directory of Open Access Journals (Sweden)

    Teresa H. Young

    Full Text Available Child advocacy centers across the United States intervened in more than 250,000 child abuse cases in 2011(National Children's Alliance, 2012. Understanding the work of family victim advocates is imperative to helping children and families in child abuse cases. In this exploratory study, we surveyed advocates and program directors from child advocacy centers (CACs across the United States to compare their perceptions of the critical job duties of family victim advocates. Data analysis revealed that CAC directors rated the importance of these duties significantly higher than family victim advocates. Results suggest the need for additional training to ensure that family victim advocates understand the importance of critical job duties to meet the needs of children and families in child abuse cases.

  13. A disclosure scheme for protecting the victims of domestic violence.

    Science.gov (United States)

    Griffith, Richard

    2017-06-08

    Richard Griffith, Senior Lecturer in Health Law at Swansea University, explains how the Domestic Violence Disclosure Scheme aims to protect potential victims by allowing disclosure of a partner's previous crimes.

  14. Romantic Attachment, Conflict Resolution Styles, and Teen Dating Violence Victimization.

    Science.gov (United States)

    Bonache, Helena; Gonzalez-Mendez, Rosaura; Krahé, Barbara

    2017-09-01

    Although research on dating violence has increased in the last decades, little is known about the role of romantic attachment and conflict resolution in understanding victimization by an intimate partner among adolescents. This study examined the relationships between insecure attachment styles, destructive conflict resolution strategies, self-reported and perceived in the partner, and psychological and physical victimization by a dating partner in 1298 adolescents (49% girls). Anxious attachment was related to both forms of victimization via self-reported conflict engagement and conflict engagement attributed to the partner among boys and girls. Moreover, both insecure attachment styles were also indirectly linked to victimization via self-reported withdrawal and conflict engagement perceived in the partner, but only among boys. The implications of the findings for promoting constructive communication patterns among adolescents for handling their relationship conflicts are discussed.

  15. Recognizing victims of human trafficking in the pediatric emergency department.

    Science.gov (United States)

    Becker, Heather J; Bechtel, Kirsten

    2015-02-01

    Human trafficking is a form of modern-day slavery that is rapidly expanding in the United States and throughout the world. It is a crime under both the United States and international law. The child and adult victims of human trafficking are denied their basic human rights and subjected to unspeakable physical and emotional harm. Traffickers exert complete control over their victims and are proficient at hiding their condition from authorities. Healthcare practitioners may be the only professionals who come into contact with victims if they present for medical care. This article will describe human trafficking and its potential victims, as well as guide medical management and access to services that will ensure their safety and restore their freedom.

  16. The management of victims of collective accidents. Methodological guide

    International Nuclear Information System (INIS)

    Meadel, Juliette; Marie, Eugenie; Badorc, Yves; Riviere, Anne; Chalaux, Marion; Heisserer, Julie; Tosello-Orsola, Romain; Gelli, Robert; Boura, Florent; Sookahet, Stephanie; Deparis, Benjamin; Tarabeux, Xavier; Besson, Jean-Paul; Porterie, Frederique; Paris-Muller, Gaelle; Marchelli, Sylvie; Gesret, Samuel; Guthleben, Sandra; Sauvee, Marie-Line; Percie Du Sert, Xavier; Bossuyt, Yves; Viteau, Thierry; Etienne-Diener, Annick; Le Caro, Sylvie; Taffin, Monique; Deluz, Damien; Cremniter, Didier; Philippe, Jean-Marc; Ouvrard, Anne-Emmanuelle; Andre, Jean-Marc; Lansman, Patrick; Jouty, Remi; Delbono, Martine; Cebe, Philippe; Le Divenah, Jean-Paul; Vandoorne, Pierre-Jean; Bertin, Jerome; Sadowski, Isabelle; Bovis, Marcel; Gicquel, Stephane; Seco, Sophia; Ieche, Clara; Bertrand, Paul; Tricot, Sandrine; Gomes, Thierry; Marissal, Jean-Luc; Voss, Beatrice; Mescam, Marie; Le Chevalier, Elisabeth; Bouchet, Loic; Lienhard, Claude; Dantchev, Nicolas; Delval, Christophe; Naudascher, Michel; Sublet, Xavier; Cutajar, Chantal; Trestard, Jean-Francois; Quentin, Cecile

    2017-11-01

    This publication proposes several sets of sheets. A first set concerns the crisis phase itself and sheets present or describe the coordination during an emergency phase, the role of the public prosecutor, the role of the prefect, the crisis and support Centre of the Ministry for Foreign Affairs, the health management of victims, the mobilisation of association for the support to victims, the role of associations of victims, crisis information telephone numbers, the family welcome centre, information meetings for victims and families, relationships with media. The second set concerns the post-crisis phase: coordination during the follow-up phase, the intervention of insurance providers, and the intervention of lawyers. A last sheet concerns the legal phase with a presentation of the legal procedure

  17. Compensation for the victims of violence from the public funds

    Directory of Open Access Journals (Sweden)

    Mrvić-Petrović Nataša

    2013-01-01

    Full Text Available In the Republic of Serbia there is still neither a public fund for the compensation of the victims of the violent crime, nor do the until now undertaken reform of the penal law respect in the necessary measure the interests of the victims. The documents of the UN, the European Council and the EU contain guidelines for the foundation of funds for the public compensation of the victims of violence, and the comparative European experiences indicate by their action the existing system of social protection is completed. The authors analyses the reasons for the introduction of these funds and they plead for the compensation of the victims from public funds to be enabled for the reason of justice and humanity, according to the idea of prosperity within a state of prosperity. That reason should have priority in relation to other, pragmatic, criminal-political reasons and the obligation of the domestic legislation to (formally adjust itself to the European standards.

  18. A Note of Caution on Maximizing Entropy

    Directory of Open Access Journals (Sweden)

    Richard E. Neapolitan

    2014-07-01

    Full Text Available The Principle of Maximum Entropy is often used to update probabilities due to evidence instead of performing Bayesian updating using Bayes’ Theorem, and its use often has efficacious results. However, in some circumstances the results seem unacceptable and unintuitive. This paper discusses some of these cases, and discusses how to identify some of the situations in which this principle should not be used. The paper starts by reviewing three approaches to probability, namely the classical approach, the limiting frequency approach, and the Bayesian approach. It then introduces maximum entropy and shows its relationship to the three approaches. Next, through examples, it shows that maximizing entropy sometimes can stand in direct opposition to Bayesian updating based on reasonable prior beliefs. The paper concludes that if we take the Bayesian approach that probability is about reasonable belief based on all available information, then we can resolve the conflict between the maximum entropy approach and the Bayesian approach that is demonstrated in the examples.

  19. Optimal topologies for maximizing network transmission capacity

    Science.gov (United States)

    Chen, Zhenhao; Wu, Jiajing; Rong, Zhihai; Tse, Chi K.

    2018-04-01

    It has been widely demonstrated that the structure of a network is a major factor that affects its traffic dynamics. In this work, we try to identify the optimal topologies for maximizing the network transmission capacity, as well as to build a clear relationship between structural features of a network and the transmission performance in terms of traffic delivery. We propose an approach for designing optimal network topologies against traffic congestion by link rewiring and apply them on the Barabási-Albert scale-free, static scale-free and Internet Autonomous System-level networks. Furthermore, we analyze the optimized networks using complex network parameters that characterize the structure of networks, and our simulation results suggest that an optimal network for traffic transmission is more likely to have a core-periphery structure. However, assortative mixing and the rich-club phenomenon may have negative impacts on network performance. Based on the observations of the optimized networks, we propose an efficient method to improve the transmission capacity of large-scale networks.

  20. New features of the maximal abelian projection

    International Nuclear Information System (INIS)

    Bornyakov, V.G.; Polikarpov, M.I.; Syritsyn, S.N.; Schierholz, G.; Suzuki, T.

    2005-12-01

    After fixing the Maximal Abelian gauge in SU(2) lattice gauge theory we decompose the nonabelian gauge field into the so called monopole field and the modified nonabelian field with monopoles removed. We then calculate respective static potentials and find that the potential due to the modified nonabelian field is nonconfining while, as is well known, the monopole field potential is linear. Furthermore, we show that the sum of these potentials approximates the nonabelian static potential with 5% or higher precision at all distances considered. We conclude that at large distances the monopole field potential describes the classical energy of the hadronic string while the modified nonabelian field potential describes the string fluctuations. Similar decomposition was observed to work for the adjoint static potential. A check was also made of the center projection in the direct center gauge. Two static potentials, determined by projected Z 2 and by modified nonabelian field without Z 2 component were calculated. It was found that their sum is a substantially worse approximation of the SU(2) static potential than that found in the monopole case. It is further demonstrated that similar decomposition can be made for the flux tube action/energy density. (orig.)

  1. College students' electronic victimization in friendships and dating relationships: anticipated distress and associations with risky behaviors.

    Science.gov (United States)

    Bennett, Diana C; Guran, Elyse L; Ramos, Michelle C; Margolin, Gayla

    2011-01-01

    This study investigated college students' reports of electronic victimization in friendships and dating relationships. We examined 22 items representing four categories of electronic victimization: hostility, humiliation, exclusion, and intrusiveness. Nearly all participants (92%) reported some electronic victimization in the past year, with males reporting more victimization and females anticipating more distress. Both females and males anticipated more distress from electronic victimization in dating relationships than friendships. More actual experience with electronic victimization related to lower anticipated distress. Electronic victimization was associated with females' alcohol use, even after controlling for other victimization experiences. Discussion focuses on the contextualized nature of electronic victimization, and on the importance of understanding what makes electronic victimization highly distressing for some individuals.

  2. Cyberbully and Victim Experiences of Pre-service Teachers

    OpenAIRE

    Nilgün Tosun

    2016-01-01

    The aim of this study was to determine the prevalence of different types of cyber bullying, the ways in which cyber bullying occurred, whether the identity of cyber bullies were known, and reaction to being cyber bullied among pre-service teachers. Relationships between gender and likelihood of being a cyber bully/victim were also investigated. Using a questionnaire based on the Cyber Bully and Victim Scale developed by [1], males were found to engage in cyber bullying more than females. Cybe...

  3. [Widows of victims of Nazi concentration camps: their pathology].

    Science.gov (United States)

    Ryn, Z J

    1992-09-01

    The psychosocial situation of widows and orphans of victims of the Nazi concentration camps in Poland are presented. In 1984, 74 widows of victims from the Auschwitz-Birkenau camp were interviewed. This article describes widows' emotional-behavioral reactions when facing the imprisonment and death of their husbands, their difficulties in adapting themselves to widowhood, different adaptative forms of memories of their married life, and consequences relevant to widows' mental health and family, and social consequences of widowhood.

  4. Victim empathy, social self-esteem, and psychopathy in rapists.

    Science.gov (United States)

    Fernandez, Yolanda M; Marshall, W L

    2003-01-01

    The purpose of the present study was to compare the responses of 27 incarcerated rapists and 27 incarcerated nonsexual offenders using the Rapist Empathy Measure (targeting victim specific empathy deficits) and to examine the relationship between empathy with self-esteem and psychopathy for both groups. The Social Self-Esteem Inventory was used as a measure of perceived social competence and the Psychopathy Checklist-Revised (PCL-R; Hare, 1991) was used as a measure of psychopathy. All participants completed the two self-report questionnaires on empathy and self-esteem; in addition, the rapists were required to complete an extra section of the empathy measure that assessed their empathic responses to their own victims. Demographic information and psychopathy scores were obtained by reviewing institutional files. When psychopathy scores were not available, subjects participated in a semi-structured interview and were scored on the Psychopathy Checklist-Revised by the researcher. Rapists demonstrated more empathy than the nonsexual offenders toward women in general and the same degree of empathy as the nonsexual offenders toward a woman who had been a victim of a sexual assault by another male. Of particular importance were the within-group comparisons across victim type for the rapists which revealed significant empathy deficits toward their own victim(s). Interestingly, no differences were found between the rapists and nonsexual offenders in terms of self-esteem and psychopathy, and neither self-esteem nor psychopathy significantly predicted empathy for either group. It was concluded from the present study that rapists may suppress empathy primarily toward their own victim rather than suffer from a generalized empathy deficit. It is suggested that empathy deficits in rapists might better be construed as cognitive distortions specific to their victims and should be addressed in that manner in treatment.

  5. Offer and Acceptance of Apology in Victim-Offender Mediation

    OpenAIRE

    Dhami, MK; Dhami, MK

    2012-01-01

    Past research on restorative justice (RJ) has highlighted the importance of apology for both victims and offenders and the prevalence of apology during the RJ process. The present study moves this work further by examining the nature of the apologies that are offered during victim-offender mediation, as well as the individual-, case-, and mediation-level factors that can affect the offer and acceptance of apology. In addition, we measure the implications that the offer and acceptance of apolo...

  6. Violence against women: featuring the victim, aggression and the author

    OpenAIRE

    Costa Leite, Franciele Marabotti; Universidade Federal do Espirito Santo; Bravim, Larissa Regina; Universidade Federal do Espirito Santo; Lima, Eliane de Fátima Almeida; Universidade Federal do Espirito Santo; Primo, Cândida Caniçali; Universidade Federal do Espirito Santo

    2015-01-01

    Objective: Describing the profile of violence against women regarding aggression, the socio-demographic characteristics of the victim and the perpetrator of the violence. Method: a transversal study of quantitative approach and descriptive analysis. The population consisted of 42 women victims of violence. Results: of the total 42 participants, prevailed in women aged 30-39 years old, with complete high school and family income of 1-3 minimum wages. The physical, psychological and moral viole...

  7. The role and importance of victim surveys in criminal research

    OpenAIRE

    Ahmet Polat; Serdar Kenan Gül

    2010-01-01

    Due to increasing crime rates, insufficient policies and the limitations of the official statistics, victim surveys are being used as an alternative crime measurement technique. These types of surveys are inspired most of the criminological theories and regarded as a data source especially in shaping the crime policies of the Anglo-Saxon countries. Even though they have developed over time, victim surveys have limitations which create an obstacle in measuring crime. However, these surveys cou...

  8. Peer Victimization and Internalizing Symptoms in Middle School Children

    OpenAIRE

    Grills, Amie E.

    2000-01-01

    The primary purpose of this investigation was to examine the relationships among peer victimization, global self-worth, social support, and internalizing behaviors (e.g., anxiety, social anxiety, and depression). Of particular interest were the potential mediating and moderating roles of global self-worth and social support in the anticipated relationships between peer victimization and internalizing symptoms. All sixth grade children from a public middle school completed self-report measur...

  9. Physical examination of sexual assault victims in Belgrade area

    Directory of Open Access Journals (Sweden)

    Alempijević Đorđe

    2006-01-01

    Full Text Available Introduction: Sexual crimes represent various forms of contact of perpetrator’s genitals, lips, tongue, and fingers with genitals, lips and/or anus of the victim, in order to achieve sexual satisfaction, without victim’s consent. Objective: The aim of this work was to analyze the type of medical institution in which victims of sexual assaults are being examined in Belgrade area, to assess the quality of these examinations and medical records, as well as to control whether standardized protocols are followed. Method: Data were obtained through analysis of 113 cases of sexual assaults prosecuted in the District Court of Belgrade. Results: All victims were females with mean age of 24.1 years. The majority of victims (85% were examined in one medical institution, most often in the Institute of Gynecology and Obstetrics, Clinical Center of Serbia, and only by one medical doctor (81.4%. Gynecologists were most frequently included in examination, while specialists of forensic medicine were engaged in only 9 cases (7.9%. In 84% of victims, the examination was performed during the first three days after the assault, and in 52% of cases on the first day. Standard techniques of clinical and gynecological examinations were applied only, without following any protocols, so the reports were made exclusively on individual basis. In no case an informed consent by victim was obtained before examination. Anamnestic data were collected in only 15.9% of cases, and they were generally incomplete. Conclusion: The results of investigation show that the quality of examination of sexual assault victims in Belgrade area is not adequate. Therefore, such negative practice should be changed in future through introduction of standardized protocols for examination of victims, as well as development of clinical forensic medicine.

  10. Clinical observations over 20 years period of Bikini victims

    International Nuclear Information System (INIS)

    Kumatori, Toshiyuki

    1976-01-01

    The author outlined the results of medical examinations performed in a period of 20 years on the Japanese fishermen who were exposed at Bikini in 1954. Exposure doses were estimated, and the progress of medical examinations for skin injury, hematological changes, cytogenetic changes, and spermatogenetic disturbance was described. In view of internal exposure, none of the long half-life nuclides was retained in the body. The victims were compared with the victims exposed in Marshall Islands. (Serizawa, K.)

  11. Emotional Profile of Women Victims of Domestic Violence.

    Science.gov (United States)

    Avdibegovic, Esmina; Brkic, Maja; Sinanovic, Osman

    2017-06-01

    Research indicates that women victims of domestic violence show significant cognitive changes, emotional numbing, and avoidance of interpersonal relationships. The aim of this research was to analyze emotional profile of women victims of domestic violence, and to determine the relationship between dimensions of emotions and frequency of women exposure to domestic violence. The research was conducted on the sample of 169 women, 111 were victims of domestic violence and 58 were women who did not experience domestic violence. Plutchik's Emotions Profile Index (EPI) was used for measuring of the emotion profile, and the Modified Inventory of Domestic Violence for measuring experiences of different types of violence. Basic socio-demographic data were also collected. Significant differences between women victims of domestic violence and women who did not experience domestic violence were found in a few dimensions of emotional profile. Women victims of domestic violence had higher results in the dimensions of deprivation/depression and aggression/destruction, while women who did not experience domestic violence had higher results in dimensions of reproduction and incorporation. Aggression was in significant negative correlation with reproduction, incorporation and self protection, whereas it was significant positive correlation with deprivation and opposition. There were significant and positive correlation between the dimensions of aggression and deprivation and frequency of all three forms of domestic violence and age of women. According to results obtained in this research, it can be concluded that women victims of domestic violence have significantly more intensive negative emotional dimensions in comparison to women who were not abused. Women victims of domestic violence with higher frequency of abuse describe themselves as more sad, apathetic, lonely, angry, quarrelsome and less sociable. Prominence of negative emotions, deprivation and aggression, can be factor of

  12. Integrating forensic anthropology into Disaster Victim Identification.

    Science.gov (United States)

    Mundorff, Amy Z

    2012-06-01

    This paper will provide mass fatality emergency planners, police, medical examiners, coroners and other Disaster Victim Identification (DVI) personnel ways to integrate forensic anthropologists into DVI operations and demonstrate how anthropological contributions have improved DVI projects. In mass disaster situations, anthropologists have traditionally been limited to developing biological profiles from skeletal remains. Over the past decade, however, anthropologists' involvement in DVI has extended well beyond this traditional role as they have taken on increasingly diverse tasks and responsibilities. Anthropological involvement in DVI operations is often dictated by an incident's specific characteristics, particularly events involving extensive fragmentation, commingling, or other forms of compromised remains. This paper will provide examples from recent DVI incidents to illustrate the operational utility of anthropologists in the DVI context. The points where it is most beneficial to integrate anthropologists into the DVI process include: (1) during recovery at the disaster scene; (2) at the triage station as remains are brought into the mortuary; and (3) in conducting the reconciliation process. Particular attention will be paid to quality control and quality assurance measures anthropologists have developed and implemented for DVI projects. Overall, this paper will explain how anthropological expertise can be used to increase accuracy in DVI while reducing the project's cost and duration.

  13. The happy victimizer phenomenon: Not found here

    Directory of Open Access Journals (Sweden)

    Jevtić Ana

    2014-01-01

    Full Text Available Children’s attribution of emotions to a moral transgressor is an important research topic in the psychology of moral and emotional development. This is especially because of the so-called Happy Victimizer Phenomenon (HVP where younger children attribute positive emotions to a moral transgressor described in a story. In the two studies that we have conducted (children aged 5, 7 and 9, 20 of each age; 10 of each age in the second study we have tested the possible influence of the fear of sanctions and the type of transgression (stealing and inflicting body injuries on the attribution of emotions. Children were presented with stories that described transgressions and they were asked to answer how the transgressor felt. The fear of sanctions did not make a significant difference in attribution but the type of transgression did - more negative emotions were attributed for inflicting body injuries than for stealing. Positive emotions were explained with situational-instrumental explanations in 84% of cases while negative emotions were explained with moral explanations in 63,5%. Girls attributed more positive emotions (61% than boys (39%. However, our main finding was that, for the aforementioned age groups, we did not find the HVP effect although it has regularly been registered in foreign studies. This finding denies the generalizability of the phenomenon and points to the significance of disciplining styles and, even more so, culture for children’s attribution of emotions to moral transgressors.

  14. Maximal stochastic transport in the Lorenz equations

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Sahil, E-mail: sahil.agarwal@yale.edu [Program in Applied Mathematics, Yale University, New Haven (United States); Wettlaufer, J.S., E-mail: john.wettlaufer@yale.edu [Program in Applied Mathematics, Yale University, New Haven (United States); Departments of Geology & Geophysics, Mathematics and Physics, Yale University, New Haven (United States); Mathematical Institute, University of Oxford, Oxford (United Kingdom); Nordita, Royal Institute of Technology and Stockholm University, Stockholm (Sweden)

    2016-01-08

    We calculate the stochastic upper bounds for the Lorenz equations using an extension of the background method. In analogy with Rayleigh–Bénard convection the upper bounds are for heat transport versus Rayleigh number. As might be expected, the stochastic upper bounds are larger than the deterministic counterpart of Souza and Doering [1], but their variation with noise amplitude exhibits interesting behavior. Below the transition to chaotic dynamics the upper bounds increase monotonically with noise amplitude. However, in the chaotic regime this monotonicity depends on the number of realizations in the ensemble; at a particular Rayleigh number the bound may increase or decrease with noise amplitude. The origin of this behavior is the coupling between the noise and unstable periodic orbits, the degree of which depends on the degree to which the ensemble represents the ergodic set. This is confirmed by examining the close returns plots of the full solutions to the stochastic equations and the numerical convergence of the noise correlations. The numerical convergence of both the ensemble and time averages of the noise correlations is sufficiently slow that it is the limiting aspect of the realization of these bounds. Finally, we note that the full solutions of the stochastic equations demonstrate that the effect of noise is equivalent to the effect of chaos.

  15. Sexual violence against children: authors, victims and consequences.

    Science.gov (United States)

    Platt, Vanessa Borges; Back, Isabela de Carlos; Hauschild, Daniela Barbieri; Guedert, Jucélia Maria

    2018-04-01

    The scope of this study was to identify the characteristics of sexual abuse against children including the profiles of the victims and the perpetrators, and associated factors notified in a health service of reference with the database of the Brazilian Case Registry Database, in a city in the south of Brazil. Categorical variables are presented in prevalence with 95% confidence intervals. There were 489 notifications from 2008 to 2014 of confirmed or suspected child sexual abuse. The majority was related to female victims, but the repeated abuse was reported mainly with male victims. In most cases, the abuse took place at the victims' or perpetrators' homes and the main perpetrators of abuse were male and acquainted with the victims. Twelve victims have contracted sexually transmitted infections; pregnancies were six, five of them legally terminated. This study highlights that the child sexual abuse profiles were similar in almost all of Brazilian regions, showing that it is possible to have a coordinated national action to prevent this offence.

  16. Extracorporeal Detoxification in Victims with Severe Concomitant Injury

    Directory of Open Access Journals (Sweden)

    S. Ye. Khoroshilov

    2009-01-01

    Full Text Available Objective: to improve the results of victims with massive crushes of soft tissues in severe concomitant injury (SCI, by applying extracorporeal detoxification techniques as soon as possible. Subjects and methods. The results of examination and treatment were studied in 41 victims with SCI treated at the N. N. Burdenko Main Military Clinical Hospital in 2006 to 2008. In the early posttraumatic period (on days 1—3, all the victims (n=41 were divided into 2 groups. Group 1 victims (n=19 underwent hemodiafiltration (HDF with replacement at 35 ml/kg/hr; Group 2 (n=22 had plasmapheresis. Results. Early HDF applied to Group 1 victims could achieve 32, 44, and 37% reductions in the elevated levels creatine phosphokinase, myoglobin, and middle-sized molecules, respectively. In Group 2, plasmapheresis showed a lower effect (19, 25, and 26% reductions. Furthermore, there was a decrease in total protein in Group 1, which was absent in Group 2. Conclusion. The timely use of extracorporeal detoxification techniques in victims with massive crushes of soft tissues in the early posttraumatic period prevents the development of fatal complications of SCI, at the same time HDF is more effective and safe than plasmapheresis. Key words: severe concomitant injury, rhabdomyolysis, myoglobin, plasmapheresis, hemodiafiltration.

  17. Familial Influences on Dating Violence Victimization Among Latino Youth.

    Science.gov (United States)

    Reyes, H Luz McNaughton; Foshee, Vangie A; Klevens, Joanne; Tharp, Andra Teten; Chapman, Mimi V; Chen, May S; Ennett, Susan T

    2016-01-01

    Despite theoretical and empirical evidence suggesting that the family environment plays a central role in Latino youth development, relatively little is known about how family processes influence dating violence victimization among Latino adolescents. To address this gap in the literature, we used data from 210 Latino parents and their 13- to 15-year-old adolescents to examine associations between several different family processes, including both parenting practices (parent monitoring, parent-adolescent communication) and aspects of the family relational climate (family cohesion, family conflict, acculturation conflict) and psychological, physical, and sexual dating violence victimization. Consistent with expectations, lower levels of family cohesion and higher levels of family and acculturation conflict were associated with risk for dating violence victimization, although associations varied depending on victimization type. In contrast, neither parental monitoring nor parent-adolescent communication was significantly associated with any type of dating violence victimization. In addition, we found that parent, but not teen, Anglo-American acculturation was associated with higher dating violence victimization risk. Findings suggest that family-based dating abuse prevention programs for Latino youth should seek to increase family cohesion and decrease family conflict, including acculturation-based conflict.

  18. The Voiceless Victim: A critical analysis of the impact of enhanced victim participation in the criminal justice process

    Directory of Open Access Journals (Sweden)

    Sarah Moynihan

    2015-12-01

    Full Text Available In contrast to many European jurisdictions, the victim of an alleged crime in England, Wales and Northern Ireland is denied any form of meaningful participation at the trial stage of the criminal justice process. This is by reason of the unyielding structure of the Anglo-American adversarial system, which facilitates a dispute between two parties only - the prosecution, acting on behalf of the collective public interest and the defence. In recent years, however, the victims’ movement has gained momentum as advocates of victims’ rights have been engaged in an impassioned campaign to enhance the participatory rights of victims in the criminal justice process. Fervent arguments have been articulated pertaining to the value of various forms of victim input. This paper cogitates some of these arguments and critically evaluates how enhanced victim participation in the criminal justice process has the potential to undercut the integrity of the Anglo- American adversarial system; a system with objective adjudication at its core.

  19. Effects of rate-of-return regulation on the intensity of use and durability of capital

    Energy Technology Data Exchange (ETDEWEB)

    Epple, D [Carnegie-Mellon Univ., Pittsburgh, PA; Zelenitz, A

    1979-10-01

    It has been suggested that rate-of-return regulation reduces the incentives for technically efficient management, because regulation eliminates much of the gain firms might normally expect to realize from such efficiency. Rather than relying upon notions of managerial slack or X-inefficiency, this paper demonstrates that under-utilization of existing capital and a suboptimal choice of the capital stock's durability can be explained as rational profit-maximizing responses to the regulatory incentives. 11 references.

  20. Value maximizing maintenance policies under general repair

    International Nuclear Information System (INIS)

    Marais, Karen B.

    2013-01-01

    One class of maintenance optimization problems considers the notion of general repair maintenance policies where systems are repaired or replaced on failure. In each case the optimality is based on minimizing the total maintenance cost of the system. These cost-centric optimizations ignore the value dimension of maintenance and can lead to maintenance strategies that do not maximize system value. This paper applies these ideas to the general repair optimization problem using a semi-Markov decision process, discounted cash flow techniques, and dynamic programming to identify the value-optimal actions for any given time and system condition. The impact of several parameters on maintenance strategy, such as operating cost and revenue, system failure characteristics, repair and replacement costs, and the planning time horizon, is explored. This approach provides a quantitative basis on which to base maintenance strategy decisions that contribute to system value. These decisions are different from those suggested by traditional cost-based approaches. The results show (1) how the optimal action for a given time and condition changes as replacement and repair costs change, and identifies the point at which these costs become too high for profitable system operation; (2) that for shorter planning horizons it is better to repair, since there is no time to reap the benefits of increased operating profit and reliability; (3) how the value-optimal maintenance policy is affected by the system's failure characteristics, and hence whether it is worthwhile to invest in higher reliability; and (4) the impact of the repair level on the optimal maintenance policy. -- Highlights: •Provides a quantitative basis for maintenance strategy decisions that contribute to system value. •Shows how the optimal action for a given condition changes as replacement and repair costs change. •Shows how the optimal policy is affected by the system's failure characteristics. •Shows when it is

  1. The Effects of Maximal Intensity Exercise on Cognitive Performance in Children

    Directory of Open Access Journals (Sweden)

    Samuel Roy David

    2017-06-01

    Full Text Available High intensity physical exercise has previously been found to lead to a decline in cognitive performance of adults. The aim of this study was to determine the effects of maximal intensity exercise on cognitive performance of children. Using a repeated-measures design, 20 children and adolescents aged 8-17 years completed a battery of tests measuring memory and attention. Forward and Backward Digit Span tests, the Rey Auditory-Verbal Learning Test (RAVLT and the Digit Symbol Substitution Test (DSST were performed at baseline, immediately after, and one hour after a maximal cardiopulmonary exercise test. Forward and Backward Digit Span scores significantly improved post-recovery compared with baseline measurements. There was a significant decrease in RAVLT scores post-exercise, which returned to baseline values after recovery. The DSST test scores were mildly elevated from post-exercise to after recovery. Maximal intensity exercise in children and adolescents may result in both beneficial and detrimental cognitive effects, including transient impairment in verbal learning. Cognitive functions applying short term memory improve following a recovery period. Parents, educators and coaches should consider these changes in memory and attention following high-intensity exercise activities in children.

  2. Frequency of victimization experiences and well-being among online, offline and combined victims on social online network sites of German children and adolescents

    Directory of Open Access Journals (Sweden)

    Michael eGlüer

    2015-12-01

    Full Text Available Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,906 German children and adolescents (grades 5 to 10, mean age = 13.9; SD = 2.1 with and without offline or online victimization experiences who participated in a social online network (SNS. Online questionnaires were used to assess previous victimization (offline, online, combined, and without, somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others. In total, 1,362 (71.4% children and adolescents reported being a member of at least one social online network, and 377 students (28.8% reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%, whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  3. Frequency of Victimization Experiences and Well-Being Among Online, Offline, and Combined Victims on Social Online Network Sites of German Children and Adolescents.

    Science.gov (United States)

    Glüer, Michael; Lohaus, Arnold

    2015-01-01

    Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,890 German children and adolescents (grades 5-10, mean age = 13.9; SD = 2.1) with and without offline or online victimization experiences who participated in a social online network (SNS). Online questionnaires were used to assess previous victimization (offline, online, combined, and without), somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others). In total, 1,362 (72.1%) children and adolescents reported being a member of at least one SNS, and 377 students (28.8%) reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%), whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined) was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  4. POLITENESS MAXIM OF MAIN CHARACTER IN SECRET FORGIVEN

    Directory of Open Access Journals (Sweden)

    Sang Ayu Isnu Maharani

    2017-06-01

    Full Text Available Maxim of Politeness is an interesting subject to be discussed, since politeness has been criticized from our childhood. We are obliques to be polite to anyone either in speaking or in acting. Somehow we are manage to show politeness in our spoken expression though our intention might be not so polite. For example we must appriciate others opinion although we feel objection toward the opinion. In this article the analysis of politeness is based on maxim proposes by Leech. He proposed six types of politeness maxim. The discussion shows that the main character (Kristen and Kami use all types of maxim in their conversation. The most commonly used are approbation maxim and agreement maxim

  5. The happy victimizer phenomenon: Thinking or knowledge

    Directory of Open Access Journals (Sweden)

    Simunović Vojin

    2015-01-01

    Full Text Available The attribution of emotions to transgressors has received considerable attention of researchers since the end of the1980s. A common research finding in the Western countries (the USA, Germany, and Portugal is that children younger than 8 years attribute positive emotions to transgressors (which is called “the happy victimizer phenomenon”, HVP. On the other hand, a research study conducted in Belgrade, Serbia, did not find the HVP even among 5-year-old children. It was established that children from Belgrade focused more on the moral side of the transgression than on the instrumental side (i.e. the things that the transgressor achieved by the transgression. The goal of our research was to evaluate whether Serbian children actually reason in this way or simply repeat what they have learned. In order to verify this hypothesis, Piaget’s method of “a pair of stories” (instead of presenting the stories one by one was used in two studies. In the first study, the degree of injury inflicted to the other child was varied (as one aspect of the moral side of the transgression. In the second study, the type of intention (good or bad was varied (as another aspect of the moral side of the transgression. In both studies, the sample consisted of 40 children, with two age groups (5- and 7-year-old children that included 20 children each (10 boys and 10 girls. The conclusion of both studies was that subjects attributed negative emotions to transgressors in accordance with the moral instead of instrumental understanding of the transgression. These findings imply that children’s responses do not represent moral knowledge, but reflect authentic moral reasoning.

  6. Stock returns and foreign investment in Brazil

    OpenAIRE

    Reis, Luciana; Meurer, Roberto; Da Silva, Sergio

    2008-01-01

    We examine the relationship between stock returns and foreign investment in Brazil, and find that the inflows of foreign investment boosted the returns from 1995 to 2005. There was a strong contemporaneous correlation, although not Granger-causality. Foreign investment along with the exchange rate, the influence of the world stock markets, and country risk can explain 73 percent of the changes that occurred in the stock returns over the period. We also find that positive feedback trading play...

  7. Maximizers versus satisficers: Decision-making styles, competence, and outcomes

    OpenAIRE

    Andrew M. Parker; Wändi Bruine de Bruin; Baruch Fischhoff

    2007-01-01

    Our previous research suggests that people reporting a stronger desire to maximize obtain worse life outcomes (Bruine de Bruin et al., 2007). Here, we examine whether this finding may be explained by the decision-making styles of self-reported maximizers. Expanding on Schwartz et al.\\ (2002), we find that self-reported maximizers are more likely to show problematic decision-making styles, as evidenced by self-reports of less behavioral coping, greater dependence on others when making decision...

  8. Risk-return of Belgian SRI funds

    OpenAIRE

    Van Liedekerke, Luc; De Moor, Lieven; Vanwalleghem, Dieter

    2007-01-01

    We analyse the risk-return profile of Belgian SRI funds versus conventional investment funds. We apply a four-factor conditional Carhart model to establish whether there are significant differences in risk-return profile between an SRI portfolio and a conventional portfolio and test for learning effects in SRI funds. We show that there is no difference in risk-return profile between SRI and conventional funds. If return is not the problem, then what is it that limits the development of an SRI...

  9. Money growth and aggregate stock returns

    OpenAIRE

    Böing, Tobias; Stadtmann, Georg

    2016-01-01

    We empirically evaluate the predictive power of money growth measured by M2 for stock returns of the S&P 500 index. We use monthly US data and predict multiperiod returns over 1, 3, and 5 years with long-horizon regressions. In-sample regressions show that money growth is useful for predicting returns. Higher recent money growth has a significantly negative effect on subsequent returns of the S&P 500. An out-of-sample analysis shows that a simple model with money growth as a single predictor ...

  10. Natural maximal νμ-ντ mixing

    International Nuclear Information System (INIS)

    Wetterich, C.

    1999-01-01

    The naturalness of maximal mixing between myon- and tau-neutrinos is investigated. A spontaneously broken nonabelian generation symmetry can explain a small parameter which governs the deviation from maximal mixing. In many cases all three neutrino masses are almost degenerate. Maximal ν μ -ν τ -mixing suggests that the leading contribution to the light neutrino masses arises from the expectation value of a heavy weak triplet rather than from the seesaw mechanism. In this scenario the deviation from maximal mixing is predicted to be less than about 1%. (Copyright (c) 1999 Elsevier Science B.V., Amsterdam. All rights reserved.)

  11. On the way towards a generalized entropy maximization procedure

    International Nuclear Information System (INIS)

    Bagci, G. Baris; Tirnakli, Ugur

    2009-01-01

    We propose a generalized entropy maximization procedure, which takes into account the generalized averaging procedures and information gain definitions underlying the generalized entropies. This novel generalized procedure is then applied to Renyi and Tsallis entropies. The generalized entropy maximization procedure for Renyi entropies results in the exponential stationary distribution asymptotically for q element of (0,1] in contrast to the stationary distribution of the inverse power law obtained through the ordinary entropy maximization procedure. Another result of the generalized entropy maximization procedure is that one can naturally obtain all the possible stationary distributions associated with the Tsallis entropies by employing either ordinary or q-generalized Fourier transforms in the averaging procedure.

  12. Violating Bell inequalities maximally for two d-dimensional systems

    International Nuclear Information System (INIS)

    Chen Jingling; Wu Chunfeng; Oh, C. H.; Kwek, L. C.; Ge Molin

    2006-01-01

    We show the maximal violation of Bell inequalities for two d-dimensional systems by using the method of the Bell operator. The maximal violation corresponds to the maximal eigenvalue of the Bell operator matrix. The eigenvectors corresponding to these eigenvalues are described by asymmetric entangled states. We estimate the maximum value of the eigenvalue for large dimension. A family of elegant entangled states |Ψ> app that violate Bell inequality more strongly than the maximally entangled state but are somewhat close to these eigenvectors is presented. These approximate states can potentially be useful for quantum cryptography as well as many other important fields of quantum information

  13. Offending and Victimization in the Digital Age : Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap

    NARCIS (Netherlands)

    Kranenbarg, Marleen Weulen; Holt, Thomas J.; van Gelder, Jean Louis

    2017-01-01

    Cybercrime research suggests that, analogous to traditional crime, victims are more likely to be offenders. This overlap could be caused by shared risk factors, but it is unclear if these are comparable to traditional risk factors. Utilizing a high risk sample of computer-dependent cyber-offenders

  14. Does treadmill running performance, heart rate and breathing rate response during maximal graded exercise improve after volitional respiratory muscle training?

    Science.gov (United States)

    Radhakrishnan, K; Sharma, V K; Subramanian, S K

    2017-05-10

    Maximal physical exertion in sports usually causes fatigue in the exercising muscles, but not in the respiratory muscles due to triggering of the Respiratory muscle metabo-reflex, a sympathetic vasoconstrictor response leading to preferential increment in blood flow to respiratory muscles. 1 We planned to investigate whether a six week yogic pranayama based Volitional Respiratory Muscle Training (VRMT) can improve maximal Graded Exercise Treadmill Test (GXTT) performance in healthy adult recreational sportspersons. Consecutive, consenting healthy adult recreational sportspersons aged 20.56±2.49 years (n=30), volunteered to 'baseline recording' of resting heart rate (HR), blood pressure (BP), respiratory rate (RR), and Bruce ramp protocol maximal GXTT until volitional exhaustion providing total test time (TTT), derived VO2max, Metabolic Equivalent of Task (METs), HR and BP response during maximal GXTT and drop in recovery HR data. After six weeks of observation, they underwent 'pre-intervention recording' followed by supervised VRMT intervention for 6 weeks (30 minutes a day; 5 days a week) and then 'post-intervention recording'. Repeated measures ANOVA with pairwise t statistical comparison was used to analyse the data. After supervised VRMT, we observed significant decrease in their resting supine RR (prespiratory muscle aerobic capacity, attenuation of respiratory muscle metabo-reflex, increase in cardiac stroke volume and autonomic resetting towards parasympatho-dominance. Yogic Pranayama based VRMT can be used in sports conditioning programme of athletes to further improve their maximal exercise performance, and as part of rehabilitation training during return from injury.

  15. The linkage between secondary victimization by law enforcement and rape case outcomes.

    Science.gov (United States)

    Patterson, Debra

    2011-01-01

    Prior research has suggested that almost half of rape victims are treated by law enforcement in ways that they experience as upsetting (termed secondary victimization). However, it remains unknown why some victims have negative experiences with law enforcement and others do not. The purpose of this study is to explore victims' experiences with secondary victimization by detectives, comparing how these experiences vary in cases that were ultimately prosecuted by the criminal justice system to those that were not prosecuted. A total of 20 rape victims are interviewed within one county. The study uses grounded theory qualitative analysis, which showed that participants whose cases were eventually prosecuted described the detectives' treatment toward them considerably different than participants with nonprosecuted cases. The study findings further show that victims with cases that were not prosecuted primarily described their detectives as engaging in secondary victimization behaviors and that victims with cases that were ultimately prosecuted primarily described their detectives as responding compassionately toward them.

  16. Depression as a mediator between family factors and peer-bullying victimization in Latino adolescents.

    Science.gov (United States)

    Yabko, Brandon A; Hokoda, Audrey; Ulloa, Emilio C

    2008-01-01

    The purpose of this study was to assess the mediating role of depression in three different relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Results from 242 Latino middle school adolescents from a large southwestern city bordering Mexico revealed that both boys' and girls' peer victimization were related to familial factors and depression. Regression analyses for boys revealed that depression mediated three relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Depression also mediated the relationship between fathers' power-assertive parenting and girls' victimization by peers. The findings support the development of family-based interventions for peer victimization that include curriculum addressing depression.

  17. Measuring adolescents’ exposure to victimization: The Environmental Risk (E-Risk) Longitudinal Twin Study

    Science.gov (United States)

    Fisher, Helen L.; Caspi, Avshalom; Moffitt, Terrie E.; Wertz, Jasmin; Gray, Rebecca; Newbury, Joanne; Ambler, Antony; Zavos, Helena; Danese, Andrea; Mill, Jonathan; Odgers, Candice L.; Pariante, Carmine; Wong, Chloe C.; Arseneault, Louise

    2016-01-01

    This paper presents mutlilevel findings on adolescents’ victimization exposure from a large longitudinal cohort of twins. Data were obtained from the Environmental Risk (E-Risk) Longitudinal Twin Study, an epidemiological study of 2,232 children (1,116 twin pairs) followed to 18 years of age (with 93% retention). To assess adolescent victimization we combined best practices in survey research on victimization with optimal approaches to measuring life stress and traumatic experiences, and introduce a reliable system for coding severe victimization. One in three children experienced at least one type of severe victimization during adolescence (crime victimization, peer/sibling victimization, internet/mobile phone victimization, sexual victimization, family violence, maltreatment, or neglect), and most types of victimization were more prevalent amongst children from low socioeconomic backgrounds. Exposure to multiple victimization types was common, as was re-victimization; over half of those physically maltreated in childhood were also exposed to severe physical violence in adolescence. Biometric twin analyses revealed that environmental factors had the greatest influence on most types of victimization, while severe physical maltreatment from caregivers during adolescence was predominantly influenced by heritable factors. The findings from this study showcase how distinct levels of victimization measurement can be harmonized in large-scale studies of health and development. PMID:26535933

  18. Do targets of workplace bullying portray a general victim personality profile?

    Science.gov (United States)

    Glasø, Lars; Matthiesen, Stig Berge; Nielsen, Morten Birkeland; Einarsen, Ståle

    2007-08-01

    The aim of this study is to examine differences in personality between a group of bullied victims and a non-bullied group. The 144 participants, comprising of 72 victims and a matched contrast group of 72 respondents, completed Goldberg's (1999) International Personality Item Pool (IPIP). Significant differences emerged between victims and non-victims on four out of five personality dimensions. Victims tended to be more neurotic and less agreeable, conscientious and extravert than non-victims. However, a cluster analysis revealed that the victim sample can be divided into two personality groups. One cluster, which comprised 64% of the victim sample, do not differ from non-victims as far as personality is concerned. Hence, the results indicate that there is no such thing as a general victim personality profile. However, a small cluster of victims tended to be less extrovert, less agreeable, less conscientious, and less open to experience but more emotional unstable than victims in the major cluster and the control group. Further, both clusters of victims scored higher than non-victims on emotional instability, indicating that personality should not be neglected as being a factor in understanding the bullying phenomenon.

  19. Maximal venous outflow velocity: an index for iliac vein obstruction.

    Science.gov (United States)

    Jones, T Matthew; Cassada, David C; Heidel, R Eric; Grandas, Oscar G; Stevens, Scott L; Freeman, Michael B; Edmondson, James D; Goldman, Mitchell H

    2012-11-01

    Leg swelling is a common cause for vascular surgical evaluation, and iliocaval obstruction due to May-Thurner syndrome (MTS) can be difficult to diagnose. Physical examination and planar radiographic imaging give anatomic information but may miss the fundamental pathophysiology of MTS. Similarly, duplex ultrasonographic examination of the legs gives little information about central impedance of venous return above the inguinal ligament. We have modified the technique of duplex ultrasonography to evaluate the flow characteristics of the leg after tourniquet-induced venous engorgement, with the objective of revealing iliocaval obstruction characteristic of MTS. Twelve patients with signs and symptoms of MTS were compared with healthy control subjects for duplex-derived maximal venous outflow velocity (MVOV) after tourniquet-induced venous engorgement of the leg. The data for healthy control subjects were obtained from a previous study of asymptomatic volunteers using the same MVOV maneuvers. The tourniquet-induced venous engorgement mimics that caused during vigorous exercise. A right-to-left ratio of MVOV was generated for patient comparisons. Patients with clinical evidence of MTS had a mean right-to-left MVOV ratio of 2.0, asymptomatic control subjects had a mean ratio of 1.3, and MTS patients who had undergone endovascular treatment had a poststent mean ratio of 1.2 (P = 0.011). Interestingly, computed tomography and magnetic resonance imaging results, when available, were interpreted as positive in only 53% of the patients with MTS according to both our MVOV criteria and confirmatory venography. After intervention, the right-to-left MVOV ratio in the MTS patients was found to be reduced similar to asymptomatic control subjects, indicating a relief of central venous obstruction by stenting the compressive MTS anatomy. Duplex-derived MVOV measurements are helpful for detection of iliocaval venous obstruction, such as MTS. Right-to-left MVOV ratios and

  20. Identification of human trafficking victims in health care settings.

    Science.gov (United States)

    Baldwin, Susie B; Eisenman, David P; Sayles, Jennifer N; Ryan, Gery; Chuang, Kenneth S

    2011-07-14

    An estimated 18,000 individuals are trafficked into the United States each year from all over the world, and are forced into hard labor or commercial sex work. Despite their invisibility, some victims are known to have received medical care while under traffickers' control. Our project aimed to characterize trafficking victims' encounters in US health care settings. The study consisted of semi-structured interviews with six Key Informants who work closely with trafficking victims (Phase I) and 12 female trafficking survivors (Phase II). All survivors were recruited through the Coalition to Abolish Slavery and Trafficking, an NGO in Los Angeles, and all were trafficked into Los Angeles. Interviews were conducted in English and six other languages, with the assistance of professional interpreters. Using a framework analysis approach that focused on victims' encounters in health care settings, we assessed interview transcript content and coded for themes. We used an exploratory pile-sorting technique to aggregate similar ideas and identify overarching domains. The survivors came from 10 countries. Eight had experienced domestic servitude, three had survived sex trafficking, and one had experienced both. Half the survivors reported that they had visited a physician while in their traffickers' control, and another worked in a health care facility. All Key Informants described other victims who had received medical care. For domestic servants, medical visits were triggered by injury and respiratory or systemic illness, while sex trafficking victims were seen by health professionals for sexually transmitted infections and abortion. Trafficking victims were prevented from disclosing their status to health care providers by fear, shame, language barriers, and limited interaction with medical personnel, among other obstacles. This exploration of survivors' experiences in health care settings supports anecdotal reports that US health care providers may unwittingly encounter